Applied Network Security Monitoring: Collection, Detection, and Analysis (2014)
CHAPTER 1. The Practice of Applied Network Security Monitoring
SECTION 1. Collection
CHAPTER 2. Planning Data Collection
CHAPTER 3. The Sensor Platform
CHAPTER 5. Full Packet Capture Data
SECTION 2. Detection
CHAPTER 7. Detection Mechanisms, Indicators of Compromise, and Signatures
CHAPTER 8. Reputation-Based Detection
CHAPTER 9. Signature-Based Detection with Snort and Suricata
CHAPTER 11. Anomaly-Based Detection with Statistical Data
CHAPTER 12. Using Canary Honeypots for Detection
SECTION 3. Analysis
CHAPTER 14. Friendly and Threat Intelligence
CHAPTER 15. The Analysis Process
APPENDIX 1. Security Onion Control Scripts
APPENDIX 2. Important Security Onion Files and Directories
APPENDIX 4. Decimal / Hex / ASCII Conversion Chart
All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)
If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.
© 2016-2026 All site design rights belong to S.Y.A.