Network Security Through Data Analysis: Building Situational Awareness (2014)
Part I. Data
Chapter 1. Sensors and Detectors: An Introduction
Chapter 3. Host and Service Sensors: Logging Traffic at the Source
Chapter 4. Data Storage for Analysis: Relational Databases, Big Data, and Other Options
Part II. Tools
Chapter 6. An Introduction to R for Security Analysts
Chapter 7. Classification and Event Tools: IDS, AV, and SEM
Chapter 8. Reference and Lookup: Tools for Figuring Out Who Someone Is
Part III. Analytics
Chapter 10. Exploratory Data Analysis and Visualization
Chapter 12. Volume and Time Analysis
Chapter 14. Application Identification
All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)
If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.
© 2016-2026 All site design rights belong to S.Y.A.