Network Security Through Data Analysis: Building Situational Awareness (2014)

Network Security Through Data Analysis: Building Situational Awareness (2014)

Preface

Part I. Data

Chapter 1. Sensors and Detectors: An Introduction

Chapter 2. Network Sensors

Chapter 3. Host and Service Sensors: Logging Traffic at the Source

Chapter 4. Data Storage for Analysis: Relational Databases, Big Data, and Other Options

Part II. Tools

Chapter 5. The SiLK Suite

Chapter 6. An Introduction to R for Security Analysts

Chapter 7. Classification and Event Tools: IDS, AV, and SEM

Chapter 8. Reference and Lookup: Tools for Figuring Out Who Someone Is

Chapter 9. More Tools

Part III. Analytics

Chapter 10. Exploratory Data Analysis and Visualization

Chapter 11. On Fumbling

Chapter 12. Volume and Time Analysis

Chapter 13. Graph Analysis

Chapter 14. Application Identification

Chapter 15. Network Mapping



All materials on the site are licensed Creative Commons Attribution-Sharealike 3.0 Unported CC BY-SA 3.0 & GNU Free Documentation License (GFDL)

If you are the copyright holder of any material contained on our site and intend to remove it, please contact our site administrator for approval.

© 2016-2026 All site design rights belong to S.Y.A.