扫一扫
关注中图网
官方微博
本类五星书更多>
-
>
全国计算机等级考试最新真考题库模拟考场及详解·二级MSOffice高级应用
-
>
决战行测5000题(言语理解与表达)
-
>
软件性能测试.分析与调优实践之路
-
>
第一行代码Android
-
>
C Primer Plus 第6版 中文版
-
>
深度学习
-
>
MATLAB计算机视觉与深度学习实战-赠在线交流卡和本书源码
基于数据分析的网络安全-(影印版) 版权信息
- ISBN:9787564150075
- 条形码:9787564150075 ; 978-7-5641-5007-5
- 装帧:一般胶版纸
- 册数:暂无
- 重量:暂无
- 所属分类:>
基于数据分析的网络安全-(影印版) 本书特色
传统的入侵检测和日志分析已经不足以保护今天的复杂网络。在这本实用指南里, 安全研究员michael collins为你展示了多个采集和分析网络流量数据集的技术和工具。你将理解你的网络是如何被利用的以及有哪些必要手段来保护和改善它。
基于数据分析的网络安全-(影印版) 内容简介
传统的入侵检测和日志分析已经不足以保护今天的复杂网络。在这本实用指南里, 安全研究员Michael Collins为你展示了多个采集和分析网络流量数据集的技术和工具。你将理解你的网络是如何被利用的以及有哪些必要手段来保护和改善它。
基于数据分析的网络安全-(影印版) 目录
prefacepartⅰ.data1.sensors and detectors: an introduction vantages: how sensor placement affects data collection domains: determining data that can be collected actions: what a sensor does with data conclusion2.network sensors network layering and its impact on instrumentation network layers and vantage network layers and addressing packet data packet and frame formats rolling buffers limiting the data captured from each packet filtering specific types of packets what iflt's not ethernet? netflow netflow v5 formats and fields netflow generation and collection further reading3.host and service sensors: logging traffic at the source accessing and manipulating logfiles the contents of logfiles the characteristics of a good log message existing logflles and how to manipulate them representative logflle formats http: clf and elf smtp microsoft exchange: message tracking logs logfile transport: transfers,syslog,and message queues transfer and logfrle rotation syslog further reading4.data storage for analysis: relational databases,big data,and other options log data and the crud paradigm creating a well—organized flat file system: lessons from silk a brieflntroduction to nosql systems what storage approach to use storage hierarchy,query times,and agingpartⅱ.tools5.the silk suite what is silk and how does it work? acquiring and installing silk the datafiles choosing and formatting output field manipulation: rwcut basic field manipulation: rwfrlter ports and protocols size ip addresses time tcp options helper options miscellaneous filtering options and some hacks rwfileinfo and provenance combining information flows: rwcount rwset and ip sets rwuniq rwbag advanced silk faalities pmaps collecting silk data yaf rwptoflow rwtuc further reading6.an introduction to r for security analysts installation and setup basics of the language the r prompt r variables writing functions conditionals and iteration using the r workspace data frames visualization visualization commands parameters to visualization annotating a visualization exportingvisualization analysis: statistical hypothesis testing hypothesis testing testing data further reading7.classification and event tools: ids,av,and sem how an ids works basic vocabulary classifler failure rates: understanding the base—rate fallacy applying classification improving ids performance enhancing ids detection enhanang ids response prefetching data further reading8.reference and lookup: tools for figuring out who someone ls mac and hardware addresses ip addressing ipv4 addresses,theu structure,and significant addresses ipv6 addresses,their structure and significant addresses checking connectivity: using ping to connect to an address tracerouting ip intelligence: geolocation and demographics dns dns name structure forward dns querying using dig the dns reverse lookup using whois to find ownership additional reference tools dnsbls9.more tools visualization graphviz communications and probing netcat nmap scapy packet inspection and reference wireshark geoip the nvd,malware sites,and the c*es search engines,mailing lists,and people further readingpartⅲ.analytics10.exploratory data analysis and visualization the goal of eda: applying analysis eda workflow variables and visualization univariate visualization: histograms,qq plots,boxplots,and rank plots histograms bar plots(not pie charts) the quantile—quantile(qq)plot the five—number summary and the boxplot generating a boxplot bivariate description scatterplots contingency tables multivariate visualization operationalizing security visualization further reading11.on fumbling attack models fumbling: misconfiguration,automation,and scanning lookup failures automation scanning identifying fumbling tcp fumbling: the state machine icmp messages and fumbling identifying udp fumbling fumbling at the service level http fumbli
展开全部
基于数据分析的网络安全-(影印版) 作者简介
MichaelCollins是RedJack有限责任公司的首席科学家。这家公司位于美国华盛顿特区,从事网络安全和数据分析。Michael主要负责网络仪器和流量分析,尤其是大流量数据集。
书友推荐
- >
月亮虎
月亮虎
¥15.4¥48.0 - >
二体千字文
二体千字文
¥16.0¥40.0 - >
中国历史的瞬间
中国历史的瞬间
¥17.9¥38.0 - >
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
¥9.9¥23.0 - >
罗曼·罗兰读书随笔-精装
罗曼·罗兰读书随笔-精装
¥40.6¥58.0 - >
莉莉和章鱼
莉莉和章鱼
¥16.0¥42.0 - >
经典常谈
经典常谈
¥17.1¥39.8 - >
【精装绘本】画给孩子的中国神话
【精装绘本】画给孩子的中国神话
¥17.6¥55.0
本类畅销
-
反电信网络诈骗全民指南
¥29.3¥59.8 -
黑客攻防从入门到精通-(攻防与脚本编程篇)
¥53.1¥69 -
2022图书×抽奖盲袋
¥9.9¥25 -
2023读书月阅读盲盒——天黑,闭眼,刀谁?
¥42.3¥158 -
2022读者节纪念徽章-三星会员专属
¥45¥45.6