中图网文创礼盒,买2个减5元
欢迎光临中图网 请 | 注册
> >
基于数据分析的网络安全-(影印版)

基于数据分析的网络安全-(影印版)

作者:柯林
出版社:东南大学出版社出版时间:2014-10-01
开本: 16开 页数: 325
中 图 价:¥49.5(7.5折) 定价  ¥66.0 登录后可看到会员价
加入购物车 收藏
运费6元,满69元免运费
?快递不能达地区使用邮政小包,运费14元起
云南、广西、海南、新疆、青海、西藏六省,部分地区快递不可达
本类五星书更多>

基于数据分析的网络安全-(影印版) 版权信息

  • ISBN:9787564150075
  • 条形码:9787564150075 ; 978-7-5641-5007-5
  • 装帧:一般胶版纸
  • 册数:暂无
  • 重量:暂无
  • 所属分类:>

基于数据分析的网络安全-(影印版) 本书特色

传统的入侵检测和日志分析已经不足以保护今天的复杂网络。在这本实用指南里, 安全研究员michael collins为你展示了多个采集和分析网络流量数据集的技术和工具。你将理解你的网络是如何被利用的以及有哪些必要手段来保护和改善它。

基于数据分析的网络安全-(影印版) 内容简介

传统的入侵检测和日志分析已经不足以保护今天的复杂网络。在这本实用指南里, 安全研究员Michael Collins为你展示了多个采集和分析网络流量数据集的技术和工具。你将理解你的网络是如何被利用的以及有哪些必要手段来保护和改善它。

基于数据分析的网络安全-(影印版) 目录

prefacepartⅰ.data1.sensors and detectors: an introduction  vantages: how sensor placement affects data collection  domains: determining data that can be collected  actions: what a sensor does with data  conclusion2.network sensors  network layering and its impact on instrumentation  network layers and vantage  network layers and addressing  packet data  packet and frame formats  rolling buffers  limiting the data captured from each packet  filtering specific types of packets  what iflt's not ethernet?  netflow  netflow v5 formats and fields  netflow generation and collection  further reading3.host and service sensors: logging traffic at the source  accessing and manipulating logfiles  the contents of logfiles  the characteristics of a good log message  existing logflles and how to manipulate them  representative logflle formats  http: clf and elf  smtp  microsoft exchange: message tracking logs  logfile transport: transfers,syslog,and message queues  transfer and logfrle rotation  syslog  further reading4.data storage for analysis: relational databases,big data,and other options  log data and the crud paradigm  creating a well—organized flat file system: lessons from silk  a brieflntroduction to nosql systems  what storage approach to use  storage hierarchy,query times,and agingpartⅱ.tools5.the silk suite  what is silk and how does it work?  acquiring and installing silk  the datafiles  choosing and formatting output field manipulation: rwcut  basic field manipulation: rwfrlter  ports and protocols  size  ip addresses  time  tcp options  helper options  miscellaneous filtering options and some hacks  rwfileinfo and provenance  combining information flows: rwcount  rwset and ip sets  rwuniq  rwbag  advanced silk faalities  pmaps  collecting silk data  yaf  rwptoflow  rwtuc  further reading6.an introduction to r for security analysts  installation and setup  basics of the language  the r prompt  r variables  writing functions  conditionals and iteration  using the r workspace  data frames  visualization  visualization commands  parameters to visualization  annotating a visualization  exportingvisualization  analysis: statistical hypothesis testing  hypothesis testing  testing data  further reading7.classification and event tools: ids,av,and sem  how an ids works  basic vocabulary  classifler failure rates: understanding the base—rate fallacy  applying classification  improving ids performance  enhancing ids detection  enhanang ids response  prefetching data  further reading8.reference and lookup: tools for figuring out who someone ls  mac and hardware addresses  ip addressing  ipv4 addresses,theu structure,and significant addresses  ipv6 addresses,their structure and significant addresses  checking connectivity: using ping to connect to an address  tracerouting  ip intelligence: geolocation and demographics  dns  dns name structure  forward dns querying using dig  the dns reverse lookup  using whois to find ownership  additional reference tools  dnsbls9.more tools  visualization  graphviz  communications and probing  netcat  nmap  scapy  packet inspection and reference  wireshark  geoip  the nvd,malware sites,and the c*es  search engines,mailing lists,and people  further readingpartⅲ.analytics10.exploratory data analysis and visualization  the goal of eda: applying analysis  eda workflow  variables and visualization  univariate visualization: histograms,qq plots,boxplots,and rank plots  histograms  bar plots(not pie charts)  the quantile—quantile(qq)plot  the five—number summary and the boxplot  generating a boxplot  bivariate description  scatterplots  contingency tables  multivariate visualization  operationalizing security visualization  further reading11.on fumbling  attack models  fumbling: misconfiguration,automation,and scanning  lookup failures  automation  scanning  identifying fumbling  tcp fumbling: the state machine  icmp messages and fumbling  identifying udp fumbling  fumbling at the service level  http fumbli
                                            
展开全部

基于数据分析的网络安全-(影印版) 作者简介

MichaelCollins是RedJack有限责任公司的首席科学家。这家公司位于美国华盛顿特区,从事网络安全和数据分析。Michael主要负责网络仪器和流量分析,尤其是大流量数据集。

商品评论(0条)
暂无评论……
书友推荐
编辑推荐
返回顶部
中图网
在线客服