Talk about your brand

Share information about your brand with your customers. Describe a product, make announcements, or welcome customers to your store.

Skip to product information
1 of 1

Traditional intrusion detection and logfileanalysis are no longer enough to protect today’s complex networks. In thispractical guide, security researcher Michael Collins shows you severaltechniques and tools for collecting and analyzing network traffic datasets.You’ll understand how your network is used, and what actions are necessary toprotect and improve it.

Divided into three sections, this book examines the process of collecting andorganizing data, various tools for analysis, and several different analyticscenarios and techniques. It’s ideal for network administrators and operationalsecurity analysts familiar with scripting.

  • Explore network, host, and service sensors for capturing security data
  • Store data traffic with relational databases, graph databases, Redis, and Hadoop
  • Use SiLK, the R language, and other tools for analysis and visualization
  • Detect unusual phenomena through Exploratory Data Analysis (EDA)
  • Identify significant structures in networks with graph analysis
  • Determine the traffic that’s crossing service ports in a network
  • Examine traffic volume and behavior to spot DDoS and database raids
  • Get a step-by-step process for network mapping and inventory



View full details