Network Security Through Data Analysis und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr

Loggen Sie sich ein, um 1-Click® einzuschalten.
Jetzt eintauschen
und EUR 6,06 Gutschein erhalten
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Keine Abbildung vorhanden

Beginnen Sie mit dem Lesen von Network Security Through Data Analysis auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

Network Security Through Data Analysis: Building Situational Awareness [Englisch] [Taschenbuch]

Michael S Collins

Preis: EUR 31,95 kostenlose Lieferung. Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 6 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Lieferung bis Samstag, 4. Oktober: Wählen Sie an der Kasse Morning-Express. Siehe Details.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 17,30  
Taschenbuch EUR 31,95  


13. Februar 2014
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting.* Explore network, host, and service sensors for capturing security data* Store data traffic with relational databases, graph databases, Redis, and Hadoop* Use SiLK, the R language, and other tools for analysis and visualization* Detect unusual phenomena through Exploratory Data Analysis (EDA)* Identify significant structures in networks with graph analysis* Determine the traffic that’s crossing service ports in a network* Examine traffic volume and behavior to spot DDoS and database raids* Get a step-by-step process for network mapping and inventory

Wird oft zusammen gekauft

Network Security Through Data Analysis: Building Situational Awareness + Data-Driven Security: Analysis, Visualization and Dashboards
Preis für beide: EUR 66,39

Die ausgewählten Artikel zusammen kaufen

Kunden, die diesen Artikel gekauft haben, kauften auch


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr


Über den Autor und weitere Mitwirkende

Michael Collins is the chief scientist for RedJack, LLC., a Network Security and Data Analysis company located in the Washington D.C. area. Prior to his work at RedJack, Dr. Collins was a member of the technical staff at the CERT/Network Situational Awareness group atCarnegie Mellon University. His primary focus is on network instrumentation and traffic analysis, in particular on the analysis of large traffic datasets. Dr. Collins graduated with a PhD in Electrical Engineering from Carnegie Mellon University in 2008, he holds Master's and Bachelor's Degrees from the same institution.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Es gibt noch keine Kundenrezensionen auf
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Sterne
Die hilfreichsten Kundenrezensionen auf (beta) 4.4 von 5 Sternen  5 Rezensionen
3 von 3 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen Network Security Through Data Analysis review 6. Juli 2014
Von Javier - Veröffentlicht auf
One of the goals of this book is achieving situational awareness or, to put it another way, an understanding of the environment you are operating in. This book is about collecting data and looking at networks in order to understand how the network is used.

The author mentions the target for this book are network administrators and operational security analyts. I would add networking students and hackers on the top of this target. The content is very easy to follow though.

The book is divided into three sections (data, tools and analytics). It contains a total of 15 self-contained chapters.

The data section (chapters 1-4) covers the way to collect, storage and organize data. This part discuss about sensors, the best place to set them, the tooling to interface them and the issues/solutions related to the vast amount of data generated.

The tool section (chatpers 5-9) keeps the focus on tools. It covers analysis, visualization and reporting aspects. Some of these tools are SiLK, R, Graphviz, nmap, Wireshark or netcat.

The analytics section (chapters 10-15) studies the nature of the networking traffic and how some mathematical and statistical models can be used to examine data. Among the different analysis you can find useful information related to DDoS attacks, scanning patterns or port correlations approaches.

This book is interesting. It is a great update in this topic and it faces the recent issue of ‘big data’ and massive analysis from a network security perspective.

At the same time, I found the jargon of the author a bit thick along some chapters. I guess it is the result of trying to generalize some concepts and techniques while he introduces concrete examples.

As mentioned, I think this book contains good stuff. It covers a broad spectrum of topics so it could be a great book to jump in this area too. The author makes a good job and he talks from experience.
3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great guide 2. Mai 2014
Von Timm McShane - Veröffentlicht auf
Format:Taschenbuch|Verifizierter Kauf
Should be considered a gold standard for learning network security.
Breaks down the analysis problem effectively, clearly and simply. Starts from the beginning, allow new comers to get the full background needed to come up to speed rapidly.
5 von 6 Kunden fanden die folgende Rezension hilfreich
4.0 von 5 Sternen A guide to finding new threats in any secure operations center 7. März 2014
Von KEVIN M NOBLE - Veröffentlicht auf
Format:Kindle Edition|Verifizierter Kauf
The book takes considerable time to explain traffic in general, sensing traffic and the logistics around making sense of network data both at the simplistic and the next level of analysis. Anyone who has a solid understanding or working in network monitoring can skip ahead to the more interesting analysis techniques at each layer of traffic, using fundamental principals and visualization to find potential threats.

The exploration of volume and time analysis was particularly interesting to me as I do similar work however, only goes far enough to give the reader or anyone willing to try the code presented in the book an idea of what is to be expected. Probably wise of the author not to go too deep and demonstrate a wide range of analysis missing in data centers and security operations.

I found the book to insightful and useful and good for anyone looking to make the leap to the higher echelons of detection.
5.0 von 5 Sternen Informative at all career levels 17. Juni 2014
Von Jason A Rafail - Veröffentlicht auf
To be upfront and open, I've known Michael for a number of years and worked with him at the CERT/CC. He is a brilliant analyst and has always been on the cutting edge of Network Analysis. His book is a nice blend of the basic principles and more advanced research techniques that few security analysts pursue. As people have said already, this is a comprehensive book that takes a look at Network Security from the basics into some of the often not thought about aspects. There are the basics of flow analysis and monitoring to start the reader off with a solid foundation, then the later chapters delve into true analysis. Most security professionals grasp the basics for interpretation of the flows to see trends and attacks, but few go further into the techniques for analysis of the packets to gain deeper intelligence into potential motives and attempts made against systems. This books takes the readers from their comfortable basics and introduces these thought processes and techniques in an understandable and easy to follow way. With examples and explanations to help develop this knowledge.

This isn't another user guide for existing monitor and alerting software, it is a tool for security analysts to use when actively trying to understand the overwhelming and generalized information they gather through such tools. With the examples and details provided, network engineers can dig deeper to better understand the source of threats and desired targets on their network. There's more to Network Security than just responding to software alerts and this book provides a good foothold into the more advanced analysis.
4.0 von 5 Sternen good read 31. August 2014
Von Drivel - Veröffentlicht auf
Format:Kindle Edition|Verifizierter Kauf
I learned quite a bit. I feel like I need to take a course on statistical analysis in order to get the most out of the book, however.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Erster Beitrag:
Eingabe des Log-ins

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen

Ähnliche Artikel finden

Ihr Kommentar