内容推荐 传统入侵检测和日志分析已不足以保护当今的复杂网络。这本实用指南更新的第二版中,安全研究员Michael Collins向信息安全人员展示了近期新的网络流量数据收集分析技术和工具。你将会理解网络如何使用,以及哪些行动是加固和防护系统所必需的。本书通过三个部分检视了收集和组织数据的过程,多种分析工具,以及各种分析场景和技术。新章节关注活跃监控和流量处理、内部威胁检测、数据挖掘、回归与机器学习,还有其它话题。 作者简介 Michael Collins是位于华盛顿的网络安全与数据分析公司RedJack有限责任公司的首席科学家。他主要关注于网络设备和流量分析,特别是大规模流量数据集的分析。 目录 Preface Part Ⅰ. Data 1. Organizing Data: Vantage, Domain, Action, and Validity Domain Vantage Choosing Vantage Actions: What a Sensor Does with Data Validity and Action Internal Validity External Validity Construct Validity Statistical Validity Attacker and Attack Issues Further Reading 2. Vantage: Understanding Sensor Placement in Networks The Basics of Network Layering Network Layers and Vantage Network Layers and Addressing MAC Addresses IPv4 Format and Addresses IPv6 Format and Addresses Validity Challenges from Middlebox Network Data Further Reading 3. Sensors in the Network Domain Packet and Frame Formats Rolling Buffers Limiting the Data Captured from Each Packet Filtering Specific Types of Packets What If It's Not Ethernet? NetFlow NetFlow v5 Formats and Fields NetFlow Generation and Collection Data Collection via IDS Classifying IDSs IDS as Classifier Improving IDS Performance Enhancing IDS Detection Configuring Snort Enhancing IDS Response Prefetching Data Middlebox Logs and Their Impact VPN Logs Proxy Logs NAT Logs Further Reading 4. Data in the Service Domain What and Why Logfiles as the Basis for Service Data Accessing and Manipulating Logfiles The Contents of Logfiles …… |