Applied Network Security Monitoring: Collection, Detection, and Analysis

Applied Network Security Monitoring: Collection, Detection, and Analysis

Chris Sanders, Jason Smith

utilized community protection Monitoring is the basic advisor to turning into an NSM analyst from the floor up. This booklet takes a basic method, whole with real-world examples that train you the main techniques of NSM. 

community safety tracking relies at the precept that prevention finally fails. within the present possibility panorama, irrespective of how a lot you are attempting, inspired attackers will finally locate their manner into your community. At that time, your skill to become aware of and reply to that intrusion could be the adaptation among a small incident and an incredible disaster.

The e-book follows the 3 phases of the NSM cycle: assortment, detection, and research. As you move via every one part, you've got entry to insights from professional NSM execs whereas being brought to suitable, useful wisdom that you should observe immediately.

  • Discusses the right kind tools for making plans and executing an NSM information assortment strategy
  • Provides thorough hands-on insurance of snicker, Suricata, Bro-IDS, SiLK, PRADS, and more
  • The first booklet to outline a number of research frameworks that may be used for acting NSM investigations in a dependent and systematic manner
  • Loaded with useful examples that utilize the safety Onion Linux distribution
  • Companion site contains up to date blogs from the authors concerning the most recent advancements in NSM, entire with supplementary publication materials

If you have by no means played NSM analysis, Applied community safeguard Monitoring will assist you take hold of the middle recommendations had to develop into an efficient analyst. when you are already operating in an research function, this e-book will let you refine your analytic strategy and bring up your effectiveness.

you'll get stuck off safeguard, you'll be blind sided, and infrequently you'll lose the struggle to avoid attackers from getting access to your community. This booklet is ready equipping you with the precise instruments for amassing the knowledge you wish, detecting malicious task, and performing the research that can assist you comprehend the character of an intrusion. even supposing prevention can ultimately fail, NSM does not have to.

** word: All writer royalties from the sale of utilized NSM are being donated to a couple of charities chosen by means of the authors.

Show sample text content

Download sample