fbpx

[email protected]

购物车

 查看订单

  • 我的帐户
东东购 | EasternEast
  • 中文书店
    • 畅销排行榜
      • 小说 畅销榜
      • 童书 畅销榜
      • 外语畅销榜
      • 管理畅销榜
      • 法律畅销榜
      • 青春文学畅销榜
    • 热门分类
      • 社会小说
      • 成功/励志 畅销榜
      • 人物传记
      • 大陆原创
      • 绘本童书
      • 影视小说
    • 文学推荐
      • 文集
      • 戏剧
      • 纪实文学
      • 名家作品
      • 民间文学
      • 中国现当代随笔
    • 新书热卖榜
      • 小说 新书热卖榜
      • 青春文学 新书热卖榜
      • 童书 新书热卖榜
      • 管理 新书热卖榜
      • 成功/励志 新书热卖榜
      • 艺术 新书热卖榜
  • 精选分类
    • 小说
    • 保健养生
    • 烹饪/美食
    • 风水/占卜
    • 青春文学
    • 童书
    • 管理
    • 成功/励志
    • 文学
    • 哲学/宗教
    • 传记
    • 投资理财
    • 亲子家教
    • 动漫/幽默
    • 法律 Legal
    • 经济 Economics
    • 所有分类
  • 关于东东
  • 帮我找书
搜索
首页计算机/网络信息安全基于数据分析的网络安全(影印版)

基于数据分析的网络安全(影印版)

作者:(美)柯林 著 出版社:东南大学出版社 出版时间:2014年10月 

ISBN: 9787564150075
年中特卖用“SALE15”折扣卷全场书籍85折!可与三本88折,六本78折的优惠叠加计算!全球包邮!
trust badge

EUR €42.99

类别: 信息安全 SKU:5d8443685f9849104540f302 库存: 有现货
  • 描述
  • 评论( 0 )

描述

开 本: 16开纸 张: 胶版纸包 装: 平装是否套装: 否国际标准书号ISBN: 9787564150075

内容简介
  传统的入侵检测和日志分析已经不足以保护今天的复杂网络。在这本实用指南里, 安全研究员Michael Collins为你展示了多个采集和分析网络流量数据集的技术和工具。你将理解你的网络是如何被利用的以及有哪些必要手段来保护和改善它。
作者简介
  MichaelCollins是RedJack有限责任公司的首席科学家。这家公司位于美国华盛顿特区,从事网络安全和数据分析。Michael主要负责网络仪器和流量分析,尤其是大流量数据集。
目  录
Preface
PartⅠ.Data
1.Sensors and Detectors: An Introduction
  Vantages: How Sensor Placement Affects Data Collection
  Domains: Determining Data That Can Be Collected
  Actions: What a Sensor Does with Data
  Conclusion
2.Network Sensors
  Network Layering and Its Impact on Instrumentation
  Network Layers and Vantage
  Network Layers and Addressing
  Packet Data
  Packet and Frame Formats
  Rolling Buffers
  Limiting the Data Captured from Each Packet
  Filtering SpeciFic Types of Packets
  What Iflt's Not Ethernet?
  NetFlow
  NetFlow v5 Formats and Fields
  NetFlow Generation and Collection
  Further Reading
3.Host and Service Sensors: Logging Traffic at the Source
  Accessing and Manipulating LogFiles
  The Contents of Logfiles
  The Characteristics of a Good Log Message
  Existing Logflles and How to Manipulate Them
  Representative Logflle Formats
  HTTP: CLF and ELF
  SMTP
  Microsoft Exchange: Message Tracking Logs
  Logfile Transport: Transfers,Syslog,and Message Queues
  Transfer and Logfrle Rotation
  Syslog
  Further Reading
4.Data Storage for Analysis: Relational Databases,Big Data,and Other Options
  Log Data and the CRUD Paradigm
  Creating a Well—Organized Flat File System: Lessons from SiLK
  A Brieflntroduction to NoSQL Systems
  What Storage Approach to Use
  Storage Hierarchy,Query Times,and Aging
PartⅡ.Tools
5.The SiLK Suite
  What Is SiLK and How Does It Work?
  Acquiring and Installing SiLK
  The DataFiles
  Choosing and Formatting Output Field Manipulation: rwcut
  Basic Field Manipulation: rwfrlter
  Ports and Protocols
  Size
  IP Addresses
  Time
  TCP Options
  Helper Options
  Miscellaneous Filtering Options and Some Hacks
  rwfileinfo and Provenance
  Combining Information Flows: rwcount
  rwset and IP Sets
  rwuniq
  rwbag
  Advanced SiLK Faalities
  pmaps
  Collecting SiLK Data
  YAF
  rwptoflow
  rwtuc
  Further Reading
6.An Introduction to R for Security Analysts
  Installation and Setup
  Basics of the Language
  The R Prompt
  R Variables
  Writing Functions
  Conditionals and Iteration
  Using the R Workspace
  Data Frames
  Visualization
  Visualization Commands
  Parameters to Visualization
  Annotating a Visualization
  ExportingVisualization
  Analysis: Statistical Hypothesis Testing
  Hypothesis Testing
  Testing Data
  Further Reading
7.Classification and Event Tools: IDS,AV,and SEM
  How an IDS Works
  Basic Vocabulary
  Classifler Failure Rates: Understanding the Base—Rate Fallacy
  Applying ClassiFication
  Improving IDS Performance
  Enhancing IDS Detection
  Enhanang IDS Response
  Prefetching Data
  Further Reading
8.Reference and Lookup: Tools for Figuring Out Who Someone ls
  MAC and Hardware Addresses
  IP Addressing
  IPv4 Addresses,Theu Structure,and Significant Addresses
  IPv6 Addresses,Their Structure and Significant Addresses
  Checking Connectivity: Using ping to Connect to an Address
  Tracerouting
  IP Intelligence: Geolocation and Demographics
  DNS
  DNS Name Structure
  Forward DNS Querying Using dig
  The DNS Reverse Lookup
  Using whois to Find Ownership
  Additional Reference Tools
  DNSBLs
9.More Tools
  Visualization
  Graphviz
  Communications and Probing
  netcat
  nmap
  Scapy
  Packet Inspection and Reference
  Wireshark
  GeoIP
  The NVD,Malware Sites,and the C*Es
  Search Engines,Mailing Lists,and People
  Further Reading
PartⅢ.Analytics
10.Exploratory Data Analysis and Visualization
  The Goal of EDA: Applying Analysis
  EDA Workflow
  Variables and Visualization
  Univariate Visualization: Histograms,QQ Plots,Boxplots,and Rank Plots
  Histograms
  Bar Plots(Not Pie Charts)
  The Quantile—Quantile(QQ)Plot
  The Five—Number Summary and the Boxplot
  Generating a Boxplot
  Bivariate Description
  Scatterplots
  Contingency Tables
  Multivariate Visualization
  Operationalizing Security Visualization
  Further Reading
11.On Fumbling
  Attack Models
  Fumbling: Misconfiguration,Automation,and Scanning
  Lookup Failures
  Automation
  Scanning
  Identifying Fumbling
  TCP Fumbling: The State Machine
  ICMP Messages and Fumbling
  Identifying UDP Fumbling
  Fumbling at the Service Level
  HTTP Fumbling
  SMTP Fumbling
  Analyzing Fumbling
  Building Fumbling Alarms
  Forensic Analysis of Fumbling
  Engineering a Network to Take Advantage of Fumbling
  Further Reading
12.Volume and Time Analysis
  The Workday and Its Impact on Network Traffic Volume
  Beaconing
  File Transfers/Raiding
  Locality
  DDoS,Flash Crowds,and Resource Exhaustion
  DDoS and Routing Infrastructure
  Applying Volume and Locality Analysis
  Data Selection
  Using Volume as an Alarm
  Using Beaconing as an Alarm
  Using Locality as an Alarm
  Engineering Solutions
  Further Reading
13.Graph Analysis
  Graph Attributes: What Is a Graph?
  Labeling,Weight,and Paths
  Components and Connectivity
  Clustering Coeffiaent
  Analyzing Graphs
  Using Component Analysis as an Alarm
  Using Centrality Analysis for Forensics
  Using Breadth—First Searches Forensically
  Using Centrality Analysis for Engineering
  Further Reading
14.Application Identification
  Mechanisms for Application Identification
  Port Number
  Application Identiflcation by Banner Grabbing
  Application Identification by Behavior
  Application Identification by Subsidiary Site
  Application Banners: Identifying and Classifying
  Non—Web Banners
  Web Client Banners: The User—Agent String
  Further Reading
15.Network Mapping
  Creating an Initial Network Inventory and Map
  Creating an Inventory: Data,Coverage,and Files
  Phase Ⅰ: The First Three Questions
  Phase Ⅱ: Examining the IP Space
  Phase Ⅲ: Identifying Blind and Confusing Traffic
  Phase Ⅳ: Identifying Clients and Servers
  Identifying Sensing and Blocking Infrastructure
  Updating the Inventory: Toward Continuous Audit
  Further Reading
Index 

抢先评论了 “基于数据分析的网络安全(影印版)” 取消回复

评论

还没有评论。

相关产品

阅读更多
缺货

黑客攻防技术宝典:Web实战篇(第2版)(网络安全必知!异类黑客入门宝典,黑客攻防从入门到精通实用手册!安全技术宝典全新升级!)

EUR €58.99
加入购物车

加密与解密(第4版)

EUR €108.99
加入购物车

安全简史——从隐私保护到量子密码

EUR €43.99
加入购物车

漏洞

EUR €33.99

东东购的宗旨是服务喜爱阅读中文书籍的海外人民,提供一个完善的购书平台,让国人不论何时何地都能沉浸在书香之中,读着熟悉的中文字,回忆着家乡的味道。


安全加密结账 安心网络购物 支持Paypal付款

常见问题

  • 货物配送
  • 退换货政策
  • 隐私政策
  • 联盟营销

客户服务

  • 联系东东
  • 关于东东
  • 帮我找书
  • 货物追踪
  • 会员登入

订阅最新的优惠讯息和书籍资讯

选择币别

EUR
USD
CAD
AUD
NZD
NOK
GBP
CHF
SEK
CNY
UAH
ILS
SAR
MXN
KRW
MYR
SGD
HUF
TRY
JPY
HKD
TWD
facebookinstagram
©2020 东东购 EasternEast.com

限时特卖:用“SALE15”优惠券全场书籍85折!可与三本88折,六本78折的优惠叠加计算。 忽略