购买云解压PDF图书

当前位置: 基于数据分析的网络安全 > 购买云解压PDF图书
基于数据分析的网络安全
  • 作 者:(美)柯林(MichaelCollins)著
  • 出 版 社:南京:东南大学出版社
  • 出版年份:2014
  • ISBN:9787564150075
  • 注意:在使用云解压之前,请认真核对实际PDF页数与内容!

在线云解压

价格(点数)

购买连接

说明

转为PDF格式

11

立即购买

(在线云解压服务)

云解压服务说明

1、本站所有的云解压默认都是转为PDF格式,该格式图书只能阅读和打印,不能再次编辑。

云解压下载及付费说明

1、所有的电子图书云解压均转换为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、云解压在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

Part Ⅰ.Data 3

1.Sensors and Detectors:An Introduction 3

Vantages:How Sensor Placement Affects Data Collection 4

Domains:Determining Data That Can Be Collected 7

Actions:What a Sensor Does with Data 10

Conclusion 13

2.Network Sensors 15

Network Layering and Its Impact on Instrumentation 16

Network Layers and Vantage 18

Network Layers and Addressing 23

Packet Data 24

Packet and Frame Formats 24

Rolling Buffers 25

Limiting the Data Captured from Each Packet 25

Filtering Specific Types of Packets 25

What If It's Not Ethernet? 29

NetFlow 30

NetFlow v5 Formats and Fields 30

NetFlow Generation and Collection 32

Further Reading 33

3.Host and Service Sensors:Logging Traffic at the Source 35

Accessing and Manipulating Logfiles 36

The Contents of Logfiles 38

The Characteristics of a Good Log Message 38

Existing Logfiles and How to Manipulate Them 41

Representative Logfile Formats 43

HTTP:CLF and ELF 43

SMTP 47

Microsoft Exchange:Message Tracking Logs 49

Logfile Transport:Transfers,Syslog,and Message Queues 50

Transfer and Logfile Rotation 51

Syslog 51

Further Reading 53

4.Data Storage for Analysis:Relational Databases,Big Data,and Other Options 55

Log Data and the CRUD Paradigm 56

Creating a Well-Organized Flat File System:Lessons from SiLK 57

A Brief Introduction to NoSQL Systems 59

What Storage Approach to Use 62

Storage Hierarchy,Query Times,and Aging 64

Part Ⅱ.Tools 69

5.The SiLK Suite 69

What Is SiLK and How Does It Work? 69

Acquiring and Installing SiLK 70

The Datafiles 70

Choosing and Formatting Output Field Manipulation:rwcut 71

Basic Field Manipulation:rwfilter 76

Ports and Protocols 77

Size 78

IP Addresses 78

Time 80

TCP Options 80

Helper Options 82

Miscellaneous Filtering Options and Some Hacks 82

rwfileinfo and Provenance 83

Combining Information Flows:rwcount 86

rwset and IP Sets 88

rwuniq 91

rwbag 93

Advanced SiLK Facilities 93

pmaps 93

Collecting SiLK Data 95

YAF 96

rwptoflow 98

rwtuc 98

Further Reading 100

6.An Introduction to R for Security Analysts 101

Installation and Setup 102

Basics of the Language 102

The R Prompt 102

R Variables 104

Writing Functions 109

Conditionals and Iteration 111

Using the R Workspace 113

Data Frames 114

Visualization 117

Visualization Commands 117

Parameters to Visualization 118

Annotating a Visualization 120

Exporting Visualization 121

Analysis: Statistical Hypothesis Testing 121

Hypothesis Testing 122

Testing Data 124

Further Reading 127

7.Classification and Event Tools:IDS,AV,and SEM 129

How an IDS Works 130

Basic Vocabulary 130

Classifier Failure Rates:Understanding the Base-Rate Fallacy 134

Applying Classification 136

Improving IDS Performance 138

Enhancing IDS Detection 138

Enhancing IDS Response 143

Prefetching Data 144

Further Reading 145

8.Reference and Lookup:Tools for Figuring Out Who Someone Is 147

MAC and Hardware Addresses 147

IP Addressing 150

IPv4 Addresses,Their Structure,and Significant Addresses 150

IPv6 Addresses,Their Structure and Significant Addresses 152

Checking Connectivity:Using ping to Connect to an Address 153

Tracerouting 155

IP Intelligence:Geolocation and Demographics 157

DNS 158

DNS Name Structure 158

Forward DNS Querying Using dig 159

The DNS Reverse Lookup 167

Using whois to Find Ownership 168

Additional Reference Tools 171

DNSBLs 171

9.More Tools 175

Visualization 175

Graphviz 175

Communications and Probing 178

netcat 179

nmap 180

Scapy 181

Packet Inspection and Reference 184

Wireshark 184

GeoIP 185

The NVD,Malware Sites,and the C*Es 186

Search Engines,Mailing Lists,and People 187

Further Reading 188

Part Ⅲ.Analytics 191

10.Exploratory Data Analysis and Visualization 191

The Goal of EDA:Applying Analysis 193

EDA Workflow 194

Variables and Visualization 196

Univariate Visualization:Histograms,QQ Plots,Boxplots,and Rank Plots 197

Histograms 198

Bar Plots(Not Pie Charts) 200

The Quantile-Quantille(QQ)Plot 201

The Five-Number Summary and the Boxplot 203

Generating a Boxplot 204

Bivariate Description 207

Scatterplots 207

Contingency Tables 210

Multivariate Visualization 211

Operationalizing Security Visualization 213

Further Reading 220

11.On Fumbling 221

Attack Models 221

Fumbling:Misconfiguration,Automation,and Scanning 224

Lookup Failures 224

Automation 225

Scanning 225

Identifying Fumbling 226

TCP Fumbling:The State Machine 226

ICMP Messages and Fumbling 229

Identifying UDP Fumbling 231

Fumbling at the Service Level 231

HTTP Fumbling 231

SMTP Fumbling 233

Analyzing Fumbling 233

Building Fumbling Alarms 234

Forensic Analysis of Fumbling 235

Engineering a Network to Take Advantage of Fumbling 236

Further Reading 236

12.Volume and Time Analysis 237

The Workday and Its Impact on Network Traffic Volume 237

Beaconing 240

File Transfers/Raiding 243

Locality 246

DDoS,Flash Crowds,and Resource Exhaustion 249

DDoS and Routing Infrastructure 250

Applying Volume and Locality Analysis 256

Data Selection 256

Using Volume as an Alarm 258

Using Beaconing as an Alarm 259

Using Locality as an Alarm 259

Engineering Solutions 260

Further Reading 260

13.Graph Analysis 261

Graph Attributes:What Is a Graph? 261

Labeling,Weight,and Paths 265

Components and Connectivity 270

Clustering Coefficient 271

Analyzing Graphs 273

Using Component Analysis as an Alarm 273

Using Centrality Analysis for Forensics 275

Using Breadth-First Searches Forensically 275

Using Centrality Analysis for Engineering 277

Further Reading 277

14.Application Identification 279

Mechanisms for Application Identification 279

Port Number 280

Application Identification by Banner Grabbing 283

Application Identification by Behavior 286

Application Identification by Subsidiary Site 290

Application Banners:Identifying and Classifying 291

Non-Web Banners 291

Web Client Banners:The User-Agent String 292

Further Reading 294

15.Network Mapping 295

Creating an Initial Network Inventory and Map 295

Creating an Inventory:Data,Coverage,and Files 296

Phase Ⅰ:The First Three Questions 297

Phase Ⅱ:Examining the IP Space 300

Phase Ⅲ:Identifying Blind and Confusing Traffic 305

Phase Ⅳ:Identifying Clients and Servers 309

Identifying Sensing and Blocking Infrastructure 311

Updating the Inventory:Toward Continuous Audit 311

Further Reading 312

Index 313

购买PDF格式(11分)
返回顶部