• Complain

Michael Collins - Network Security Through Data Analysis: From Data to Action

Here you can read online Michael Collins - Network Security Through Data Analysis: From Data to Action full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: O’Reilly Media, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Network Security Through Data Analysis: From Data to Action
  • Author:
  • Publisher:
    O’Reilly Media
  • Genre:
  • Year:
    2017
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Network Security Through Data Analysis: From Data to Action: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Network Security Through Data Analysis: From Data to Action" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Traditional intrusion detection and logfile analysis are no longer enough to protect todays complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. Youll understand how your network is used, and what actions are necessary to harden and defend the systems within it.

In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics.

Youll learn how to:

  • Use sensors to collect network, service, host, and active domain data
  • Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect
  • Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques
  • Analyze text data, traffic behavior, and communications mistakes
  • Identify significant structures in your network with graph analysis
  • Examine insider threat data and acquire threat intelligence
  • Map your network and identify significant hosts within it
  • Work with operations to develop defenses and analysis techniques

Michael Collins: author's other books


Who wrote Network Security Through Data Analysis: From Data to Action? Find out the surname, the name of the author of the book and a list of all author's works by series.

Network Security Through Data Analysis: From Data to Action — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Network Security Through Data Analysis: From Data to Action" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Praise for Network Security Through Data Analysis, Second Edition
Attackers generally know our technology better than we do, yet a defenders first reflex is usually to add more complexity, which just makes the understanding gap even wider we wont win many battles that way. Observation is the cornerstone of knowledge, so we must instrument and characterize our infrastructure if we hope to detect anomalies and predict attacks. This book shows how and explains why to observe that which we defend, and ought to be required reading for all SecOps teams.
Dr. Paul Vixie, CEO of Farsight Security
Michael Collins provides a comprehensive blueprint for where to look, what to look for, and how to process a diverse array of data to help defend your organization and detect/deter attackers. It is a must have for any data-driven cybersecurity program.
Bob Rudis, Chief Data Scientist, Rapid7
Combining practical experience, scientific discipline, and a solid understanding of both the technical and policy implications of security, this book is essential reading for all network operators and analysts. Anyone who needs to influence and support decision making, both for security operations and at a policy level, should read this.
Yurie Ito, Founder and Executive Director, CyberGreen Institute
Michael Collins brings together years of operational expertise and research experience to help network administrators and security analysts extract actionable signals amidst the noise in network logs. Collins does a great job of combining the theory of data analysis and the practice of applying it in security contexts using real-world scenarios and code.
Vyas Sekar, Associate Professor, Carnegie Mellon University/CyLab
Network Security Through Data Analysis

From Data to Action

Michael Collins

Network Security Through Data Analysis

by Michael Collins

Copyright 2017 Michael Collins. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 9547.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .

  • Editors: Courtney Allen and Virginia Wilson
  • Production Editor: Nicholas Adams
  • Copyeditor: Rachel Head
  • Proofreader: Kim Cofer
  • Indexer: WordCo Indexing Services, Inc.
  • Interior Designer: David Futato
  • Cover Designer: Karen Montgomery
  • Illustrator: Rebecca Demarest
  • February 2014: First Edition
  • September 2017: Second Edition
Revision History for the Second Edition
  • 2017-09-08: First Release

See http://oreilly.com/catalog/errata.csp?isbn=9781491962848 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Network Security Through Data Analysis, the cover image, and related trade dress are trademarks of OReilly Media, Inc.

While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-491-96284-8

[LSI]

Preface

This book is about networks: monitoring them, studying them, and usingthe results of those studies to improve them. Improve in thiscontext hopefully means to make more secure, but I dont believe wehave the vocabulary or knowledge to say that confidently at least notyet. In order to implement security, we must know what decisions wecan make to do so, which ones are most effective to apply, and theimpact that those decisions will have on our users. Underpinningthese decisions is a need for situational awareness.

Situational awareness, a term largely used in military circles, isexactly what it says on the tin: an understanding of the environmentyoure operating in. For our purposes, situational awarenessencompasses understanding the components that make up your network andhow those components are used. This awareness is often radicallydifferent from how the network is configured and how the network wasoriginally designed.

To understand the importance of situational awareness in informationsecurity, I want you to think about your home, and I want you to countthe number of web servers in your house. Did you include your wirelessrouter? Your cable modem? Your printer? Did you consider the webinterface to CUPS? How about your television set?

To many IT managers, several of the devices just listed wont have registered as web servers. However, most modern embedded devices havedropped specialized control protocols in favor of a web interface to an outside observer, theyre just web servers, with known web servervulnerabilities. Attackers will often hit embedded systems withoutrealizing what they are the SCADA system is a Windows server with acouple of funny additional directories, and the MRI machine is aperfectly serviceable spambot.

This was all an issue when I wrote the first edition of the book; atthe time, we discussed the risks of unpatched smart televisions andvulnerabilities in teleconferencing systems. Since that time, theInternet of Things (IoT) has become even more of a thing, with millions ofremotely accessible embedded devices using simple (and insecure) webinterfaces.

This book is about collecting data and looking at networks in order tounderstand how the network is used. The focus is on analysis, whichis the process of taking security data and using it to make actionabledecisions. I emphasize the word actionable here becauseeffectively, security decisions are restrictions on behavior.Security policy involves telling people what they shouldnt do (or,more onerously, telling people what they must do). Dont use apublic file sharing service to hold company data, dont use 123456as the password, and dont copy the entire project server and sell itto the competition. When we make security decisions, we interferewith how people work, and wed better have good, solid reasons fordoing so.

All security systems ultimately depend on users recognizing andaccepting the tradeoffs inconvenience in exchange for safety butthere are limits to both. Security rests on people: it rests on theindividual users of a system obeying the rules, and it rests onanalysts and monitors identifying when rules are broken. Security isonly marginally a technical problem information security involvesendlessly creative people figuring out new ways to abuse technology,and against this constantly changing threat profile, you needcooperation from both your defenders and your users. Bad securitypolicy will result in users increasingly evading detection in order toget their jobs done or just to blow off steam, and that addsadditional work for your defenders.

The emphasis on actionability and the goal of achieving security iswhat differentiates this book from a more general text on datascience. The section on analysis proper covers statisticaland data analysis techniques borrowed from multiple other disciplines,but the overall focus is on understanding the structure of a networkand the decisions that can be made to protect it. To that end, I have abridged the theory as much as possible, and have also focused onmechanisms for identifying abusive behavior. Security analysis hasthe unique problem that the targets of observation are not only awaretheyre being watched, but are actively interested in stopping it if atall possible.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Network Security Through Data Analysis: From Data to Action»

Look at similar books to Network Security Through Data Analysis: From Data to Action. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Network Security Through Data Analysis: From Data to Action»

Discussion, reviews of the book Network Security Through Data Analysis: From Data to Action and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.