
Security Onion Control ScriptsĪppendix 2. Friendly and Threat IntelligenceĪppendix 1. Using Canary Honeypots for DetectionĬhapter 14. Visualizing Statistics with Google ChartsĬhapter 12. Anomaly-Based Detection with Statistical Data Initializing Snort and Suricata for Intrusion DetectionĬhapter 11. Signature-Based Detection with Snort and Suricata Detection Mechanisms, Indicators of Compromise, and SignaturesĬhapter 9. The NSM Cycle: Collection, Detection, and AnalysisĬollecting and Analyzing Flow Data with SiLKĬollecting and Analyzing Flow Data with ArgusĬhapter 7. The Practice of Applied Network Security Monitoring Companion website includes up-to-date blogs from the authors about the latest developments in NSMĬhapter 1.Loaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examples.Provides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and Argus.Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. The book follows the three stages of the NSM cycle: collection, detection, and analysis.

At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. Network security monitoring is based on the principle that prevention eventually fails. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up.
