Security Data Visualization: Graphical Techniques For Network Analysis

Jan. 30, 2008
By Greg Conti
ISBN: 978-1-59327-143-5
Network security has operated in the realm of configuration files, pull-down menus, and traffic traces, making it arcane and tricky to tackle. In many instances, graphical presentation of information can highlight aspects that are not readily obvious using non-graphical presentation. This book takes a look at some of the available techniques and the different areas where graphical presentation can make a difference. Not surprisingly, the book is full of images highlighting these methodologies. The book starts with coverage of binary file visualization tools with a highlight on security. This is similar to the remaining sections that have a heavy bent on security. It takes a look at a number of tools including Nessus, an open source vulnerability assessment tool, and Metasploit, a tool for those performing penetration testing, IDS signature development, and exploit research. The book then presents tools for log file analysis. I like the fact that barely a stone is left unturned — even attacking and defending these visualization systems is addressed. That’s important, since they are often incorporated into a network’s protection system. Since this is a growing area, the last chapter addresses "Teaching Yourself," to enable readers to keep up with developments. The book is an excellent starting point, especially for those unfamiliar with the tools and problems. If you are dealing with networks at the programming or management level, then this book needs to be on your shelf.

Sponsored Recommendations

Board-Mount DC/DC Converters in Medical Applications

March 27, 2024
AC/DC or board-mount DC/DC converters provide power for medical devices. This article explains why isolation might be needed and which safety standards apply.

Use Rugged Multiband Antennas to Solve the Mobile Connectivity Challenge

March 27, 2024
Selecting and using antennas for mobile applications requires attention to electrical, mechanical, and environmental characteristics: TE modules can help.

Out-of-the-box Cellular and Wi-Fi connectivity with AWS IoT ExpressLink

March 27, 2024
This demo shows how to enroll LTE-M and Wi-Fi evaluation boards with AWS IoT Core, set up a Connected Health Solution as well as AWS AT commands and AWS IoT ExpressLink security...

How to Quickly Leverage Bluetooth AoA and AoD for Indoor Logistics Tracking

March 27, 2024
Real-time asset tracking is an important aspect of Industry 4.0. Various technologies are available for deploying Real-Time Location.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!