- Hands-On Network Forensics
- Nipun Jaswal
- 60字
- 2021-06-24 16:04:17
IDS/IPS logs
From a forensic standpoint, intrusion detection/prevention system logs are the most helpful. IDS/IDPS logs provide not only the IP address, but also the matched signatures, on-going attacks, malware presence, command-and-control servers, the IP and port for the source and destination systems, a timeline, and much more. We will cover IDS/IPS scenarios in the latter half of this book.
推薦閱讀
- 黑客攻防技巧
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 計(jì)算機(jī)使用安全與防護(hù)
- 黑客攻防入門秘笈
- 工業(yè)物聯(lián)網(wǎng)安全
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)研究
- 學(xué)電腦安全與病毒防范
- 情報(bào)驅(qū)動(dòng)應(yīng)急響應(yīng)
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 網(wǎng)絡(luò)空間安全法律問題研究
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測(cè)與響應(yīng)
- 網(wǎng)絡(luò)入侵檢測(cè)系統(tǒng)原理與應(yīng)用
- 密碼朋克:自由與互聯(lián)網(wǎng)的未來
- 2010年中國互聯(lián)網(wǎng)網(wǎng)絡(luò)安全報(bào)告