- Hands-On Network Forensics
- Nipun Jaswal
- 60字
- 2021-06-24 16:04:17
IDS/IPS logs
From a forensic standpoint, intrusion detection/prevention system logs are the most helpful. IDS/IDPS logs provide not only the IP address, but also the matched signatures, on-going attacks, malware presence, command-and-control servers, the IP and port for the source and destination systems, a timeline, and much more. We will cover IDS/IPS scenarios in the latter half of this book.
推薦閱讀
- CTF實戰(zhàn):技術(shù)、解題與進階
- 科技安全:戰(zhàn)略實踐與展望
- Learning Python for Forensics
- 可信計算3.0工程初步
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 信息安全等級保護測評與整改指導(dǎo)手冊
- End to End GUI Development with Qt5
- 網(wǎng)絡(luò)安全大數(shù)據(jù)分析與實戰(zhàn)
- Learning Pentesting for Android Devices
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 云計算安全防護技術(shù)
- 黑客攻擊與防范實戰(zhàn)從入門到精通
- 信息內(nèi)容安全管理及應(yīng)用