Mastering Network Flow Traffic Analysis: Implementing and analyzing flow data across network topologies for threat detection
Par :Formats :
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub protégé est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
- Non compatible avec un achat hors France métropolitaine

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-93-6589-386-1
- EAN9789365893861
- Date de parution05/06/2025
- Protection num.Adobe DRM
- Infos supplémentairesepub
- ÉditeurBPB Publications
Résumé
DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security.
Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.
WHAT YOU WILL LEARN? Implement flow analysis across diverse network topologies, and identify blind spots.? Enable flow export from virtualized (VMware, Proxmox) and server environments.? Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.? Analyze flow data using queries for patterns, anomalies, and threat detection.? Understand and leverage the network flow matrix for security, capacity insights.
WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.
Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.
WHAT YOU WILL LEARN? Implement flow analysis across diverse network topologies, and identify blind spots.? Enable flow export from virtualized (VMware, Proxmox) and server environments.? Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.? Analyze flow data using queries for patterns, anomalies, and threat detection.? Understand and leverage the network flow matrix for security, capacity insights.
WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.
DESCRIPTION The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security.
Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.
WHAT YOU WILL LEARN? Implement flow analysis across diverse network topologies, and identify blind spots.? Enable flow export from virtualized (VMware, Proxmox) and server environments.? Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.? Analyze flow data using queries for patterns, anomalies, and threat detection.? Understand and leverage the network flow matrix for security, capacity insights.
WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.
Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems. CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.
WHAT YOU WILL LEARN? Implement flow analysis across diverse network topologies, and identify blind spots.? Enable flow export from virtualized (VMware, Proxmox) and server environments.? Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.? Analyze flow data using queries for patterns, anomalies, and threat detection.? Understand and leverage the network flow matrix for security, capacity insights.
WHO THIS BOOK IS FORThis book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.