Security and Network Forensics

In this chapter, we will cover the following recipes:

  • Discovering unusual traffic patterns
  • Discovering MAC-based and ARP-based attacks
  • Discovering ICMP and TCP SYN/port scans
  • Discovering DoS and DDoS attacks
  • Locating smart TCP attacks
  • Discovering brute force and application attacks
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.225.57.126