
Mastering Network Flow Traffic Analysis
Implementing and analyzing flow data across network topologies for threat detection (English Edition)
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Mastering Network Flow Traffic Analysis
Implementing and analyzing flow data across network topologies for threat detection (English Edition)
About this book
Description
The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, privacy, ease of implementation, and effectiveness, is already playing a key role in the field of network security.Starting from network infrastructures, going through protocol implementations and their configuration on the most widely deployed devices on the market, the book will show you how to take advantage of network traffic flows by storing them on Elastic solutions to OLAP databases, by creating advanced reports, and by showing how to develop monitoring systems.CISOs, CIOs, network engineers, SOC analysts, secure DevOps, and other people eager to learn, will get sensitive skills and the knowledge to improve the security of the networks they are in charge of, that go beyond the traditional packet filtering approach.
What you will learn
? Implement flow analysis across diverse network topologies, and identify blind spots.
? Enable flow export from virtualized (VMware, Proxmox) and server environments.
? Ingest and structure raw flow data within Elasticsearch and Clickhouse platforms.
? Analyze flow data using queries for patterns, anomalies, and threat detection.
? Understand and leverage the network flow matrix for security, capacity insights.
Who this book is for
This book is for network engineers, security analysts (SOC analysts, incident responders), network administrators, and secure DevOps professionals seeking to enhance their network security skills beyond traditional methods. A foundational understanding of network topologies, the OSI and TCP/IP models, basic network data capture concepts, and familiarity with Linux environments is recommended.
Table of Contents
1. Foundation of Network Flow Analysis
2. Fixed and Dynamic Length Flow Protocols
3. Network Topologies
4. Implementing Flow Export on Layer 2 Devices
5. Implementing Flow Export on Layer 3 Devices
6. Implementing Flow Export on Servers
7. Implementing Flow Export on Virtualization Platforms
8. Ingesting Data into Clickhouse and Elasticsearch
9. Flow Data Analysis: Exploring Data for Fun and Profit
10. Understanding the Flow Matrix
11. Firewall Rules Optimization Use Case
12. Simple Network Anomaly Detection System Based on Flow Data Analysis
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication Page
- About the Author
- About the Reviewer
- Acknowledgement
- Preface
- Table of Contents
- 1.âFoundation of Network Flow Analysis
- 2.âFixed and Dynamic Length Flow Protocols
- 3.âNetwork Topologies
- 4.âImplementing Flow Export on Layer 2 Devices
- 5.âImplementing Flow Export on Layer 3 Devices
- 6.âImplementing Flow Export on Servers
- 7.âImplementing Flow Export on Virtualization Platforms
- 8.âIngesting Data into Clickhouse and Elasticsearch
- 9.âFlow Data Analysis: Exploring Data for Fun and Profit
- 10.âUnderstanding the Flow Matrix
- 11.âFirewall Rules Optimization Use Case
- 12.âSimple Network Anomaly Detection System Based on Flow Data Analysis
- Index