Title: Packet analysis tools and methodology (Part 4)
Author: Don Parker
Summary: In the last part of this article series we will take a look at the alarms generated by myself. This binary log will include several attacks, and some general surfing. We now need to take a look, and separate the chaff from the wheat.
Link: http://www.WindowSecurity.com/articles/Packet-analysis-tools-methodology-Part4.html
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, September 27, 2005
WindowSecurity.com - Packet analysis tools and methodology (Part 4)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment