Electronic Design

Security Data Visualization: Graphical Techniques For Network Analysis

By Greg ContiISBN: 978-1-59327-143-5

Network security has been the realm of configuration files, pull down menus, and traffic traces that are wonderfully arcane and tricky to tackle. In many instances, graphical presentation of information can highlight aspects that are not readily obvious using non-graphical presentation. This book takes a look at some of the available techniques and the different areas where graphical presentation can make a difference. Not surprisingly, the book is full of images highlighting these methodologies. The book starts with coverage of binary-file visualization tools with a highlight on security. It takes a look at a number of tools including: Nessus, an open source vulnerability assessment tool; and Metasploit, a tool for those performing penetration testing, IDS signature development, and exploit research. Many sections include a heavy dose of security, but the book continues on to present tools for log-file analysis amongst other things. Conti leaves virtually no stone unturned—I like that. He even takes a look at attacking and defending these visualization systems, since they are often incorporated into a network’s protection system. This area is growing. The book provides and excellent starting point especially if you are unfamiliar with the tools and problems. The final chapter, “Teaching Yourself,” is an especially useful bit for those just catching on. If you are dealing with networks at a programming or management level then this book, thoroughly thumbed, needs to be on your shelf.

TAGS: Components
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.