Skip to Main Content
Digital Forensics for Network, Internet, and Cloud Computing
book

Digital Forensics for Network, Internet, and Cloud Computing

by Clint P Garrison
July 2010
Intermediate to advanced content levelIntermediate to advanced
368 pages
9h 36m
English
Syngress
Content preview from Digital Forensics for Network, Internet, and Cloud Computing
Chapter 5. Using Snort for Network-Based Forensics
This chapter, which comprises five sections, discusses the use of Snort as a network-based intrusion detection system (NIDS) during a network forensics investigation. It is a detective-technical security control, used by organizations' security teams and network forensics examiners to monitor network and/or system activities for malicious activities or security policy violations. The first section, “IDS Overview,” provides an overview of intrusion detection systems (IDSes), types of IDSes, and IDS Matrix. The second section, “Snort ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Network Forensics

Network Forensics

Ric Messier
Digital Forensics with Kali Linux - Second Edition

Digital Forensics with Kali Linux - Second Edition

Shiva V. N. Parasram, Alex Samm, Dale Joseph
Digital Forensics and Internet of Things

Digital Forensics and Internet of Things

Anita Gehlot, Rajesh Singh, Jaskaran Singh, Neeta Raj Sharma

Publisher Resources

ISBN: 9781597495387