Chapter 1

Introduction

Introducing Network Intrusion Analysis

When we first discussed writing this book our main question was, what is the goal of the book? We did not want it to be just another text book that someone could read and maybe understand. Our goal was to make it a learning guide. We wanted the reader to be able to follow along and work through the analysis as they read.

The book will provide the reader with an inside look at not only the analysis of a network intrusion but also the process of conducting the intrusion itself.

As the great Sun Tzu has stated:

So a military force has no constant formation, water has no constant shape: the ability to gain victory by changing and adapting according to the opponent is called genius.1

Get Network Intrusion Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.