Use visualization software to analyze your network traffic and identify security vulnerabilities
Source: No Starch Press
Security Data Visualization creates graphical windows into the world of computer security data, revealing fascinating and useful insights into networking, cryptography, and file structures. In this chapter download from the book, use various visualization techniques to analyze the complex and unpredictable, live Internet traffic collected from a home ISP connection. Work through slices of the traffic based on port and protocol until you have examined all the packets, using Wireshark when its strength can complement the weaknesses of RUMINT's visualization. Learn what network attacks look like and how to assess your network for vulnerabilities with visualization software.
Title: Security Data Visualization: Graphical Techniques for Network Analysis
Author: Greg Conti
Publisher: No Starch Press
Chapter 5: One Night on my ISP
ISBN: 1-59327-143-3; Copyright © 2007, No Starch Press. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from No Starch Press