Chapter 14. Understanding Network Security

In this chapter, we will cover the following recipes:

  • Discovering unusual traffic patterns
  • Discovering MAC- and ARP-based attacks
  • Discovering ICMP and TCP SYN/Port scans
  • Discovering DoS and DDoS attacks
  • Locating smart TCP attacks
  • Discovering brute-force and application attacks

Introduction

Information security is one of the fascinating areas in information systems, and its purpose is to secure the organization's systems against internal and external attacks that can come in various patterns. These attacks can come from the Internet or from the internal network, and as such, they all come through the network and therefore, can be monitored with Wireshark (and other tools that will be mentioned later).

For monitoring ...

Get Network Analysis Using Wireshark Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.