Index
Numerics
2D surface plot graph, 375-376
3D traceroute graph, 374
802.11n, threats, 223
A
active recon/cracking
driver attacks, 219-220
MITM attacks, 220-221
NetStumbler, 217-218
replay/injection attacks, 219
WEP attacks, 218
ad-hoc activity, 217
ADA (Americans with Disabilities Act), 241
Address Resolution Protocol (ARP) spoofing, 40
addressing
IP addresses, 22-27
IPv6 addresses, 27-29
logical addresses, 22
overview, 21-22
physical addresses, 22
adjacent-layer interactions, 7-8
AfriNIC, 23
Alarm function, 79
Americans with Disabilities Act (ADA), 241
analysis of packets, 95-100
anomaly detection, 167-172
anomaly-based IDSs (Intrusion Detection Systems), 60
APNIC, 23
Application layer (OSI Model), 5
protocols, 11-12
Applied Security Visualization ...
Get Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.