Index

Numerics

2D surface plot graph, 375-376

3D traceroute graph, 374

802.11n, threats, 223

A

active recon/cracking

driver attacks, 219-220

MITM attacks, 220-221

NetStumbler, 217-218

replay/injection attacks, 219

WEP attacks, 218

ad-hoc activity, 217

ADA (Americans with Disabilities Act), 241

Address Resolution Protocol (ARP) spoofing, 40

addressing

IP addresses, 22-27

IPv6 addresses, 27-29

logical addresses, 22

overview, 21-22

physical addresses, 22

adjacent-layer interactions, 7-8

AfriNIC, 23

Alarm function, 79

Americans with Disabilities Act (ADA), 241

analysis of packets, 95-100

anomaly detection, 167-172

anomaly-based IDSs (Intrusion Detection Systems), 60

APNIC, 23

Application layer (OSI Model), 5

protocols, 11-12

Applied Security Visualization ...

Get Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.