| ||||||||||||
| |||||
Part Three covers the ongoing tasks involved with collecting, deciphering, and understanding the information gathered from your honeypot. Chapter 9 covers network traffic analysis, using Snort and Ethereal as examples. Chapter 10 discusses the many different ways you can monitor real or emulated honeypots. Chapter 11 explains how to translate all the information you have collected into useful data. Chapter 12 ends the book by covering various advanced honeypot topics, such as antispam firewalls and honeytokens.
| |||||