Useful Links
Computer Science
Computer Networking
Network Analysis
1. Introduction to Network Analysis
2. Foundational Networking Concepts
3. Network Traffic Capture
4. Tools for Network Analysis
5. The Analysis Process
6. Analyzing Network Protocols
7. Practical Application: Troubleshooting
8. Practical Application: Performance Optimization
9. Practical Application: Security Analysis
10. Advanced Topics in Network Analysis
Tools for Network Analysis
Packet Sniffers and Protocol Analyzers
Wireshark
Features and Capabilities
Protocol Support
Filtering Options
Statistical Analysis
Export Capabilities
User Interface Overview
Packet List Pane
Packet Details Pane
Packet Bytes Pane
Menu and Toolbar Options
Advanced Features
Coloring Rules
Time Display Formats
Name Resolution
Expert System
tcpdump and WinDump
Command-line Usage
Basic Syntax
Output Formats
File Operations
Common Options and Filters
Interface Selection
Packet Count Limits
Time-based Capture
Protocol Filtering
Advanced Filtering
Berkeley Packet Filter Syntax
Logical Operators
Field-specific Filters
TShark
Command-line Interface
Basic Operations
Output Customization
Batch Processing
Scripting and Automation
Shell Script Integration
Automated Analysis
Report Generation
Flow Analysis Tools
NetFlow
Flow Exporters and Collectors
Router Configuration
Flow Record Format
Export Protocols
NetFlow Versions
NetFlow v5
NetFlow v9
Flexible NetFlow
sFlow
Sampling Techniques
Packet Sampling
Counter Sampling
Sampling Rates
sFlow Architecture
sFlow Agents
sFlow Collectors
sFlow Analyzers
J-Flow
Juniper Implementation
Configuration Options
Template Management
Export Destinations
IPFIX
Flexible Flow Export
Information Elements
Template Records
Data Records
IPFIX Architecture
Exporting Process
Collecting Process
Mediator Functions
Flow Analysis Software
Commercial Solutions
SolarWinds NTA
ManageEngine NetFlow Analyzer
Plixer Scrutinizer
Open Source Solutions
nfcapd and nfdump
SiLK
ntopng
Network Performance Monitoring Tools
Real-time Monitoring
Live Dashboard Views
Threshold-based Alerting
Performance Metrics
Historical Data Analysis
Trend Analysis
Capacity Planning
Performance Baselines
Alerting and Reporting
Notification Systems
Custom Reports
Executive Dashboards
Security-Focused Tools
Intrusion Detection Systems
Signature-based Detection
Rule Management
Signature Updates
False Positive Reduction
Anomaly-based Detection
Behavioral Analysis
Machine Learning
Statistical Methods
Network-based IDS
Sensor Placement
Traffic Analysis
Alert Generation
Host-based IDS
Log Analysis
File Integrity Monitoring
System Call Monitoring
Intrusion Prevention Systems
Inline Protection
Traffic Blocking
Active Response
Performance Impact
IPS Deployment Models
Bridge Mode
Router Mode
Hybrid Deployments
Security Information and Event Management
Log Aggregation
Log Collection
Log Normalization
Log Storage
Correlation and Analysis
Event Correlation Rules
Threat Intelligence Integration
Risk Scoring
Previous
3. Network Traffic Capture
Go to top
Next
5. The Analysis Process