Analyzing DNS Traffic for Malicious Activity Using Open Source Logging Tools
Offered By: YouTube
Course Description
Overview
Explore DNS traffic analysis for malicious activity using open-source logging tools in this 33-minute conference talk from Nolacon 2016. Learn about the basics of DNS monitoring, the Tabasco story, and simple solutions to common problems. Discover various tools, including expensive options and their support levels, as well as common denominators in log processing, indexing, formatting, and shipping. Gain insights into Gray Log, Elastic Search, and DNS amplification. Examine dashboards for data visualization and understand techniques for detecting data exfiltration through DNS traffic.
Syllabus
Introduction
Agenda
The Basics
Tabasco Story
Simple Solution
The Problem
Other Tools
Expensive Tools
Support Levels
Common denominators
Log processing
Log indexing
Log formatting
Log shipping
Log input
Gray Log Sidegar
What is Gray Log
Gray Log 2 Archive
Elastic Search
DNS Amplification
Dashboards
Data Exfiltration
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network