Cargando…

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to att...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Dale, Varsalone, Jesse
Lenguaje:eng
Publicado: Elsevier 2009
Materias:
Acceso en línea:http://cds.cern.ch/record/1314945
_version_ 1780921314682339328
author Liu, Dale
Varsalone, Jesse
author_facet Liu, Dale
Varsalone, Jesse
author_sort Liu, Dale
collection CERN
description Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current
id cern-1314945
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher Elsevier
record_format invenio
spelling cern-13149452021-04-22T01:14:58Zhttp://cds.cern.ch/record/1314945engLiu, DaleVarsalone, JesseCisco Router and Switch Forensics: Investigating and Analyzing Malicious Network ActivityComputing and ComputersCisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currentElsevieroai:cds.cern.ch:13149452009
spellingShingle Computing and Computers
Liu, Dale
Varsalone, Jesse
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title_full Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title_fullStr Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title_full_unstemmed Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title_short Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
title_sort cisco router and switch forensics: investigating and analyzing malicious network activity
topic Computing and Computers
url http://cds.cern.ch/record/1314945
work_keys_str_mv AT liudale ciscorouterandswitchforensicsinvestigatingandanalyzingmaliciousnetworkactivity
AT varsalonejesse ciscorouterandswitchforensicsinvestigatingandanalyzingmaliciousnetworkactivity