Cargando…
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to att...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1314945 |
_version_ | 1780921314682339328 |
---|---|
author | Liu, Dale Varsalone, Jesse |
author_facet | Liu, Dale Varsalone, Jesse |
author_sort | Liu, Dale |
collection | CERN |
description | Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current |
id | cern-1314945 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-13149452021-04-22T01:14:58Zhttp://cds.cern.ch/record/1314945engLiu, DaleVarsalone, JesseCisco Router and Switch Forensics: Investigating and Analyzing Malicious Network ActivityComputing and ComputersCisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book currentElsevieroai:cds.cern.ch:13149452009 |
spellingShingle | Computing and Computers Liu, Dale Varsalone, Jesse Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title_full | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title_fullStr | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title_full_unstemmed | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title_short | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
title_sort | cisco router and switch forensics: investigating and analyzing malicious network activity |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1314945 |
work_keys_str_mv | AT liudale ciscorouterandswitchforensicsinvestigatingandanalyzingmaliciousnetworkactivity AT varsalonejesse ciscorouterandswitchforensicsinvestigatingandanalyzingmaliciousnetworkactivity |