Shedding Light on Security Incidents Using Network Flows

Knowing which hosts are involved in a security incident is vital information to any incident handler. The faster the attackers and their targets can be identified, the quicker the incident can be contained.
By
Kevin Gennuso
May 16, 2012

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg