SANS Institute - SiLK: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
SiLK is a toolkit for collecting, storing, and analyzing network flow data. Flow data includes information about the source and destination of traffic, the port numbers used, the amount of data Transferred, and other metadata. This data can be used to troubleshoot network security issues, locate Denial-of-service attacks, and identify potential malicious activity.=More Information= | <br> | ||
SiLK is a toolkit for collecting, storing, and analyzing network flow data. Flow data includes information about the source and destination of traffic, the port numbers used, the amount of data Transferred, and other metadata. This data can be used to troubleshoot network security issues, locate Denial-of-service attacks, and identify potential malicious activity. | |||
The SiLK toolkit is made up of several components: | |||
The flowcap tool is used to | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
https://tools.netsa.cert.org/silk/ | https://tools.netsa.cert.org/silk/ | ||
[[Category:Security Information & Event Management (SIEM)]] | [[Category:Security Information & Event Management (SIEM)]] |
Revision as of 05:05, 23 April 2024
Description
SiLK is a toolkit for collecting, storing, and analyzing network flow data. Flow data includes information about the source and destination of traffic, the port numbers used, the amount of data Transferred, and other metadata. This data can be used to troubleshoot network security issues, locate Denial-of-service attacks, and identify potential malicious activity.
The SiLK toolkit is made up of several components:
The flowcap tool is used to