In this episode of Zeek in Action, Richard examines the four types of network security monitoring data: 1) full content data (“PCAP”), 2) transaction logs, 3) extracted content, and 4) intrusion detection systems (IDS) alerts. He uses the online tool Cloudshark to examine all four types and to compare and contrast the strengths and weaknesses of each.

If you would like to follow along, please check out our Zeek in Action playlist on the Zeek YouTube Channel.

If you would like to discuss the video, or consider creating one yourself, please visit the Zeek community Slack workspace and join the #documentation channel.

Discover more from Zeek

Subscribe now to keep reading and get access to the full archive.

Continue reading