(1.?? Worm traffic analysis?? 11.1.?? Environment profile?? 11.2.?? Find the host that generates the most network traffic?? 11.3.?? Analyze the network traffic of these hosts?? 32.?? DOS attack traffic analysis?? 72.1.?? Introduction to environment and phenomena?? 72.2.?? Find the host that generates the most network traffic?? 82.3.?? Analyze the network traffic of this host?? 103.?? Routing ring traffic analysis?? 113.1.?? Environment profile?? 113.2.?? Find the host that generates the most network traffic?? 133.3.?? Analyze the network traffic of this host?? 13 this document contains the following annexes:
Sniffer case collection doc....)