SlideShare a Scribd company logo
Network Trace Analysis
Dmitry Vostokov
Software Diagnostics Services
Version 1.0
Facebook LinkedIn Twitter
Wireshark
Hark
 Listen (to) “Hark! There’s the big bombardment.”
 Speak in one’s ear; whisper
Shorter Oxford English Dictionary
Hark back (idiom)
 To return to a previous point, as in a narrative
http://www.thefreedictionary.com/hark
© 2013 Software Diagnostics Services
Prerequisites
 Interest in software diagnostics,
troubleshooting, debugging and
network trace analysis
 Experience in network trace analysis
using Wireshark or Network Monitor
© 2013 Software Diagnostics Services
Why?
 A common diagnostics language
 Network diagnostics as software
diagnostics
© 2013 Software Diagnostics Services
Software Diagnostics
A discipline studying abnormal
software structure and behavior in
software execution artifacts (such
as memory dumps, software and
network traces and logs) using
pattern-driven, systemic and
pattern-based analysis
methodologies.
© 2013 Software Diagnostics Services
Diagnostics Pattern
A common recurrent identifiable
problem together with a set of
recommendations and possible
solutions to apply in a specific
context.
© 2013 Software Diagnostics Services
Pattern Orientation
© 2013 Software Diagnostics Services
Pattern-driven
 Finding patterns in software artefacts
 Using checklists and pattern catalogs
Pattern-based
 Pattern catalog evolution
 Catalog packaging and delivery
Catalog Classification
 By abstraction
Meta-patterns
 By artifact type
Software Log* Memory Dump Network Trace*
 By story type
Problem Description Software Disruption UI Problem
 By intention
Malware
© 2013 Software Diagnostics Services
Traces and Logs
© 2013 Software Diagnostics Services
Trace and Log Patterns
© 2013 Software Diagnostics Services
Software Narrative
A temporal sequence of events
related to software execution.
© 2013 Software Diagnostics Services
Software Trace
© 2013 Software Diagnostics Services
 A sequence of formatted messages
 Arranged by time
 A narrative story
Network Trace
© 2013 Software Diagnostics Services
 A sequence of formatted packets as trace
messages
 Arranged by time
 A narrative story
Network Trace Analysis
© 2013 Software Diagnostics Services
Software Trace Analysis Patterns
Network Trace Analysis Patterns
Capture Tool Placing
 Sniffer placing
 Process Monitor placing
© 2013 Software Diagnostics Services
Trace Maps
 Network map
 Deployment architecture map
© 2013 Software Diagnostics Services
Name Resolution
 MAC -> IP and IP -> DNS
 PID -> process name
© 2013 Software Diagnostics Services
Trace Presentation
© 2013 Software Diagnostics Services
Full Trace (Story, Fable, Fabula)
Trace 1
(Plot,
Sujet)
Trace 2
(Plot,
Sujet)
Trace 3
(Plot,
Sujet)
Trace 4
(Plot,
Sujet)
Trace 5
(Plot,
Sujet)
Trace
Presentation
A
(Discourse)
Trace
Presentation
B
(Discourse)
Trace
Presentation
C
(Discourse)
Minimal Trace Graphs
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Pattern-Driven Analysis
© 2013 Software Diagnostics Services
Logs Checklists Patterns Action
Pattern-Based Analysis
© 2013 Software Diagnostics Services
Software Trace
New Pattern
Discovery
Pattern
Catalog
+
Usage
Pattern Classification
© 2013 Software Diagnostics Services
 Vocabulary
 Error
 Trace as a Whole
 Large Scale
 Activity
 Message
 Block
 Trace Set
Reference and Course
© 2013 Software Diagnostics Services
 Catalog from Software Diagnostics Library
Software Trace Analysis Patterns
 Free reference graphical slides
Accelerated-Windows-Software-Trace-Analysis-Public.pdf
 Training course*
Accelerated Windows Software Trace Analysis
* Available as a full color paperback book, PDF book, on SkillsSoft Books 24x7. Recording is available for all book formats
Selected Patterns
© 2013 Software Diagnostics Services
Master Trace
Normal network capture
© 2013 Software Diagnostics Services
Pattern Category
Trace Set
Message Current
Packets/s
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Time
# Src Dst Time Message
10.100
10.200
10.100
12.100
J1 > J2
Pattern Category
Trace as a Whole
Message Density
D1 > D2
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Pattern Category
Trace as a Whole
Characteristic Block
D1 < D2
L1 > L2
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Pattern Category
Large Scale
Example
© 2013 Software Diagnostics Services
Thread of Activity
© 2013 Software Diagnostics Services
Pattern Category
Activity
Time
# Src Dst Time Message
Time
# Src Dst Time Message
Adjoint Thread
Filtered by:
 Source
 Destination
 Protocol
 Message
 Expression
© 2013 Software Diagnostics Services
Pattern Category
Activity
Time
# Src Dst Time Message
Time
# Src Dst Time Message
No Activity
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
We messages from other servers but only see our own traffic
Pattern Category
Activity
Discontinuity
© 2013 Software Diagnostics Services
Pattern Category
Activity
Time
# Src Dst Time Message
Time
# Src Dst Time Message
Dialog
Conversation between 2 endpoints
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Significant Event
Time Reference feature in Wireshark
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Pattern Category
Message
Marked Messages
Marked Packets
feature in Wireshark
© 2013 Software Diagnostics Services
Annotated messages:
session initialization [+]
session tear-off [-]
port A activity [+]
port B activity [-]
protocol C used [-]
address D used [-]
[+] activity is present in a trace
[-] activity is undetected or not present
Pattern Category
Message
Partition
Connection initiation (Prologue) and
termination (Epilogue)
© 2013 Software Diagnostics Services
Tail
Epilogue
Head
Time
Prologue
Core
# Src Dst Time Message
Pattern Category
Trace as a Whole
Inter-Correlation
 Several packet sniffers at once
 Internal and external views
Process Monitor log + network trace
© 2013 Software Diagnostics Services
Pattern Category
Trace Set
Circular Trace
© 2013 Software Diagnostics Services
Pattern Category
Trace as a Whole
Time
# Src Dst Time Message
Problem
Repro
Split Trace
© 2013 Software Diagnostics Services
Pattern Category
Trace Set
Time
# Src Dst Time Message # PID TID Time Message # PID TID Time Message
Paratext
Info column in Wireshark
© 2013 Software Diagnostics Services
Frames
OSI, TCP/IP Layers
© 2013 Software Diagnostics Services
Time
# Src Dst Time Message
Pattern Category
Large Scale
Visibility Limit
Visibility window for sniffing
© 2013 Software Diagnostics Services
PC 1
PC 2
PC 3
sniffer
Pattern Category
Trace as a Whole
Incomplete History
 Packet loss
 Missing ACK
© 2013 Software Diagnostics Services
Possible New Patterns
 Full Trace (promiscuous mode)
 Embedded Message (PDU chain, protocol data
unit, packet)
 Ordered Message (TCP/IP sequence numbers)
 Illegal Message (sniffed with illegally obtained
privileges)
 Dual Trace (in / out, duplex)
© 2013 Software Diagnostics Services
Further Reading
 Practical Packet Analysis, 2nd edition, by Chris Sanders
 Software Diagnostics Institute
 Memory Dump Analysis Anthology: Volumes 3, 4, 5, 6, …
Volume 7 is in preparation (July, 2013)
 Introduction to Software Narratology
 Malware Narratives
© 2013 Software Diagnostics Services
What’s Next?
© 2013 Software Diagnostics Services
 Accelerated Network Trace Analysis
 Generative Software Narratology
 Pattern-Oriented Hardware Signal Analysis
Q&A
Please send your feedback using the contact
form on DumpAnalysis.com
© 2013 Software Diagnostics Services
Thank you for attendance!
© 2013 Software Diagnostics Services
Facebook LinkedIn Twitter

More Related Content

PDF
sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
PDF
State of the art parallel approaches for
 
PDF
Survey of Different DNA Cryptography based Algorithms
PDF
Signpost at FOCI 2013
PDF
Network Forensics: Packet Analysis Using Wireshark
PDF
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
 
PDF
G43053847
PDF
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...
sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
State of the art parallel approaches for
 
Survey of Different DNA Cryptography based Algorithms
Signpost at FOCI 2013
Network Forensics: Packet Analysis Using Wireshark
Java Abs Scalable Wireless Ad Hoc Network Simulation Using
 
G43053847
Performance evaluation of Hard and Soft Wimax by using PGP and PKM protocols ...

What's hot (19)

PDF
IRJET- Data Security in Network Flow using Obfuscation Technique
PPT
Nwc rsa
PDF
(130511) #fitalk network forensics and its role and scope
PDF
An4101227230
PDF
IRJET- Estimating Various DHT Protocols
PDF
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
PDF
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
PDF
DoS Forensic Exemplar Comparison to a Known Sample
DOC
Detection of application layer ddos attack using hidden semi markov model (20...
PDF
BasepaperControlling IP Spoofing through Interdomain Packet Filters
DOC
Controlling ip spoofing through inter domain packet filters(synopsis)
PDF
An analysis of the skype peer to-peer
PDF
An experimental study of the skype peer to-peer vo ip system
PDF
An enhanced ip traceback mechanism for tracking the attack source using packe...
PDF
1670 1673
PDF
Ijnsa050211
PDF
Authentication in Different Scenarios
PDF
Content aware p2 p video streaming with lowlatency
PDF
Linguistic Passphrase Cracking
IRJET- Data Security in Network Flow using Obfuscation Technique
Nwc rsa
(130511) #fitalk network forensics and its role and scope
An4101227230
IRJET- Estimating Various DHT Protocols
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DoS Forensic Exemplar Comparison to a Known Sample
Detection of application layer ddos attack using hidden semi markov model (20...
BasepaperControlling IP Spoofing through Interdomain Packet Filters
Controlling ip spoofing through inter domain packet filters(synopsis)
An analysis of the skype peer to-peer
An experimental study of the skype peer to-peer vo ip system
An enhanced ip traceback mechanism for tracking the attack source using packe...
1670 1673
Ijnsa050211
Authentication in Different Scenarios
Content aware p2 p video streaming with lowlatency
Linguistic Passphrase Cracking
Ad

Similar to Pattern-Oriented Network Trace Analysis (20)

PDF
Malware Narratives
PDF
Accelerated Windows Software Trace Analysis training public slides
PDF
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
PDF
Interruption Timer Périodique
PDF
dtrace_topics_intro.pdf
PPT
Network Scanning Phases and Supporting Tools
PPT
Network monotoring
PDF
Systemic Software Diagnostics
PDF
Software Trace and Memory Dump Analysis: Patterns, Tools, Processes and Best ...
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
PDF
Code Tracing with Zend Server 5: A Flight Recorder for your PHP Applications!
PPTX
Wireshark, Tcpdump and Network Performance tools
PPTX
Designing Tracing Tools
PPT
Types of NETWORK RECONNAISSANCE with its Cases.ppt
PDF
Designing Tracing Tools
PDF
Lisa12 methodologies
PDF
A22 Introduction to DTrace by Kyle Hailey
PDF
Debugging TV Frame 0x15
PDF
Network traffic analysis course
PDF
Pattern-Driven Software Diagnostics: An Introduction
Malware Narratives
Accelerated Windows Software Trace Analysis training public slides
IRJET- Comparative Study on Network Monitoring Tools of Nagios Versus Hyp...
Interruption Timer Périodique
dtrace_topics_intro.pdf
Network Scanning Phases and Supporting Tools
Network monotoring
Systemic Software Diagnostics
Software Trace and Memory Dump Analysis: Patterns, Tools, Processes and Best ...
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
Code Tracing with Zend Server 5: A Flight Recorder for your PHP Applications!
Wireshark, Tcpdump and Network Performance tools
Designing Tracing Tools
Types of NETWORK RECONNAISSANCE with its Cases.ppt
Designing Tracing Tools
Lisa12 methodologies
A22 Introduction to DTrace by Kyle Hailey
Debugging TV Frame 0x15
Network traffic analysis course
Pattern-Driven Software Diagnostics: An Introduction
Ad

More from Dmitry Vostokov (20)

PDF
Accelerated Windows Debugging 3 training public slides
PDF
Accelerated .NET Memory Dump Analysis training public slides
PDF
Debugging TV Frame 0x1C
PDF
Debugging TV Frame 0x1A
PDF
Debugging TV Frame 0x34
PDF
Debugging TV Frame 0x33
PDF
Debugging TV Frame 0x31
PDF
Debugging TV Frame 0x25
PDF
Debugging TV Frame 0x24
PDF
Debugging TV Frame 0x21
PDF
Debugging TV Frame 0x20
PDF
Debugging TV Frame 0x19
PDF
Debugging TV Frame 0x18
PDF
Debugging TV Frame 0x17
PDF
Debugging TV Frame 0x16
PDF
Debugging TV Frame 0x14
PDF
Debugging TV Frame 0x13
PDF
Debugging TV Frame 0x12
PDF
Debugging TV Frame 0x11
PDF
Debugging TV Frame 0x10
Accelerated Windows Debugging 3 training public slides
Accelerated .NET Memory Dump Analysis training public slides
Debugging TV Frame 0x1C
Debugging TV Frame 0x1A
Debugging TV Frame 0x34
Debugging TV Frame 0x33
Debugging TV Frame 0x31
Debugging TV Frame 0x25
Debugging TV Frame 0x24
Debugging TV Frame 0x21
Debugging TV Frame 0x20
Debugging TV Frame 0x19
Debugging TV Frame 0x18
Debugging TV Frame 0x17
Debugging TV Frame 0x16
Debugging TV Frame 0x14
Debugging TV Frame 0x13
Debugging TV Frame 0x12
Debugging TV Frame 0x11
Debugging TV Frame 0x10

Recently uploaded (20)

PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
L1 - Introduction to python Backend.pptx
PDF
Understanding Forklifts - TECH EHS Solution
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Transform Your Business with a Software ERP System
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
System and Network Administraation Chapter 3
iTop VPN Free 5.6.0.5262 Crack latest version 2025
L1 - Introduction to python Backend.pptx
Understanding Forklifts - TECH EHS Solution
Operating system designcfffgfgggggggvggggggggg
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Transform Your Business with a Software ERP System
Reimagine Home Health with the Power of Agentic AI​
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Digital Systems & Binary Numbers (comprehensive )
Computer Software and OS of computer science of grade 11.pptx
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
 
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Which alternative to Crystal Reports is best for small or large businesses.pdf
Softaken Excel to vCard Converter Software.pdf
Upgrade and Innovation Strategies for SAP ERP Customers
Design an Analysis of Algorithms I-SECS-1021-03
Why Generative AI is the Future of Content, Code & Creativity?
wealthsignaloriginal-com-DS-text-... (1).pdf
Design an Analysis of Algorithms II-SECS-1021-03
System and Network Administraation Chapter 3

Pattern-Oriented Network Trace Analysis

  • 1. Network Trace Analysis Dmitry Vostokov Software Diagnostics Services Version 1.0 Facebook LinkedIn Twitter
  • 2. Wireshark Hark  Listen (to) “Hark! There’s the big bombardment.”  Speak in one’s ear; whisper Shorter Oxford English Dictionary Hark back (idiom)  To return to a previous point, as in a narrative http://www.thefreedictionary.com/hark © 2013 Software Diagnostics Services
  • 3. Prerequisites  Interest in software diagnostics, troubleshooting, debugging and network trace analysis  Experience in network trace analysis using Wireshark or Network Monitor © 2013 Software Diagnostics Services
  • 4. Why?  A common diagnostics language  Network diagnostics as software diagnostics © 2013 Software Diagnostics Services
  • 5. Software Diagnostics A discipline studying abnormal software structure and behavior in software execution artifacts (such as memory dumps, software and network traces and logs) using pattern-driven, systemic and pattern-based analysis methodologies. © 2013 Software Diagnostics Services
  • 6. Diagnostics Pattern A common recurrent identifiable problem together with a set of recommendations and possible solutions to apply in a specific context. © 2013 Software Diagnostics Services
  • 7. Pattern Orientation © 2013 Software Diagnostics Services Pattern-driven  Finding patterns in software artefacts  Using checklists and pattern catalogs Pattern-based  Pattern catalog evolution  Catalog packaging and delivery
  • 8. Catalog Classification  By abstraction Meta-patterns  By artifact type Software Log* Memory Dump Network Trace*  By story type Problem Description Software Disruption UI Problem  By intention Malware © 2013 Software Diagnostics Services
  • 9. Traces and Logs © 2013 Software Diagnostics Services
  • 10. Trace and Log Patterns © 2013 Software Diagnostics Services
  • 11. Software Narrative A temporal sequence of events related to software execution. © 2013 Software Diagnostics Services
  • 12. Software Trace © 2013 Software Diagnostics Services  A sequence of formatted messages  Arranged by time  A narrative story
  • 13. Network Trace © 2013 Software Diagnostics Services  A sequence of formatted packets as trace messages  Arranged by time  A narrative story
  • 14. Network Trace Analysis © 2013 Software Diagnostics Services Software Trace Analysis Patterns Network Trace Analysis Patterns
  • 15. Capture Tool Placing  Sniffer placing  Process Monitor placing © 2013 Software Diagnostics Services
  • 16. Trace Maps  Network map  Deployment architecture map © 2013 Software Diagnostics Services
  • 17. Name Resolution  MAC -> IP and IP -> DNS  PID -> process name © 2013 Software Diagnostics Services
  • 18. Trace Presentation © 2013 Software Diagnostics Services Full Trace (Story, Fable, Fabula) Trace 1 (Plot, Sujet) Trace 2 (Plot, Sujet) Trace 3 (Plot, Sujet) Trace 4 (Plot, Sujet) Trace 5 (Plot, Sujet) Trace Presentation A (Discourse) Trace Presentation B (Discourse) Trace Presentation C (Discourse)
  • 19. Minimal Trace Graphs © 2013 Software Diagnostics Services Time # Src Dst Time Message
  • 20. Pattern-Driven Analysis © 2013 Software Diagnostics Services Logs Checklists Patterns Action
  • 21. Pattern-Based Analysis © 2013 Software Diagnostics Services Software Trace New Pattern Discovery Pattern Catalog + Usage
  • 22. Pattern Classification © 2013 Software Diagnostics Services  Vocabulary  Error  Trace as a Whole  Large Scale  Activity  Message  Block  Trace Set
  • 23. Reference and Course © 2013 Software Diagnostics Services  Catalog from Software Diagnostics Library Software Trace Analysis Patterns  Free reference graphical slides Accelerated-Windows-Software-Trace-Analysis-Public.pdf  Training course* Accelerated Windows Software Trace Analysis * Available as a full color paperback book, PDF book, on SkillsSoft Books 24x7. Recording is available for all book formats
  • 24. Selected Patterns © 2013 Software Diagnostics Services
  • 25. Master Trace Normal network capture © 2013 Software Diagnostics Services Pattern Category Trace Set
  • 26. Message Current Packets/s © 2013 Software Diagnostics Services Time # Src Dst Time Message Time # Src Dst Time Message 10.100 10.200 10.100 12.100 J1 > J2 Pattern Category Trace as a Whole
  • 27. Message Density D1 > D2 © 2013 Software Diagnostics Services Time # Src Dst Time Message Pattern Category Trace as a Whole
  • 28. Characteristic Block D1 < D2 L1 > L2 © 2013 Software Diagnostics Services Time # Src Dst Time Message Pattern Category Large Scale
  • 29. Example © 2013 Software Diagnostics Services
  • 30. Thread of Activity © 2013 Software Diagnostics Services Pattern Category Activity Time # Src Dst Time Message Time # Src Dst Time Message
  • 31. Adjoint Thread Filtered by:  Source  Destination  Protocol  Message  Expression © 2013 Software Diagnostics Services Pattern Category Activity Time # Src Dst Time Message Time # Src Dst Time Message
  • 32. No Activity © 2013 Software Diagnostics Services Time # Src Dst Time Message We messages from other servers but only see our own traffic Pattern Category Activity
  • 33. Discontinuity © 2013 Software Diagnostics Services Pattern Category Activity Time # Src Dst Time Message Time # Src Dst Time Message
  • 34. Dialog Conversation between 2 endpoints © 2013 Software Diagnostics Services Time # Src Dst Time Message
  • 35. Significant Event Time Reference feature in Wireshark © 2013 Software Diagnostics Services Time # Src Dst Time Message Pattern Category Message
  • 36. Marked Messages Marked Packets feature in Wireshark © 2013 Software Diagnostics Services Annotated messages: session initialization [+] session tear-off [-] port A activity [+] port B activity [-] protocol C used [-] address D used [-] [+] activity is present in a trace [-] activity is undetected or not present Pattern Category Message
  • 37. Partition Connection initiation (Prologue) and termination (Epilogue) © 2013 Software Diagnostics Services Tail Epilogue Head Time Prologue Core # Src Dst Time Message Pattern Category Trace as a Whole
  • 38. Inter-Correlation  Several packet sniffers at once  Internal and external views Process Monitor log + network trace © 2013 Software Diagnostics Services Pattern Category Trace Set
  • 39. Circular Trace © 2013 Software Diagnostics Services Pattern Category Trace as a Whole Time # Src Dst Time Message Problem Repro
  • 40. Split Trace © 2013 Software Diagnostics Services Pattern Category Trace Set Time # Src Dst Time Message # PID TID Time Message # PID TID Time Message
  • 41. Paratext Info column in Wireshark © 2013 Software Diagnostics Services
  • 42. Frames OSI, TCP/IP Layers © 2013 Software Diagnostics Services Time # Src Dst Time Message Pattern Category Large Scale
  • 43. Visibility Limit Visibility window for sniffing © 2013 Software Diagnostics Services PC 1 PC 2 PC 3 sniffer Pattern Category Trace as a Whole
  • 44. Incomplete History  Packet loss  Missing ACK © 2013 Software Diagnostics Services
  • 45. Possible New Patterns  Full Trace (promiscuous mode)  Embedded Message (PDU chain, protocol data unit, packet)  Ordered Message (TCP/IP sequence numbers)  Illegal Message (sniffed with illegally obtained privileges)  Dual Trace (in / out, duplex) © 2013 Software Diagnostics Services
  • 46. Further Reading  Practical Packet Analysis, 2nd edition, by Chris Sanders  Software Diagnostics Institute  Memory Dump Analysis Anthology: Volumes 3, 4, 5, 6, … Volume 7 is in preparation (July, 2013)  Introduction to Software Narratology  Malware Narratives © 2013 Software Diagnostics Services
  • 47. What’s Next? © 2013 Software Diagnostics Services  Accelerated Network Trace Analysis  Generative Software Narratology  Pattern-Oriented Hardware Signal Analysis
  • 48. Q&A Please send your feedback using the contact form on DumpAnalysis.com © 2013 Software Diagnostics Services
  • 49. Thank you for attendance! © 2013 Software Diagnostics Services Facebook LinkedIn Twitter