An intro to Network Security Monitoring
#1

An intro to Network Security Monitoring

[attachment=18105]

There are three key components to any NSM installation:
1. Collection of data, performed by products
2. Analysis of data, performed by people
3. Escalation of events, guided by process.
Data is collected by products rather than people, because the sheer volume of traffic flowing across a network warrants automated collection. Though products are rarely, if ever, capable of full analysis, they can assist an analyst by creating alerts. At that point, the human analyst must take over to assess the reason for the alert. The final stage, escalation, involves highlighting an event to a decision maker – somebody with the authority, responsibility and capability to act.
In practise, an NSM system is usually built around an Intrusion Detection System (IDS) like Snort, which monitors network traffic and compares it to a series of signatures. When these signatures (or rules) are matched, an alert is generated. In order to diagnose the alert, which could be an indication of an attack, or could be authorised activity, an Intrusion Analyst requires additional sources of data. NSM systems therefore usually complement the IDS with enrichment data from others tools. These can include session statistics data from tools like SanCP (Security Analyst Network Connection Profiler) or even full packet captures.
The analyst then spends time forensically combing over the available data and assesses the reason for the alert – usually on a sliding scale from authorised behaviour to successful attack. Tools like Sguil, provide complex user interfaces allowing analysts to view, analyse and escalate their events to management from a single place. Later this week we’ll be reviewing a second NSM framework, Snorby.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intro about insurance system tracking manager project, fresher intro speech in punjabi, intro of claim processing system for vehicles, stanford sophomore intro, intro for freshers party, intro engineering little, compering script for intro of tamil kavithai,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  PC BASED SUBSTATION MONITORING AND CONTROLLING USING RF seminar details 4 7,121 17-09-2016, 12:58 PM
Last Post: Guest
  Wireless LAN Security FULL REPORT seminar details 3 5,130 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Radio frequency based real time Child Monitoring and alarm system simple details seminar addict 1 2,002 06-09-2014, 06:45 PM
Last Post: Guest
  virtual network computing seminar addict 1 1,366 12-12-2012, 02:07 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,964 14-11-2012, 12:29 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,312 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,662 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,363 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,706 08-10-2012, 03:08 PM
Last Post: seminar details

Forum Jump: