An intro to Network Security Monitoring
#1

An intro to Network Security Monitoring

[attachment=18105]

There are three key components to any NSM installation:
1. Collection of data, performed by products
2. Analysis of data, performed by people
3. Escalation of events, guided by process.
Data is collected by products rather than people, because the sheer volume of traffic flowing across a network warrants automated collection. Though products are rarely, if ever, capable of full analysis, they can assist an analyst by creating alerts. At that point, the human analyst must take over to assess the reason for the alert. The final stage, escalation, involves highlighting an event to a decision maker – somebody with the authority, responsibility and capability to act.
In practise, an NSM system is usually built around an Intrusion Detection System (IDS) like Snort, which monitors network traffic and compares it to a series of signatures. When these signatures (or rules) are matched, an alert is generated. In order to diagnose the alert, which could be an indication of an attack, or could be authorised activity, an Intrusion Analyst requires additional sources of data. NSM systems therefore usually complement the IDS with enrichment data from others tools. These can include session statistics data from tools like SanCP (Security Analyst Network Connection Profiler) or even full packet captures.
The analyst then spends time forensically combing over the available data and assesses the reason for the alert – usually on a sliding scale from authorised behaviour to successful attack. Tools like Sguil, provide complex user interfaces allowing analysts to view, analyse and escalate their events to management from a single place. Later this week we’ll be reviewing a second NSM framework, Snorby.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intro to hvac systems ppt presentations, network security monitoring, intro on shoe store billing management system, intro about insurance system tracking manager project, compering script for intro of tamil kavithai, uf intro to, intro to cryptography,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  PC BASED SUBSTATION MONITORING AND CONTROLLING USING RF seminar details 4 7,147 17-09-2016, 12:58 PM
Last Post: Guest
  Wireless LAN Security FULL REPORT seminar details 3 5,141 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Radio frequency based real time Child Monitoring and alarm system simple details seminar addict 1 2,020 06-09-2014, 06:45 PM
Last Post: Guest
  virtual network computing seminar addict 1 1,373 12-12-2012, 02:07 PM
Last Post: seminar details
  GSM Based Home Security System details seminar paper 1 1,975 14-11-2012, 12:29 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,319 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,671 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  DESIGN AND IMPLEMENTATION OF LASER BASED HOME SECURITY SYSTEM seminar addict 1 2,378 22-10-2012, 02:29 PM
Last Post: seminar details
  BLUETOOTH SECURITY ppt seminar paper 1 2,719 08-10-2012, 03:08 PM
Last Post: seminar details

Forum Jump: