Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring
Contribution to Book
MOBIMEDIA 2017: Proceedings of the 10th EAI International Conference on Mobile Multimedia Communications
Network monitoring and network traffic analysis software are common tools used in an enterprise, giving IT administrators valuable insight into the status of their servers and network devices. Limited research has been done to highlight the security benefits of low-level network traffic logging and analysis, though much of it involves testing the network activity of malicious software in lab environments, using cost-prohibitive software to analyze traffic for a pre-determined amount of time. This is a useful way to isolate network activity to only the malicious software, but it also eliminates valuable baseline traffic information for an enterprise network. There are significant security benefits to be gained from analyzing how malware reacts in – or alters – an enterprise network. This paper provides techniques for getting a baseline of enterprise network traffic and analyzes how different types of malware can affect this baseline. Using only low- and no-cost software and services, we analyze the storage requirements for historical network traffic data and present techniques to filter out much of the noise, significantly reducing the amount of data that must be stored and analyzed. The results of our technique are compared against traditional antimalware and network traffic analysis methods, revealing our approach to be a cost-effective, highly customizable and effective layer of a complete defense-in-depth security strategy.
Regenold, Joshua, Kai Wang, Gary Smith, Quingzhong Liu, Lei Chen.
"Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring."
MOBIMEDIA 2017: Proceedings of the 10th EAI International Conference on Mobile Multimedia Communications: 133-142 Brussels, Belgium: Institute for Computer Sciences, Social-Informatics, and Telecommunications Engineering.
doi: 10.4108/eai.13-7-2017.2270274 source: https://eudl.eu/doi/10.4108/eai.13-7-2017.2270274 isbn: 978-1-63190-156-0