Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring

Research output: Contribution to conferencePresentation

Abstract

Network monitoring and network traffic analysis software are common tools used in an enterprise, giving IT administrators valuable insight into the status of their servers and network devices. Limited research has been done to highlight the security benefits of low-level network traffic logging and analysis, though much of it involves testing the network activity of malicious software in lab environments, using cost-prohibitive software to analyze traffic for a pre-determined amount of time. This is a useful way to isolate network activity to only the malicious software, but it also eliminates valuable baseline traffic information for an enterprise network. There are significant security benefits to be gained from analyzing how malware reacts in – or alters – an enterprise network. This paper provides techniques for getting a baseline of enterprise network traffic and analyzes how different types of malware can affect this baseline. Using only low- and no-cost software and services, we analyze the storage requirements for historical network traffic data and present techniques to filter out much of the noise, significantly reducing the amount of data that must be stored and analyzed. The results of our technique are compared against traditional antimalware and network traffic analysis methods, revealing our approach to be a cost-effective, highly customizable and effective layer of a complete defense-in-depth security strategy.

Original languageAmerican English
StatePublished - Jul 14 2017
EventEAI International Conference on Mobile Multimedia Communications (MOBIMEDIA) -
Duration: Jul 14 2017 → …

Conference

ConferenceEAI International Conference on Mobile Multimedia Communications (MOBIMEDIA)
Period07/14/17 → …

Keywords

  • Cost-effective
  • Enterprise security
  • Highly customizable
  • Network monitoring

Fingerprint

Dive into the research topics of 'Enhancing Enterprise Security through Cost-Effective and Highly Customizable Network Monitoring'. Together they form a unique fingerprint.

Cite this