Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • darknet

    A darknet is a routed allocation of IP address space that is not discoverable by any usual means. 

  • Metasploit Project - Metasploit Framework

    The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. 

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of packet filtering that functions at the Application layer of the OSI (Open Systems Interconnection) reference model... (Continued) 

  • netstat

    Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems... (Continued) 

  • firewall

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. 

  • port mirroring (roving analysis port)

    Port mirroring, also known as a roving analysis port, is a method of monitoring network traffic that forwards a copy of each incoming and outgoing packet from one port of a network switch to another port where the packet can be studied. 

  • FCAPS (fault-management, configuration, accounting, performance, and security)

    FCAPS (fault-management, configuration, accounting, performance, and security) is an acronym for a categorical model of the working objectives of network management. 

  • Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. 

  • blended threat

    A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.   

About Network Security Monitoring and Analysis

Network traffic analysis and monitoring tools can detect threats and vulnerabilities in your enterprise network. This section explains how to monitor and analyze the security of all networks, and provides information on how penetration testing and ethical hacking methods can better secure corporate data.