Network Security Monitoring and Analysis

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Dynamic ARP Inspection (DAI)

    Dynamic ARP Inspection (DAI) is a security feature that verifies address resolution protocol (ARP) requests and responses in a network. 

  • port mirroring (roving analysis port)

    Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another. 

  • darknet

    A darknet is a routed allocation of IP address space that is not discoverable by any usual means. 

  • Metasploit Project - Metasploit Framework

    The Metasploit Project is an open source computer security project that provides a public resource for researching and developing exploit code. 

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of packet filtering that functions at the Application layer of the OSI (Open Systems Interconnection) reference model... (Continued) 

  • netstat

    Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems... (Continued) 

  • firewall

    A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. 

  • FCAPS (fault-management, configuration, accounting, performance, and security)

    FCAPS is a network management framework created by the International Organization for Standardization (ISO). FCAPS categorizes the working objectives of network management into five levels. The five levels are:  fault-management (F), the configuratio... 

  • Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools. 

  • blended threat

    A blended threat is an exploit that combines elements of multiple types of malware and perhaps takes multiple attack vectors to increase the severity of damage and the speed of contagion.   

About Network Security Monitoring and Analysis

Network traffic analysis and monitoring tools can detect threats and vulnerabilities in your enterprise network. This section explains how to monitor and analyze the security of all networks, and provides information on how penetration testing and ethical hacking methods can better secure corporate data.