SlideShare a Scribd company logo
1 of 2
Download to read offline
A. Monitoring Internet Endpoints and Bandwidth Consumption
1. NetFlow/Slow: NetFlow and Slow are protocols used for monitoring network traffic. Network
devices like routers and switches can be configured to export flow data to a collector. This data
includes information such as source and destination IP addresses, ports, and the volume of data
transferred. By analyzing this data, we can gain insights into which clients are communicating
with which servers and the amount of bandwidth they are using.
2. Packet Sniffers: Packet sniffers like Wireshark capture and analyze individual network
packets. They provide a detailed view of network traffic, including the actual data payload.
While this approach is thorough, it can be resource-intensive, and storing all packets may require
significant storage capacity.
3. Proxy Servers: Deploying a proxy server can help monitor internet usage by clients. Proxy
servers act as intermediaries between clients and servers, logging all requests and responses. This
provides detailed logs of web traffic, including URLs visited, data transferred, and user activity.
4. Intrusion Detection/Prevention Systems (IDS/IPS): IDS/PS systems are designed to monitor
network traffic for suspicious or unauthorized activity. They use predefined rules or anomaly
detection algorithms to identify potentially malicious behavior. When such behavior is detected,
these systems generate logs and alerts for further investigation.
If we lack the resources to capture and store all network packets, we can consider using sampling
techniques to capture a representative subset of traffic or filtering criteria to focus on specific
types of traffic. For instance, you might prioritize capturing and storing packets for traffic to and
from critical servers or for specific applications critical to our organization's operations.
B. Identifying the Local Host in a Data Exfiltration Event
Identifying the local host involved in data exfiltration from external server logs can be done as
follows:
1. Identify the External IP Address: Look in the web server logs to find the external IP address
associated with the data exfiltration.
This IP address typically corresponds to our company's router or firewall through which the data
left our network.
2. Analyze High-Level TCP Port Number: Examine the high-level TCP port number in the logs.
Some services or applications use specific ports. This can help us narrow down the scope of
potential local hosts.
3. Check Firewall or Network Device Logs: Access logs on our company's router/firewall or
other network devices responsible for outgoing traffic. Look for outbound connections
originating from the internal IP address linked to the external IP address identified in the web
server logs.
4. Cross-reference with Internal Logs: If your internal network has logs, such as firewall logs or
proxy server logs, cross-reference the external IP address and port number with these logs. This
will enable us to identify the local host that initiated the suspicious connection.
By correlating information from external server logs with internal network logs, we can pinpoint
the specific local host that was involved in the data exfiltration event. This information is crucial
for further investigation and remediation.
C. Reviewing Windows Event Viewer Logs: Here are some things to notice when reviewing the
application and security event logs:
Application event log: This log contains events from applications and services running on our
computer. It can be used to troubleshoot problems with applications and services, as well as to
track their activity.
Security event log: This log contains events related to security on our computer, such as logins,
logoffs, and file access. It can be used to detect and investigate security incidents, as well as to
monitor compliance with security policies.
It is important to review the application and security event logs regularly to identify and address
any potential problems. For example, we may notice errors in the application event log that
indicate that an application is not working properly.
Here are some specific examples of why it is important to review the application and security
event logs:
Application event log:
To troubleshoot problems with applications and services. For example, if an application is
crashing, we can review the application event log for errors that may indicate the cause of the
problem.
To track the activity of applications and services. For example, we can review the application
event log to see when a particular application was last used or when a particular service was
started or stopped.
Security event log:
To detect and investigate security incidents. For example, if we suspect that our computer has
been hacked, we can review the security event log for suspicious activity, such as failed login
attempts or unauthorized access to files.
To monitor compliance with security policies. For example, we can review the security event
log to ensure that users are logging in and logging out of our computer at the appropriate times.
refrences for this Answer?
refrences for this Answer?

More Related Content

Similar to A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf

Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI7
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
ahmeddeath6
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
ssuserd24233
 

Similar to A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf (20)

Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Cryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdfCryptography Project by Aelsayed & Kyasser.pdf
Cryptography Project by Aelsayed & Kyasser.pdf
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptx
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
Network security model.pptx
Network security model.pptxNetwork security model.pptx
Network security model.pptx
 
Lecture notes -001
Lecture notes -001Lecture notes -001
Lecture notes -001
 
Logger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions GuideLogger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions Guide
 
Product description shell control box 4 lts
Product description shell control box 4 ltsProduct description shell control box 4 lts
Product description shell control box 4 lts
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018
 
Firewall
FirewallFirewall
Firewall
 
Internet security
Internet securityInternet security
Internet security
 
The objective of this assignment is to learnabout the IDS.Write .pdf
The objective of this assignment is to learnabout the IDS.Write .pdfThe objective of this assignment is to learnabout the IDS.Write .pdf
The objective of this assignment is to learnabout the IDS.Write .pdf
 
Forensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet ActivityForensic Investigation of Employee Internet Activity
Forensic Investigation of Employee Internet Activity
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Web Proxy Log Analysis and Management 2007
Web Proxy Log Analysis and Management 2007Web Proxy Log Analysis and Management 2007
Web Proxy Log Analysis and Management 2007
 
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
 

More from MAYANKBANSAL1981

Complete in JavaCardApp.javapublic class CardApp { private.pdf
Complete in JavaCardApp.javapublic class CardApp {   private.pdfComplete in JavaCardApp.javapublic class CardApp {   private.pdf
Complete in JavaCardApp.javapublic class CardApp { private.pdf
MAYANKBANSAL1981
 
Change to oop formatimport java.util.Scanner;import java.io.;.pdf
Change to oop formatimport java.util.Scanner;import java.io.;.pdfChange to oop formatimport java.util.Scanner;import java.io.;.pdf
Change to oop formatimport java.util.Scanner;import java.io.;.pdf
MAYANKBANSAL1981
 
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdfCase Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
MAYANKBANSAL1981
 
a) Complete both insert and delete methods. If it works correctly 10.pdf
a) Complete both insert and delete methods. If it works correctly 10.pdfa) Complete both insert and delete methods. If it works correctly 10.pdf
a) Complete both insert and delete methods. If it works correctly 10.pdf
MAYANKBANSAL1981
 
Answer the following prompts 1The InstantRide Management team foun.pdf
Answer the following prompts 1The InstantRide Management team foun.pdfAnswer the following prompts 1The InstantRide Management team foun.pdf
Answer the following prompts 1The InstantRide Management team foun.pdf
MAYANKBANSAL1981
 
Advanced level school Python programming. Need helps. Thank.pdf
Advanced level school Python programming.  Need helps. Thank.pdfAdvanced level school Python programming.  Need helps. Thank.pdf
Advanced level school Python programming. Need helps. Thank.pdf
MAYANKBANSAL1981
 

More from MAYANKBANSAL1981 (14)

Business management 1. True or False Diversification is when compa.pdf
Business management  1. True or False Diversification is when compa.pdfBusiness management  1. True or False Diversification is when compa.pdf
Business management 1. True or False Diversification is when compa.pdf
 
Complete in JavaCardApp.javapublic class CardApp { private.pdf
Complete in JavaCardApp.javapublic class CardApp {   private.pdfComplete in JavaCardApp.javapublic class CardApp {   private.pdf
Complete in JavaCardApp.javapublic class CardApp { private.pdf
 
Change to oop formatimport java.util.Scanner;import java.io.;.pdf
Change to oop formatimport java.util.Scanner;import java.io.;.pdfChange to oop formatimport java.util.Scanner;import java.io.;.pdf
Change to oop formatimport java.util.Scanner;import java.io.;.pdf
 
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdfCase Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
Case Project 2-1 Advance PreparationsThe IT managers from Chicago.pdf
 
Can some one redo this code without the try-catch and an alternative.pdf
Can some one redo this code without the try-catch and an alternative.pdfCan some one redo this code without the try-catch and an alternative.pdf
Can some one redo this code without the try-catch and an alternative.pdf
 
Banks are singled out for special attention in the financial sys.pdf
Banks are singled out for special attention in the financial sys.pdfBanks are singled out for special attention in the financial sys.pdf
Banks are singled out for special attention in the financial sys.pdf
 
ASSETS LIABILITIES Cash $10,000 Accounts payable $12,000 Accounts re.pdf
ASSETS LIABILITIES Cash $10,000 Accounts payable $12,000 Accounts re.pdfASSETS LIABILITIES Cash $10,000 Accounts payable $12,000 Accounts re.pdf
ASSETS LIABILITIES Cash $10,000 Accounts payable $12,000 Accounts re.pdf
 
About your clientName Samantha BensonAge 54Marital status .pdf
About your clientName Samantha BensonAge 54Marital status .pdfAbout your clientName Samantha BensonAge 54Marital status .pdf
About your clientName Samantha BensonAge 54Marital status .pdf
 
About your clientName Samantha Benson Age 54 Marital status Ma.pdf
About your clientName Samantha Benson Age 54 Marital status Ma.pdfAbout your clientName Samantha Benson Age 54 Marital status Ma.pdf
About your clientName Samantha Benson Age 54 Marital status Ma.pdf
 
a) Complete both insert and delete methods. If it works correctly 10.pdf
a) Complete both insert and delete methods. If it works correctly 10.pdfa) Complete both insert and delete methods. If it works correctly 10.pdf
a) Complete both insert and delete methods. If it works correctly 10.pdf
 
About your client Name Samantha Benson Age 54 Marital status Ma.pdf
About your client Name Samantha Benson Age 54 Marital status Ma.pdfAbout your client Name Samantha Benson Age 54 Marital status Ma.pdf
About your client Name Samantha Benson Age 54 Marital status Ma.pdf
 
About your client Name Samantha BensonAge 54Marital status.pdf
About your client Name Samantha BensonAge 54Marital status.pdfAbout your client Name Samantha BensonAge 54Marital status.pdf
About your client Name Samantha BensonAge 54Marital status.pdf
 
Answer the following prompts 1The InstantRide Management team foun.pdf
Answer the following prompts 1The InstantRide Management team foun.pdfAnswer the following prompts 1The InstantRide Management team foun.pdf
Answer the following prompts 1The InstantRide Management team foun.pdf
 
Advanced level school Python programming. Need helps. Thank.pdf
Advanced level school Python programming.  Need helps. Thank.pdfAdvanced level school Python programming.  Need helps. Thank.pdf
Advanced level school Python programming. Need helps. Thank.pdf
 

Recently uploaded

Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
Elizabeth Walsh
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Orientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdfOrientation Canvas Course Presentation.pdf
Orientation Canvas Course Presentation.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdfDiuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
Diuretic, Hypoglycemic and Limit test of Heavy metals and Arsenic.-1.pdf
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf

  • 1. A. Monitoring Internet Endpoints and Bandwidth Consumption 1. NetFlow/Slow: NetFlow and Slow are protocols used for monitoring network traffic. Network devices like routers and switches can be configured to export flow data to a collector. This data includes information such as source and destination IP addresses, ports, and the volume of data transferred. By analyzing this data, we can gain insights into which clients are communicating with which servers and the amount of bandwidth they are using. 2. Packet Sniffers: Packet sniffers like Wireshark capture and analyze individual network packets. They provide a detailed view of network traffic, including the actual data payload. While this approach is thorough, it can be resource-intensive, and storing all packets may require significant storage capacity. 3. Proxy Servers: Deploying a proxy server can help monitor internet usage by clients. Proxy servers act as intermediaries between clients and servers, logging all requests and responses. This provides detailed logs of web traffic, including URLs visited, data transferred, and user activity. 4. Intrusion Detection/Prevention Systems (IDS/IPS): IDS/PS systems are designed to monitor network traffic for suspicious or unauthorized activity. They use predefined rules or anomaly detection algorithms to identify potentially malicious behavior. When such behavior is detected, these systems generate logs and alerts for further investigation. If we lack the resources to capture and store all network packets, we can consider using sampling techniques to capture a representative subset of traffic or filtering criteria to focus on specific types of traffic. For instance, you might prioritize capturing and storing packets for traffic to and from critical servers or for specific applications critical to our organization's operations. B. Identifying the Local Host in a Data Exfiltration Event Identifying the local host involved in data exfiltration from external server logs can be done as follows: 1. Identify the External IP Address: Look in the web server logs to find the external IP address associated with the data exfiltration. This IP address typically corresponds to our company's router or firewall through which the data left our network. 2. Analyze High-Level TCP Port Number: Examine the high-level TCP port number in the logs. Some services or applications use specific ports. This can help us narrow down the scope of potential local hosts. 3. Check Firewall or Network Device Logs: Access logs on our company's router/firewall or other network devices responsible for outgoing traffic. Look for outbound connections originating from the internal IP address linked to the external IP address identified in the web server logs.
  • 2. 4. Cross-reference with Internal Logs: If your internal network has logs, such as firewall logs or proxy server logs, cross-reference the external IP address and port number with these logs. This will enable us to identify the local host that initiated the suspicious connection. By correlating information from external server logs with internal network logs, we can pinpoint the specific local host that was involved in the data exfiltration event. This information is crucial for further investigation and remediation. C. Reviewing Windows Event Viewer Logs: Here are some things to notice when reviewing the application and security event logs: Application event log: This log contains events from applications and services running on our computer. It can be used to troubleshoot problems with applications and services, as well as to track their activity. Security event log: This log contains events related to security on our computer, such as logins, logoffs, and file access. It can be used to detect and investigate security incidents, as well as to monitor compliance with security policies. It is important to review the application and security event logs regularly to identify and address any potential problems. For example, we may notice errors in the application event log that indicate that an application is not working properly. Here are some specific examples of why it is important to review the application and security event logs: Application event log: To troubleshoot problems with applications and services. For example, if an application is crashing, we can review the application event log for errors that may indicate the cause of the problem. To track the activity of applications and services. For example, we can review the application event log to see when a particular application was last used or when a particular service was started or stopped. Security event log: To detect and investigate security incidents. For example, if we suspect that our computer has been hacked, we can review the security event log for suspicious activity, such as failed login attempts or unauthorized access to files. To monitor compliance with security policies. For example, we can review the security event log to ensure that users are logging in and logging out of our computer at the appropriate times. refrences for this Answer? refrences for this Answer?