Network Activity
Presented by
http://schoolofresearch.org/
http://schoolofresearch.org/
Background
 Information security a critical issue in modern industries,
markets, society
 Organizations need to store data for use in daily operations
 Necessary to find water-tight methods to safeguard
information
 Information on customers, clients, employees,
organizational operations needs to be safeguarded as a
matter of ethics
 Managements need to devise, implement effective
processes for information safety on networks
 Introduction of data loss prevention mechanisms to
prevent confidential information in wrong hands
http://schoolofresearch.org/
Structure of networks
 Networks able to perform different roles
 Differentiated in structure, purpose, activities, and results
 Network activity a method showing difference between
activities in an operation/project.
 Can be differentiated by monitoring incoming traffic flow
through firewall.
 Differentiated by anomalies in flow of Internet packets.
 Malicious network activity often exhausts legitimate
resources
 Through sending excessive traffic.
 Usually targets unused addresses in network
http://schoolofresearch.org/
Structure of networks
 Some malicious network activities: scanners, worms,
malicious sperms, and backscatters.
 Scanners originate from a single source
 Often target the same port on numerous machines on
network, or target different ports on same machine.
 Often generate excessive internet packet flows.
 Also differentiated by looking at the internet packet
size to monitor if it deviates from the normal.
 Or looking at the source and destination of the
packets.
http://schoolofresearch.org/
Normal, malicious activity
 Normal Internet activity has different source and
destination addresses
 Malicious, suspicious activity can have source and
destination addresses with same value.
 Also applicable: signature-based approach to differentiate
these activities by comparing threat signatures to observed
events to identify differences. Malicious network activity
usually originates from website servers trying to leave the
network through the firewall.
 Suspicious activity infiltrates through firewall, flows to
website servers.
 Flow of malicious and suspicious activity is very low
compared to the normal activity.
http://schoolofresearch.org/
Find reliable, affordable help in writing
custom essays, assignments, homework, and
research papers at
http://schoolofresearch.org/
http://schoolofresearch.org/

Network activity

  • 1.
  • 2.
    Background  Information securitya critical issue in modern industries, markets, society  Organizations need to store data for use in daily operations  Necessary to find water-tight methods to safeguard information  Information on customers, clients, employees, organizational operations needs to be safeguarded as a matter of ethics  Managements need to devise, implement effective processes for information safety on networks  Introduction of data loss prevention mechanisms to prevent confidential information in wrong hands http://schoolofresearch.org/
  • 3.
    Structure of networks Networks able to perform different roles  Differentiated in structure, purpose, activities, and results  Network activity a method showing difference between activities in an operation/project.  Can be differentiated by monitoring incoming traffic flow through firewall.  Differentiated by anomalies in flow of Internet packets.  Malicious network activity often exhausts legitimate resources  Through sending excessive traffic.  Usually targets unused addresses in network http://schoolofresearch.org/
  • 4.
    Structure of networks Some malicious network activities: scanners, worms, malicious sperms, and backscatters.  Scanners originate from a single source  Often target the same port on numerous machines on network, or target different ports on same machine.  Often generate excessive internet packet flows.  Also differentiated by looking at the internet packet size to monitor if it deviates from the normal.  Or looking at the source and destination of the packets. http://schoolofresearch.org/
  • 5.
    Normal, malicious activity Normal Internet activity has different source and destination addresses  Malicious, suspicious activity can have source and destination addresses with same value.  Also applicable: signature-based approach to differentiate these activities by comparing threat signatures to observed events to identify differences. Malicious network activity usually originates from website servers trying to leave the network through the firewall.  Suspicious activity infiltrates through firewall, flows to website servers.  Flow of malicious and suspicious activity is very low compared to the normal activity. http://schoolofresearch.org/
  • 6.
    Find reliable, affordablehelp in writing custom essays, assignments, homework, and research papers at http://schoolofresearch.org/ http://schoolofresearch.org/