You are on page 1of 4

Running head: CYBER SECURITY MONITORING

Cyber Security Monitoring

Students’ Name

Institutional Affiliation
Running head: CYBER SECURITY MONITORING
2

Network Traffic Monitoring

Introduction

Network traffic monitoring is a management process that utilized several techniques and tools to examine
communication, packet traffic, and data in a computer-based network. The procedures in network traffic
monitoring include reviewing, managing the traffic available in the system, and analyzing any unusual
effect that poses a threat to the network performance, security, or availability[ CITATION Ric10 \l 1033 ].
Network traffic monitoring provides a smooth flow of data packets in a system by offering availability
and ease operation in a computer connected to a specific network.

Discussion

The monitoring processes include packet capturing techniques and network sniffing, which implies that
monitoring of a network requires a checking of the incoming and outgoing data packets. Among the
technologies used in network monitoring processes include; antivirus and anti-malware software,
unauthorized detection and blockage in the system, firewalls, and monitoring the network, managing it,
and the performance of the software[ CITATION Ida13 \l 1033 ]. Professionally network analyzers have
various tools and methods in analyzing a network traffic, in which in this case we critically examine a
network traffic using Caspa Network Analyzer[ CITATION Ida13 \l 1033 ].

Methodology

The method in which a network analyzer will choose to use to find any discrepancies in network traffic
will require a general outlook of data available in various components of the network system. Caspa
Network Analyzer provides several tabs that will be used to collect data that will eventually be used to
detect any abnormalities in a network system. Those tabs include;

• Dash Board Tab

Dashboard tab provides a graphical view of the data and any statistics of the network traffic. In the
dashboard tab network analyzer can utilize MAC address, protocols, and IP addresses to come up with
graphs that will help in identifying any abnormalities of the network and still provide relevant
statistics[ CITATION Dai14 \l 1033 ].

• Summary Tab
Running head: CYBER SECURITY MONITORING
3
This particular tab gives a summary of the entire network information on total traffic and their real-time
traffic, and multicast traffic. The nodes in the nodes explorer windows when switched they provide traffic
information instantly[ CITATION Dai14 \l 1033 ].

• Physical Endpoint and IP Endpoint

Also known as the two endpoints tabs provide data information for every physical address node as well as
the IP address node in both remote and local. Provision of secure identification features enables the
analyzer to find out which node experiences any abnormalities for instance, like which host is providing
significant traffic and the one that is still generating traffic[ CITATION Bie14 \l 1033 ].

• Conversation Tabs

In this tab, four conversation tabs are provided which is the IP conversation, TCP conversation, UDP
conversation, and physical conversation. Just like the endpoint tabs, in this tabs, we are presented with
information on the specific type of conversation tab that generates substantial network traffic[ CITATION
Dai14 \l 1033 ].

• Matrix Tab

The matrix tab provides a single graph that contains all the network connections. The thick line
symbolizes the volume involved in the traffic between nodes while the color shows current status. If one
selects a particular node in the network traffic, information concerning that particular node will be
provided[ CITATION Bie14 \l 1033 ].

The method of data collection can vary from one network analyzer to another, but the bottom line is to
critically look at the entire system find problems available and solve them. In this case, the Caspa network
analyzer proves to be of significant help.

Conclusion

A network is a very vital aspect of data sharing and trafficking within a working connection or
workplace. Any abnormalities can cause a huge problem in an organization operation if not addressed
and if the network system is not checked and analyzed by a professional regularly. It is crucial to protect
information from landing in wrong hands or crushing down and lose all data stored.
Running head: CYBER SECURITY MONITORING
4
References
Biersack, E. C. (2014). Data Traffic Monitoring and Analysis [recurso electrónico]: From Measurement,
Classification, and Anomaly Detection to Quality of Experience. .

Dainotti, A. M. ( TMA 2014, April 14, 2014). Traffic Monitoring and Analysis [recurso electrónico]: .
London, UK,: 6th International Workshop, Proceedings. .

Idaho National Laboratory., U. S. (2013). Network traffic monitoring software. . Washington, D.C: United
States.: Dept. of Energy.

Ricciato, F. M. (2010). Traffic monitoring and analysis: Second international workshop, TMA 2010,
Zurich, Switzerland, April 7, 2010 ; proceedings. Berlin: Springer. .

You might also like