Network monitoring for security and forensics

Kulesh Shanmugasundaram, Nasir Memon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

    Original languageEnglish (US)
    Title of host publicationInformation Systems Security - 2nd International Conference, ICISS 2006, Proceedings
    PublisherSpringer Verlag
    Pages56-70
    Number of pages15
    Volume4332 LNCS
    ISBN (Print)9783540689621
    StatePublished - 2006
    Event2nd International Conference on Information Systems Security, ICISS 2006 - Kolkata, India
    Duration: Dec 19 2006Dec 21 2006

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4332 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other2nd International Conference on Information Systems Security, ICISS 2006
    CountryIndia
    CityKolkata
    Period12/19/0612/21/06

    Fingerprint

    Network Monitoring
    Network Traffic
    Monitoring
    Telecommunication traffic
    Bandwidth
    Monitor
    Resources
    Necessary

    Keywords

    • Network forensics
    • Network monitoring
    • Network security
    • Synopses

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • Computer Science(all)

    Cite this

    Shanmugasundaram, K., & Memon, N. (2006). Network monitoring for security and forensics. In Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings (Vol. 4332 LNCS, pp. 56-70). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4332 LNCS). Springer Verlag.

    Network monitoring for security and forensics. / Shanmugasundaram, Kulesh; Memon, Nasir.

    Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS Springer Verlag, 2006. p. 56-70 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Shanmugasundaram, K & Memon, N 2006, Network monitoring for security and forensics. in Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. vol. 4332 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4332 LNCS, Springer Verlag, pp. 56-70, 2nd International Conference on Information Systems Security, ICISS 2006, Kolkata, India, 12/19/06.
    Shanmugasundaram K, Memon N. Network monitoring for security and forensics. In Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS. Springer Verlag. 2006. p. 56-70. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    Shanmugasundaram, Kulesh ; Memon, Nasir. / Network monitoring for security and forensics. Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS Springer Verlag, 2006. pp. 56-70 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
    @inproceedings{76c2e7e98142476c9413d75cdcbe4182,
    title = "Network monitoring for security and forensics",
    abstract = "Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.",
    keywords = "Network forensics, Network monitoring, Network security, Synopses",
    author = "Kulesh Shanmugasundaram and Nasir Memon",
    year = "2006",
    language = "English (US)",
    isbn = "9783540689621",
    volume = "4332 LNCS",
    series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
    publisher = "Springer Verlag",
    pages = "56--70",
    booktitle = "Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings",
    address = "Germany",

    }

    TY - GEN

    T1 - Network monitoring for security and forensics

    AU - Shanmugasundaram, Kulesh

    AU - Memon, Nasir

    PY - 2006

    Y1 - 2006

    N2 - Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

    AB - Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

    KW - Network forensics

    KW - Network monitoring

    KW - Network security

    KW - Synopses

    UR - http://www.scopus.com/inward/record.url?scp=84871891045&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84871891045&partnerID=8YFLogxK

    M3 - Conference contribution

    SN - 9783540689621

    VL - 4332 LNCS

    T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    SP - 56

    EP - 70

    BT - Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings

    PB - Springer Verlag

    ER -