Network monitoring for security and forensics

Kulesh Shanmugasundaram, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

Original languageEnglish (US)
Title of host publicationInformation Systems Security - 2nd International Conference, ICISS 2006, Proceedings
PublisherSpringer Verlag
Pages56-70
Number of pages15
Volume4332 LNCS
ISBN (Print)9783540689621
StatePublished - 2006
Event2nd International Conference on Information Systems Security, ICISS 2006 - Kolkata, India
Duration: Dec 19 2006Dec 21 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4332 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information Systems Security, ICISS 2006
CountryIndia
CityKolkata
Period12/19/0612/21/06

Fingerprint

Network Monitoring
Network Traffic
Monitoring
Telecommunication traffic
Bandwidth
Monitor
Resources
Necessary

Keywords

  • Network forensics
  • Network monitoring
  • Network security
  • Synopses

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Shanmugasundaram, K., & Memon, N. (2006). Network monitoring for security and forensics. In Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings (Vol. 4332 LNCS, pp. 56-70). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4332 LNCS). Springer Verlag.

Network monitoring for security and forensics. / Shanmugasundaram, Kulesh; Memon, Nasir.

Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS Springer Verlag, 2006. p. 56-70 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4332 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shanmugasundaram, K & Memon, N 2006, Network monitoring for security and forensics. in Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. vol. 4332 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4332 LNCS, Springer Verlag, pp. 56-70, 2nd International Conference on Information Systems Security, ICISS 2006, Kolkata, India, 12/19/06.
Shanmugasundaram K, Memon N. Network monitoring for security and forensics. In Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS. Springer Verlag. 2006. p. 56-70. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Shanmugasundaram, Kulesh ; Memon, Nasir. / Network monitoring for security and forensics. Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Vol. 4332 LNCS Springer Verlag, 2006. pp. 56-70 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{76c2e7e98142476c9413d75cdcbe4182,
title = "Network monitoring for security and forensics",
abstract = "Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.",
keywords = "Network forensics, Network monitoring, Network security, Synopses",
author = "Kulesh Shanmugasundaram and Nasir Memon",
year = "2006",
language = "English (US)",
isbn = "9783540689621",
volume = "4332 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "56--70",
booktitle = "Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Network monitoring for security and forensics

AU - Shanmugasundaram, Kulesh

AU - Memon, Nasir

PY - 2006

Y1 - 2006

N2 - Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

AB - Networked environment has grown hostile over the years. In order to guarantee the security of networks and the resources attached to networks it is necessary to constantly monitor and analyze network traffic. Increasing network bandwidth, however, prohibits the recording and analysis of raw network traffic. In this paper we discuss some challenges facing network monitoring and present monitoring strategies to alleviate the challenges.

KW - Network forensics

KW - Network monitoring

KW - Network security

KW - Synopses

UR - http://www.scopus.com/inward/record.url?scp=84871891045&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84871891045&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84871891045

SN - 9783540689621

VL - 4332 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 56

EP - 70

BT - Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings

PB - Springer Verlag

ER -