On the Wire

نویسندگان

  • Vicka Corey
  • Charles Peterman
  • Sybil Shearin
  • Michael S. Greenberg
چکیده

A network’s physical layer is deceptively quiet. Hub lights blink in response to network traffic, but do little to convey the range of information that the network carries. Analysis of the individual traffic flows and their content is essential to a complete understanding of network usage. Many tools let you view traffic in real time, but real-time monitoring at any level requires significant human and hardware resources, and doesn’t scale to networks larger than a single workgroup. It is generally more practical to archive all traffic and analyze subsets as necessary. This process is known as reconstructive traffic analysis, or network forensics.1 In practice, it is often limited to data collection and packetlevel inspection; however, a network forensics analysis tool (NFAT) can provide a richer view of the data collected, allowing you to inspect the traffic from further up the protocol stack.2 The IT industry’s ever-growing concern with security is the primary motivation for network forensics. A network that has been prepared for forensic analysis is easy to monitor, and security vulnerabilities and configuration problems can be conveniently identified. It also allows the best possible analysis of security violations. Most importantly, analyzing a complete record of your network traffic with the appropriate reconstructive tools provides context for other breach-related events. For example, if your analysis detects a user account and its Pretty Good Privacy (PGP, www.pgp.com/index.php) keys being compromised, good practice requires you to review all subsequent activity by that user, or involving those keys. In some industries, laws such as the Health Insurance Portability and Accountability Act (HIPAA, http://cms.hhs.gov/hipaa) regulate monitoring the flow of information. While it is often difficult to balance what is required by law and what is technically feasible, a forensic record of network traffic is a good first step. Security and legal concerns are not the only reasons to want a fuller understanding of your network traffic, however. Forensics tool users have reported many other applications. If your mail server has lost several hours’ or days’ worth of received messages and traditional backup methods have failed, you can recover the messages from the recorded traffic. Similarly, the forensics record allows unhurried analysis of anomalies such as traffic spikes or application errors that might otherwise have remained hearsay.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Wire Pitch on Capacity of Single Staggered Wire and Tube Heat Exchanger Using Computational Fluid Dynamic Simulation

Single staggered is a design development of normal wire and tube heat exchanger that wires are welded with staggered configuration on two sides. Capacity of wire and tube heat exchanger is the ability of the heat exchanger to release heat. The objective of this study is to analyse the effect of wire pitch (pw) on capacity of single staggered wire and tube heat exchanger. The research...

متن کامل

Effect of the asymmetrical rolling process on the micro hardness and microstructure of brass wire

Current experimental investigation deals with the effects of asymmetrical rolling parameters on the inhomogeneity, microstructure, mechanical, and geometrical properties of rolled brass wire. Toward this end, a roll machine with three different roll radii ratios was set up. The asymmetrical conditions are arranged using three different sets of rolls with different diameters that result into dif...

متن کامل

Influence of an Inclusion on Multi-Pass Copper Shaped-Wire Drawing by 2D Finite Element Analysis

The size and length effects of an inclusion on multi-pass copper shaped-wire drawing were investigated. For this purpose, an experimental investigation on optimal die half-angle was conducted. Based on experimental data of optimal die half-angle, wire and inclusion deformations, drawing and hydrostatic stress of copper shaped-wires that contain an inclusion were calculated by two-dimensional fi...

متن کامل

Experimental Investigation of Surface Roughness and Kerf Width During Machining of Blanking Die Material on Wire Electric Discharge Machine

Wire electric discharge machine (WEDM) is spark erosion in unconventional machining technique to cut hard and the conductive material with a wire as an electrode. The blanking die material SKD 11 is a high carbon and high chromium tool steel with high hardness and high wearing resistance property. This tool steel has broad application in press tools and dies making industries. In this research ...

متن کامل

Simulation of Surface Plasmon Excitation in a Plasmonic Nano-Wire Using Surface Integral Equations

In this paper, scattering of a plane and monochromatic electromagnetic wave from a nano-wire is simulated using surface integral equations. First, integral equationsgoverning unknown fields on the surface is obtained based on Stratton-Cho surface integral equations. Then, the interaction of the wave with a non-plasmonic as well as a palsmonic nano-wire is considered. It is shown that in scatter...

متن کامل

Experimental investigation for wake of the circular cylinder by attaching different number of tripping wires

An experimental study is conducted on flow past a circular cylinder fitted with some tripping wires on its surface. The work investigates the dependency of the critical wire locations on the wire size and Reynolds numbers, and examines the wake and vortex shedding characteristics in an effort to advance the understanding of the critical wire effects beyond the existing literature. The primary a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002