Question

How would you use data about network traffic to deter attacks to the network? This is...

How would you use data about network traffic to deter attacks to the network? This is a question based on computer forensics.

Homework Answers

Answer #1

Data about network traffic can be used for performing Network Traffic Analysis .

NETWORK TRAFFIC ANALYSIS(NTA)

NTA determine network threats by analysing threats on the network level. So a specialist can detect threat and isolate the threat efficiently at the early stage and keep the network secure.

The features of NTA are:

  • NTA system analyses a network in all the directions so that non of a suspicious action is unnoticed.
  • The threat is detected by NTA system by using a combination of tools including machine learning, compromise indicators, behaviour analysis etc. So that an attack can be detected even after the attacker gain access to the network.
  • NTA system also can ve used to investigate on previous attacks by some hypothesis which helps to isolate the flaw and make the network more secure.

NTA also helps to ensure that the network met the security guidlines. It detects attacks inside a network and also in a network perimeters.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
computer forensics question how would you use data about network traffic to defer attacks to the...
computer forensics question how would you use data about network traffic to defer attacks to the network?
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
1. In 2003, there were many media reports about the number of shark attacks in Florida....
1. In 2003, there were many media reports about the number of shark attacks in Florida. At the end of the year, there were a total of 30 unprovoked shark attacks. By comparison, there were 246 shark attacks over the prior ten years. Using the pre-2003 data, simulate the number of shark attacks for 2003. Based on your simulation, what is the probability that there would be 30 or more shark attacks in that year? (in python) 2. Find the...
An online site presented this? question, "Would the recent norovirus outbreak deter you from taking a?...
An online site presented this? question, "Would the recent norovirus outbreak deter you from taking a? cruise?" Among the 34,577 people who? responded,64?% answered?"yes." Use the sample data to construct a 95?% confidence interval estimate for the proportion of the population of all people who would respond? "yes" to that question. Does the confidence interval provide a good estimate of the population? proportion?
1.) An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking...
1.) An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking a​ cruise?" Among the 34,705 people who​ responded, 69​% answered​ "yes." Use the sample data to construct a 90​% confidence interval estimate for the proportion of the population of all people who would respond​ "yes" to that question. Does the confidence interval provide a good estimate of the population​ proportion? ______<p<______
An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking a​...
An online site presented this​ question, "Would the recent norovirus outbreak deter you from taking a​ cruise?" Among the 34, 536 people who​ responded, 63% answered​ "yes." Use the sample data to construct a 90​% confidence interval estimate for the proportion of the population of all people who would respond​ "yes" to that question. Does the confidence interval provide a good estimate of the population​ proportion? __________<p< ________________ ​(Round to three decimal places as​ needed.)
An intersection has a four-way stop sign but no traffic light. Currently, about 1200 cars use...
An intersection has a four-way stop sign but no traffic light. Currently, about 1200 cars use the intersection a day, and the rate of accidents at the intersection is about one every two weeks. The potential benefit of adding a traffic light was studied using a computer simulation by model- ing traffic flow at the intersection if a light were to be installed. The simulation included 100,000 repetitions of 1200 cars using the intersection to mimic 100,000 days of use....
Text sheet: Tasks Aim Higher College system administrators have requested that you review network traffic to...
Text sheet: Tasks Aim Higher College system administrators have requested that you review network traffic to determine whether the institution’s intrusion detection system (IDS) and intrusion prevention system (IPS) can be used to prevent inbound attacks that are being detected. Your manager has requested that you analyze the detected attacks and create a report that describes each attack, explains the threat it presents, and if an IDS or an IPS is suited to dealing with it. Specifically, your report should...
This is a question about digital forensics and how it relates to Windows file systems, specifically...
This is a question about digital forensics and how it relates to Windows file systems, specifically FAT and NTFS. How might knowledge about these two file structures (NTFS and FAT) be useful to a digital forensics examiner? How would it help them with their process? Please explain in detail. Thank you!
1)This question may require some research. If a computer wants to send a broadcast message to...
1)This question may require some research. If a computer wants to send a broadcast message to all other computers on the same network, what MAC address does it put in the Destination Address field of the frame? 2)This question may require some research. In one of the videos this week we mentioned that Uplink ports have the transmit and receive connectors reversed from the regular ports. What would be the purpose for doing that? 3)Which of the following is the...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT