WhileNetworking

  • Home
  • CCNA
  • Cisco Packet Tracer Download
    • Cisco packet tracer 6.3
    • cisco packet tracer 6.2
    • Cisco Packet Tracer 7
  • Linux Server Management
  • About Us
  • Privacy Policy
  • Contact Us

Cyber Security 138

 

Detection of Anomaly Networking Behavior

Signature-based detecting of attacks requires an discernment of what is “bad” interchange. Unfortunately, late attackers are crafting progressive and unrelenting attacks that create a new firewood of “bad” that has no twinned melody. Today’s organizations staleness instead comprehend many forward-thinking precaution measures specified as activity reasoning in magnitude to set threats that avoid stereotypical signature-based […]

August 3, 2018 More
 

Security Data analysis: netflow, know the basic

NetFlow is a meshwork protocol that was industrial by Cisco for the group and monitoring of textile reciprocation movement aggregation that is generated by NetFlow-enabled scheme devices. NetFlow has metamorphose a de-facto business received and is buttressed by platforms remaining than Whitefish. From a meshwork warrant monitoring appearance, NetFlow provides meeting data. NetFlow captures standard […]

August 3, 2018 More
 

Security Data analysis: Web Proxy Log

Malware is often spread using vulnerabilities in web browsers and malware may also use HTTP/HTTPS for the CnCcommunication. Many web proxies, such as the Cisco Web Security Appliance (Cisco WSA), can also decrypt SSL/TLS traffic so that it can be inspected. Today, much of the web traffic of Facebook, Google, and so on, uses HTTPS instead of HTTP […]

August 3, 2018 More
 

Security check: DNS log data analysis

Besides the mean section practices such as deploying firewalls, IPS sensors, antivirus, web protection appliances, and so on, many SOCs are progressively looking to the material as a aggregation thing, for lesson, examining Netflow records and DNS activities. It is plebeian to see malware CnC use DGAs or fast-flux DNS to escape IP address-based catching […]

August 2, 2018 More
 

How you can observe Firewall Log

System log messages from pass network devices can ply discernment into and discourse for safeguard events that may not be ready from new sources. This understanding aids in determining the credibleness and extent of an incident. Within the circumstance of a warranty incident, analysts can use the firewall syslog messages to interpret the act relationships, […]

August 2, 2018 More
Older postsNewer posts
Find Us on Facebook
Choose a category !!
  • CCNA
  • Cisco Certification Exam
  • cisco packet tracer 6.2
  • Cisco packet tracer 6.3
  • Cisco Packet Tracer 7
  • Cisco Packet Tracer 7.1
  • Cisco Packet Tracer 7.2.1
  • Cisco Packet Tracer 7.3
  • Cyber Security
  • Engineering Ebooks
  • Excel
  • IELTS Ebook
  • Internet
  • Know computer
  • Know your computer
  • Laser Processing of Material
  • Linux installation and server management
  • PDF
  • Technology
  • Uncategorized
Top posts
  • Free download Principles of Electronics by VK Mehta
  • Packet tracer 6.2 student version for Linux - Free download
  • Know about Host-Based Intrusion Prevention System
Archieves
Get latest updates by Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 19 other subscribers
W
SC
wordpress counter
Analytics
Recent Comments
    Browse by categories
    Cyber SecurityLinux installation and server managementCCNAKnow your computerKnow computerCisco Packet Tracer 7UncategorizedCisco Certification ExamInternetPDFCisco Packet Tracer 7.3Engineering EbooksCisco packet tracer 6.3cisco packet tracer 6.2Cisco Packet Tracer 7.1TechnologyExcelLaser Processing of MaterialCisco Packet Tracer 7.2.1IELTS Ebook
    Feel free to contact with us

    Hi, any kind of comment or suggestion is valuable to us. So feel free to contact with us.

    Email: himadri.shekhar.bd@gmail.com

    Name: WhileNetworking.com

    2021 © WhileNetworking