chapter  2
24 Pages

Network Traffic Monitoring and Analysis

At their very first stage, computer networks were invented in order to be able to share documents and devices. With significant advances in electronics and signal processing technologies during past decades, accessing, searching, and sharing information via communication networks (e.g., the Internet) have become a part of our everyday life. Because frequently a great part of this information is confidential or has restricted access only for authorized persons, preventing unauthorized use and accessing this information and detecting intruders have become an indispensable mechanism for all information systems and communication networks. Efficient prevention mechanisms require a combination of the expertise of security technicians and powerful hardware and software tools in order to be able to achieve high levels of security management, especially for today’s modern computing systems. An intrusion detection system (IDS), by its turn, is one of these security tools for this end.