Detecting & Mitigating Attacks Using Your Network Infrastructure

CISCO’s network defence training session at Blackhat 2012 included 7 network security best practices. These can be summarized as; hardening of network devices, enabling syslog on all network devices and correlating events across devices, enabling Netflow on strategic network devices and analysing the information to understand traffic patterns, using DNS logging to identify potential issues, and finally combine all info gathered from these tasks to construct a network IP traffic baseline. This will help you detect and understand abnormal network activity.

Read more here –

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top