Skip to main content
Dave Piscitello Posted on 9/18/2014

 

Check out these examples of how to implement real-time or offline traffic monitoring using common commercial or open source security products.

 In Monitor DNS Traffic & You Just Might Catch A RAT, I described how inspecting DNS traffic between client devices and your local recursive resolver could reveal the presence of botnets in your networks. Today, I'll share how you can monitor traffic using security systems and name resolvers you may already have deployed.

 

DarkReading/ full article here/ http://www.darkreading.com/analytics/threat-intelligence/5-ways-to-monitor-dns-traffic-for-security-threats/a/d-id/1315868?
Be the first to reply!

Reply