Interpreting Network Traffic: A Network Intrusion Detector’s Look At Suspicious Events

Cyber Chief Magazine brings you the tactics to uncover and neutralize the insider threat

The purpose of this paper is to discuss interpretations of selected network traffic events from the viewpoint of a network intrusion detection analyst. I assume the analyst has no knowledge of the source of the event outside of the data collected by his network-based intrusion detection system (NIDS) or firewall logs. I do not concentrate on the method by which these events are collected, but I assume it is possible to obtain data in TCPDump format.

Download the paper in RTF format here.