A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

06/29/2023
by   Minzhao Lyu, et al.
0

Enterprise networks that host valuable assets and services are popular and frequent targets of distributed network attacks. In order to cope with the ever-increasing threats, industrial and research communities develop systems and methods to monitor the behaviors of their assets and protect them from critical attacks. In this paper, we systematically survey related research articles and industrial systems to highlight the current status of this arms race in enterprise network security. First, we discuss the taxonomy of distributed network attacks on enterprise assets, including distributed denial-of-service (DDoS) and reconnaissance attacks. Second, we review existing methods in monitoring and classifying network behavior of enterprise hosts to verify their benign activities and isolate potential anomalies. Third, state-of-the-art detection methods for distributed network attacks sourced from external attackers are elaborated, highlighting their merits and bottlenecks. Fourth, as programmable networks and machine learning (ML) techniques are increasingly becoming adopted by the community, their current applications in network security are discussed. Finally, we highlight several research gaps on enterprise network security to inspire future research.

READ FULL TEXT

page 1

page 2

page 3

page 6

page 8

research
08/21/2020

IoT Network Security: Requirements, Threats, and Countermeasures

IoT devices are increasingly utilized in critical infrastructure, enterp...
research
01/25/2022

A Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks

Significant progress has been made towards deploying Vehicle-to-Everythi...
research
01/09/2020

Architecture and Security of SCADA Systems: A Review

Pipeline bursting, production lines shut down, frenzy traffic, trains co...
research
03/04/2022

Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

Network Function Virtualization (NFV) has emerged as a disruptive networ...
research
05/07/2020

A Review of Computer Vision Methods in Network Security

Network security has become an area of significant importance more than ...
research
08/20/2023

Demystifying the Performance of Data Transfers in High-Performance Research Networks

High-speed research networks are built to meet the ever-increasing needs...
research
05/17/2022

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey

Cross-site scripting (XSS) is one of the major threats menacing the priv...

Please sign up or login with your details

Forgot password? Click here to reset