Real-time monitoring as a supplementary security component of vigilantism in modern network environments

12/07/2020
by   Victor R. Kebande, et al.
0

The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in realtime. Needless to say, in today dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats in the world today, many organizations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of RealTime Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.

READ FULL TEXT
research
10/23/2018

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

Computer networks are undergoing a phenomenal growth, driven by the rapi...
research
11/13/2017

A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems

The increased capabilities of modern real-time systems (RTS) expose them...
research
02/08/2022

Challenges towards Building an effective Cyber Security Operations Centre

The increasing dependency of modern society on IT systems and infrastruc...
research
08/25/2021

Multi-Stage Threat Modelling and Security Monitoring in 5GCN

The fifth generation of mobile networks (5G) promises a range of new cap...
research
07/31/2019

MSNM-S: An Applied Network Monitoring Tool for Anomaly Detection in Complex Networks and Systems

Technology evolves quickly. Low cost and ready-to-connect devices are de...
research
12/03/2020

An Event-Driven Framework for Business Awareness Management

Modern organizations need real-time awareness about the current business...
research
05/16/2023

Challenges with the Application of Cyber Security for Airworthiness (CSA) in Real-World Contexts

The ever increasing push towards reliance upon computerised technology i...

Please sign up or login with your details

Forgot password? Click here to reset