preview

Network Traffic Monitoring And Analysis Essay

Decent Essays

Outline
Network Traffic Monitoring and analysis is essential to more effectively troubleshoot and resolve issues when they occur, to not bring network services to a standstill for extended periods. Numerous software tools are available to help administrators with the monitoring and detects cyber threats in network traffic. This paper will discuss software that can monitor Network Traffic, which helps detect cyber threats. The following is software based monitoring that detect cyber threats;
 Datadog Cloud Monitoring
 LogicMonitor
 Traverse Monitoring
 Network Performance Monitor
 Pulseway
 Panopta
 SysAid
 ManageEngine OpManager
 SolarWinds RMM
 Unigma
These are software I used to investigate my research problem. A …show more content…

It gives an overview of the ten most widely used software as network traffic monitoring tools and provides information about two newer software monitoring methods that use a combination of passive and active monitoring techniques.
Data Collection
There are specific methods of data collection that used, such as observation. Many people believe a network monitoring provides them alerts and notifications to help them proactively monitor and manage network components, CPU, disk space, memory usage, software or hardware updates and more. In addition, this technique helps to collect data easily and help to detect cyber threats.
Participant and procedure
Texts were analyzed on participant selection and sampling procedure part. Texts were chosen by monitor a network performance, add context to all alerts and notify team members. Each software has different responsibility that it will help to detect cyber threats. There is some software that their task reduces network outages and improve performance with advanced network monitoring. Choosing texts were significant way because it offers physical and virtual server monitoring, traffic analysis and configuration management.
Data analysis
The finding was analyzed by using comprehensive software to secure, maintain, and improve IT operations. A specific theoretical perspective was used to help analyze text.
Strategies
There are qualitative researchers who agree on

Get Access