Labs

Detecting the BlackNurse DDoS Attack with Network Monitor

The security operations centre (SOC) at Danish telecoms operator TDC recently published a report with regards to an ICMP based DoS/DDoS style of attack. In the spirit of proactive defence, I thought it was a good idea to see how this type of attack would look within [LogRhythm Network Monitor Freemium.

Detecting Home Network Issues with Network Monitor

Analyzing home network traffic can be highly valuable as you can find previously unknown issues smoothly and efficiently by using Network Monitor. In addition to security issues, you can also track usage statistics and determine what (or who) is utilizing the most bandwidth on your home network.

Building Resilience in Critical Infrastructure

It’s National Cyber Security Awareness Month, and the theme for the final week is “Building Resilience in Critical Infrastructure.” So why is this a focus for the National Cyber Security Alliance? Well initially, cyber threats were focused on profitable data breaches with an attainable payload (e.g., credit card information, industry secrets, etc.). But now, nation states and hacktivist groups are focusing on accessing and disrupting critical infrastructure in the United States.

How to Build a Miniature Network Monitor Device

LogRhythm’s Network Monitor is a powerful forensics tool that allows organizations to capture, analyze, and alert on network data. Traditionally, NetMon is deployed on a blade server within an organization’s data center. However, there are many situations where a smaller, more tactical device is the optimal solution. To demonstrate how to easily deploy NetMon we decided to show you how to build a miniature device.