论文标题
实时监控是现代网络环境中警惕性的补充安全组成部分
Real-time monitoring as a supplementary security component of vigilantism in modern network environments
论文作者
论文摘要
网络警惕性的现象自主归因于如何实时跟踪对手的异常和晦涩的活动。不用说,在当今的动态,虚拟化和复杂的网络环境中,对于网络管理员,分析师以及工程师而言,这是必不可少的,可以实时练习网络警惕性以及其他网络事件。原因是要在任何给定时间了解组织网络环境的确切安全姿势。这是由现代网络环境所做的事实驱动的,不仅为组织带来了新的机会,还为需要每天解决的一系列新的和复杂的网络安全挑战。在我们的现代网络环境中,网络设备的规模,范围,复杂性和数量的增长也使最有经验的网络管理员甚至很难独立地提供监督或诊断复杂网络问题所需的知识的广度和深度。此外,随着当今世界上网络安全威胁的越来越多,许多组织被迫改变他们计划,制定和实施网络安全策略的方式,以此来增强其对网络安全事件做出反应的能力。因此,本文研究了实时监控(RTM)作为现代网络环境中警惕性的补充安全部分的相关性,尤其是在发生网络安全事件的情况下进行适当的计划,准备和缓解。此外,本文还调查了围绕RTM实施安全警惕性的一些关键问题和挑战。
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in realtime. Needless to say, in today dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats in the world today, many organizations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of RealTime Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.