Talk With an Expert

Intrusion detection through traffic analysis from the endpoint using Splunk Stream

Intrusion detection through traffic analysis from the endpoint using Splunk Stream (PDF, 3.40MB)Published: 24 May, 2017
Created by
Etrik Eddy

With technologies such as software-defined wide area networking (SD-WAN) and cloud operations, the traditional scheme of intrusion detection and packet capture at the network perimeter is quickly becoming less viable as a model for network intrusion detection. One alternative is to dynamically collect network traffic at the endpoint using the Splunk Stream and then using Splunk to analyze the traffic for indicators of compromise. This method allows for network-level detection on large, disparate networks which don't have consolidated egress points for traffic.