<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Network Traffic Analysis </title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Network Traffic Analysis </description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/network-traffic-analysis/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 09 Aug 2021 00:00:00 -0400</lastBuildDate><item><title>DNS Over HTTPS: 3 Strategies for Enterprise Security Monitoring</title><link>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>DNS over HTTPS (DoH) can impair enterprise network visibility and security by bypassing traditional DNS monitoring and protections. In this post, I'll provide enterprise defenders three strategies for security monitoring of DoH.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Sean Hutchison</dc:creator><pubDate>Mon, 09 Aug 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dns-over-https-3-strategies-for-enterprise-security-monitoring/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category><category>Cybersecurity Engineering</category><category>Cybersecurity</category><category>Best Practices in Network Security</category></item><item><title>Network Traffic Analysis with SiLK: Profiling and Investigating Cyber Threats</title><link>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Cyber threats are on the rise, making it vitally important to understand what's happening on our computer networks. But the massive amount of network traffic makes this job hard....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Krystosek, Timothy Shimeall, Nancy Ott</dc:creator><pubDate>Mon, 28 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/network-traffic-analysis-with-silk-profiling-and-investigating-cyber-threats/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Traffic Analysis </category></item><item><title>An Analyst-Focused Approach to Network Traffic Analysis</title><link>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Earlier this year, a team of researchers from the SEI CERT Division's Network Situational Awareness Team (CERT NetSA) released an update (3.17.0) to the System for....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Geoff Sanders</dc:creator><pubDate>Mon, 12 Nov 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/an-analyst-focused-approach-to-network-traffic-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software and Information Assurance</category><category>Network Traffic Analysis </category></item></channel></rss>