Solved

SIEM traffic

Posted on 2016-11-07
5
59 Views
Last Modified: 2016-11-15
Dear All,

What is the meaning of Anonymizing Traffic in a SIEM. Does it mean some users are using Tor related applications?

Thanks,
T
0
Comment
Question by:TiazfaD
  • 2
  • 2
5 Comments
 
LVL 37

Expert Comment

by:bbao
ID: 41878190
do you mean you have attached a log file showing the annoying traffic for further analysis by us? if so, the log was not attached.
0
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41878290
Depends on SIEM category. But yes it should be referring to TOR which is one example of anonymised traffic. You have to trace down to machine with that idenified source ip from within your network to further confirm if user is really TOR browser or other software. You can also check content filter log with this event using anonymous website as proxy for internet surfing

https://www.logpoint.com/en/partnerships/technology-partners/2-uncategorised/221-emerging-threats
0
 

Author Comment

by:TiazfaD
ID: 41879846
Hi btan,

Can vpn traffic be categorized as Anonymizing Traffic by the SIEM.

Regards,
T
0
 
LVL 63

Assisted Solution

by:btan
btan earned 500 total points
ID: 41879876
Yes it can but normally it will be tunnelled traffic.
0
 

Author Closing Comment

by:TiazfaD
ID: 41889103
Dear All,

Thanks much for the valuable comments. Helped a lot.!

Regards,
T
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

827 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question