Network Traffic Analysis: Setting Baselines
Q: How do you establish baselines and thresholds for network traffic analysis?
- Network traffic analysis
- Senior level question
Explore all the latest Network traffic analysis interview questions and answers
ExploreMost Recent & up-to date
100% Actual interview focused
Create Network traffic analysis interview for FREE!
Answering this question requires an understanding of how baseline and thresholds are used in network traffic analysis. Establishing baselines and thresholds for network traffic analysis helps to identify potential problems and ensure network security.
There are three steps for establishing baselines and thresholds for network traffic analysis:
1. First, an analysis of the network traffic should be conducted to determine normal patterns and behaviors. This would include looking at the type of traffic, the amount of traffic, and the sources and destinations of the traffic.
2. Next, the established baselines should be monitored to detect any anomalies or changes in the traffic. These changes may indicate malicious activity or a potential security breach.
3. Finally, thresholds should be set to alert administrators when the activity exceeds the established baseline. This will allow administrators to take appropriate action to address the issue.
For example, if the established baseline for web traffic is that only 10% of the traffic is coming from external sources, and the threshold is set to alert when more than 15% of the traffic is coming from external sources, administrators will be alerted when the traffic exceeds 15%. This will allow administrators to take appropriate action to address the issue and ensure network security.
There are three steps for establishing baselines and thresholds for network traffic analysis:
1. First, an analysis of the network traffic should be conducted to determine normal patterns and behaviors. This would include looking at the type of traffic, the amount of traffic, and the sources and destinations of the traffic.
2. Next, the established baselines should be monitored to detect any anomalies or changes in the traffic. These changes may indicate malicious activity or a potential security breach.
3. Finally, thresholds should be set to alert administrators when the activity exceeds the established baseline. This will allow administrators to take appropriate action to address the issue.
For example, if the established baseline for web traffic is that only 10% of the traffic is coming from external sources, and the threshold is set to alert when more than 15% of the traffic is coming from external sources, administrators will be alerted when the traffic exceeds 15%. This will allow administrators to take appropriate action to address the issue and ensure network security.


