Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Verifying Cyber Implementation Best Practices With Malcolm

Conference ·
OSTI ID:2480663
Network traffic analysis can reveal a lot about what's right or wrong with a network's cybersecurity footing. Using Malcolm, a powerful open-source network traffic analysis tool suite for network security monitoring, cyber analysts and asset owners can validate cybersecurity best practices and uncover red flags in network configuration, including: proper network segmentation east-west (cross-segment) and north-south traffic unsecure or outdated network protocols authentication using clear text credentials rogue devices and services unexpected protocols (e.g., IPv6, DNS, DHCP, update checks, etc.) suspicious file transfers
Research Organization:
Idaho National Laboratory (INL), Idaho Falls, ID (United States)
Sponsoring Organization:
58
DOE Contract Number:
AC07-05ID14517
OSTI ID:
2480663
Report Number(s):
INL/CON-24-81229-Rev000
Country of Publication:
United States
Language:
English

Similar Records

Malcolm
Software · Sun May 12 20:00:00 EDT 2019 · OSTI ID:code-27142

Deconstructing the Nuclear Supply Chain Cyber-Attack Surface
Conference · Thu Jul 16 00:00:00 EDT 2020 · OSTI ID:1845443

Large-Scale Hydrogen Storage Cyber Risk Assessment
Technical Report · Tue Oct 01 00:00:00 EDT 2024 · OSTI ID:2480226