System monitoring and the use of network traffic log files are extremely important for gauging baseline performance and observing events. Why does identifying abnormal behavior first require having a baseline? What can a log file show that lends insight into abnormal behavior?
When addressing the security of a system, a baseline is a necessary feature for understanding if something has occurred. A baseline creates standards for what is either normal or abnormal activity and therefore makes it possible to differentiate the two when monitoring behavioral patterns. These kinds of patterns are saved on log files, which house information about logins, application traffic, system data, security threats, and much more. An example of abnormal behavior is logins taking many attempts, which could be a potential brute-force attack. Another example could be uncommon traffic patterns, showing signs of a potential breach. Signs like these in log files show abnormal behavior that can be beneficial in system monitoring and auditing security.