Loading…
Attending this event?
THE BEST IBM i & POWER SYSTEMS EDUCATION.When you come to POWERUp, you’ll be able to customize your experience. Choose from 300 sessions, covering over 20 areas of IT, when you plan your schedule. Visit the largest Expo of its kind and meet the experts behind the solutions. Attend social events to meet renowned speakers and peers alike. This conference is structured to give you the pure education and professional connections needed to best enhance your career. Are you ready to POWERUp?

Exhibitor Hall: https://www.expocad.com/host/fx/common/s24/exfx.html

Exhibitor Hall Map Here 
Monday, May 20 • 5:50pm - 6:10pm
285: Collect Network Statistics the Easy Way

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Network statistics are collected by interface and port for specified systems every 300 seconds. Since clients and servers connect to the system randomly; collecting information over time assures that a good representative sample of actual traffic is detected. This information can be leveraged for Traffic Analysis (for measuring workloads and performance); and for Security Analysis (for determining active ports and services). Three SQL routines will be reviewed.

Learning Objectives:
We will review the Collection routine; which is mostly just running NETSTAT_INFO every 300 seconds….
We will review the Traffic Analysis code; and results.
We will review a simple use for Security Analysis.

Speakers
avatar for Tim Hawkins

Tim Hawkins

System Admin, Tanimura & Antle
When GPT3.5 is asked "What could AGI mean for computer security?"-- responseArtificial General Intelligence (AGI) could have significant implications for computer security:Enhanced Threat Detection: AGI systems could be trained to identify even the smallest behaviors of ransomwar... Read More →



Monday May 20, 2024 5:50pm - 6:10pm CDT
Meeting Room 101 1508 Houston St, Fort Worth, TX 76102
  Networking
  • Session Level Advanced
  • Audience System Administrators who will be attending the “Using SQL to drive IBM i Security scans” session; or who need to know how to capture network statistics.

Attendees (6)