A cybersecurity analyst needs to recommend a solution to detect ongoing attacks involving unauthorized data transfers to rogue devices within the company's network. Which control would be the most effective in identifying such attacks?

a. Upgrading the company's firewall
b. Monitoring irregular peer-to-peer communication
c. Installing unauthorized devices on the network
d. Implementing a web content filtering system