首頁 > 最新消息
News最新消息
    • 2014
    • -
    • 03
    • -
    • 02
  • 網絡攻擊分析的四大要點

      by WildPackets公司。
     

    在這個複雜攻擊的時代,網絡取證(network forensics )是每個企業主關心的信息或系統的安全性的一個重要功能。當系統發出通知提醒您的IT團隊有潛在破壞的那一刻,你會有一系列的問題想要了解底發生了什麼? 什麼傷害已經造成?安全性是如何被破壞?您是否可以重現攻擊以確保它不會再次發生?以下是如何得到你所需要的答案:

     

    1). 網絡記錄和分析 - 最佳的一流的網絡記錄提供了一套完整的實時統計數據,快速的數據收卷,同時實時網絡監控,快速搜索和收集數據的取證分析。一個第一流的解決方案,在10G和40G甚至網絡網絡中斷或入侵可以被識別,分析,重構,和解決。

     

    2). 搜索和檢查 - 不是花時間在Log Files中尋找問題,網絡取證(network forensics )的搜索和檢測技術,可以讓管理員和安全專業人員在存檔的網絡流量中找出安全事件的跡象。

     

    3). 趨勢分析和基線 - 通過對於網絡和應用程序使用的刻畫規範或基線,安全人員能夠更好地檢測到違規行為。趨勢分析有助於發現出現在網絡上的問題,並可能防止其再次發生。它也提供網絡規劃團隊有關預期的網絡增長的資訊。

     

    4). 報告 - 通過捕捉數據和分析轉成報告,讓安全和IT專家們可以記錄他們的調查結果和檢討攻擊發生後網絡上可能的曝光點。

     
    網絡取證(Network forensics)對您的組織提供網絡全貌,使其更容易確認已發生的攻擊。不幸的事實是,網絡入侵是不可能停止的。關鍵是要盡可能在事件發生前作最好的準備。

    關於WildPackets的網絡取證解決方案的更多信息,請點擊這裡。

     

    The Four Pillars of Cyber Attack Analysis

     

    In this age of sophisticated attacks, network forensics is an essential capability of every business owner concerned about the security of information or systems. The moment that a notification alerts your IT team of a potential breach, you need to make sense of exactly what happened by answering a series of questions. What damage has been done? How was security breached? Can you reproduce the attack in order to ensure that it won’t happen again? Here is how to get the answers that you need:

     

    Network Recording and Analysis – Best-in-class network recording offers a complete set of real-time statistics, quick data rewinding, simultaneous real-time network monitoring, and rapid search and forensic analysis of collected data. With a top-flight solution, network disruptions or intrusions on 10G and even 40G networks can be identified, analyzed, reconstructed, and resolved.

     

    Searching and Inspection – Rather than spending time wading through log files in order to find irregularities, network forensics search and inspection technology allow administrators and security professionals to pinpoint signs of security events in archived network traffic.

     

    Trend Analysis and Baselining – By characterizing norms—or baselines—for network and application usage, security personnel are better able to detect irregularities. Trend analysis helps to find problems that appear on the network and possibly prevent them from reoccurring. It also provides input to network planning teams about anticipated network growth.

     

    Reporting – By capturing data and distilling analysis reports, security and IT experts log the results of their investigations and review possible points of network exposure after an attack has taken place.

     

    Network forensics presents your organization with a complete picture of your network, making it far easier to confirm that an attack has occurred. The unfortunate truth is that network invasions are unlikely to stop any time soon. The key is to be as prepared as possible in the event that it happens to you.

     

    For more information on WildPackets’ network forensics solutions, click here.