客戶: LogRhythm EMEA
格式: 白皮書
尺寸: 485 KB
語言: 英語
日期: 02.08.2018

Detecting Compromised Systems: Analysing the top eight indicators of threat traffic

Key indicators of a compromise can be found by analysing the network traffic from outbound connections—specifically, traffic coming from an endpoint on your internal network and connecting through your firewall to something on the internet. Focusing on this threat traffic will give your organisation visibility into early indicators of a potential threat.

The goal is to detect a compromised endpoint. Endpoint security solutions certainly assist with this aim, but whether you have such technology deployed or not, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. So, what are the best ways to identify a compromise from network traffic alone?

In this paper, we review eight sets of network-related traffic, from the potentially suspicious to the downright malicious and discuss how you can use each to detect a compromised system.

免費下載
請輸入您的聯絡資料並點擊下載按鈕。您將收到一封包含下載連結的電子郵件。
I consent to B2B Media Group GmbH with its affiliated companies and LogRhythm EMEA processing my data for marketing purposes, in particular for marketing-related contact via email and telephone.

You can withdraw your consent at any time by emailing privacy@b2bmg.com (subject: LogRhythm EMEA). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • LogRhythm EMEA
標有 * 的項為必填項