Blog Posts Tagged with "Deep Packet Inspection"

54a9b7b662bfb0f0445d1661d7ed180b

Practical Packet Analysis

September 18, 2012 Added by:Jayson Wylie

This book details topics and features to help analyze traffic issues and identify potential problematic points to improve performance and verify the valid flow of common network communications that can help differentiate the good traffic from the bad...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Is Packet Capture Critical? Heck Yes...

September 04, 2012 Added by:Richard Stiennon

Beaconing detection is a feature in the fastest growing security solutions in the market. I am tracking most of these vendors at 100% annual growth rates, a sure sign of a trend. Intelligent packet capture is a must-have technology in every cyber defense armament...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Network Forensics: Tracking Hackers through Cyberspace

July 11, 2012 Added by:Ben Rothke

With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page twenty-five, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the business...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Cyberoam DPI Vulnerability Alarms Tor Project

July 10, 2012 Added by:Pierluigi Paganini

Tor Project found a vulnerability in Cyberoam DPI where all share the same digital certificate and the private key is the same for every device. The implications are serious, as it could be possible to catch traffic from any user by extracting the key and importing it into other DPI devices for interception...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Wireshark: Listening to VoIP Conversations from Packet Captures

June 24, 2012 Added by:Dan Dieterle

A lot of telephones and communication devices now use VoIP to communicate over the internet. I was wondering how hard it would be to listen to a VoIP phone call if you had a packet capture that included the call. Well, come to find out, it is not hard at all. The feature is built into Wireshark - here's how...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Huawei Boasts of Remote Data Interception Capabilities

June 19, 2012 Added by:Headlines

“Embedding these capabilities in any network means…(that) they can then intercept and control those networks... I am so worried about Chinese cyber warfare threats, their abilities to monitor and remotely shut down international communications networks, including critical infrastructure networks"...

Comments  (1)

54a9b7b662bfb0f0445d1661d7ed180b

The Network Intrusion Low Down

May 29, 2012 Added by:Jayson Wylie

Intrusion systems need a lot of care and attention. There are various abilities that help with administration, but if you have someone on staff whose skills and roles are as network administrator types, who like to be detectives and also have great attention to detail, then put them on the IPS...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Protecting SCADA Systems with Air Gaps is a Myth

May 21, 2012 Added by:Headlines

Speaking at AusCERT, SCADA security expert Eric Byres stated that “the whole concept of trying to protect SCADA systems with air gaps is a myth" perpetuated by those who believe "bad things will never happen to the control systems..."

Comments  (7)

924ce315203c17e05d9e04b59648a942

Tearing Away the Veil of Hype from Palo Alto Networks’ IPO

April 24, 2012 Added by:Richard Stiennon

At long last the much hyped Palo Alto Networks (PAN) has filed its S-1 in preparation for an IPO. Now that we have some visibility into PAN’s real finances it is time to address some of their claims, and perhaps throw cold water on the exuberance being expressed in some circles...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part II

July 19, 2011 Added by:Dawn Hopper

The value of the normalizer with inline mode cannot be overstated; it can reassemble entire fragmented streams as well as modify packets with illegal and/or malformed options before they reach their target. Not surprisingly, some technical documents refer to this function as packet scrubbing...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

ASA and IPS Parallel Features – Part I

July 07, 2011 Added by:Dawn Hopper

This first part of a two-part series will deal with Application Inspection and Control, sometimes referred to as DPI or Deep Packet Inspection. Rather than give detailed commands, this will serve as a high-level comparison...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch ISP KPN Admits to Deep Packet Inspection

May 23, 2011 Added by:Don Eijndhoven

On may 10th of this year at an investor meeting KPN's Director of Mobile Marco Visser played a hefty game of braggadocio by openly admitting to the use of Deep Packet Inspection (DPI) on its networks and being the first operator in the world to do so...

Comments  (0)