SlideShare a Scribd company logo
1 of 17
Download to read offline
Overview
PART I: Cyber & Our Solution
PART II: Technical Details
 Founded in 2008 by 2 R&D directors from Allot Communications
 Extensive experience in networking, infrastructure, intelligence, data aggregation
 Current customers include: government, enterprises and mobile operators
 High-performance solutions for Network Intelligence (URL Filtering, Load Balancing and
Network Analytics for Layer 7)
 Security Solutions for Network Forensics
About Agata
 Intellectual Property (IP) is not safe
 Man in the middle attacks by criminals
 Data theft
 Financial theft
 Espionage
 Organization is legally liable
Risks and Threats From Cyber
Focus on malware signatures – won't
find the infected machines
 Real-time (and Back-in-time ) analysis of data
 Find threats by:
 Analyzing unknown or suspicious files to uncover malicious behaviors
 Using packet captures (PCAP) to record the unknown traffic
 Utilizing behavioral botnet reports
 Identify unknown mobile users, known exploits, remote users
 Identify unknown geographical (and domain) sources of traffic
 Analyze download history and content
 20 Gbps Continuous packet capture with nanosec time stamping
Agata Forensics Solution
Record – Analyze - Track
 Using Agata DPI Probe for 20Gbps traffic
 High speed Layer-7 analysis (Meta data) and storage of data
 Probe Network hierarchy: Passive tapping
 Processing/collecting information based on tens of thousands of filters
 Redirecting filtered traffic to external servers for advanced analysis
 Using the following Agata capabilities:
 Filter/Layer-7 classification engine
 Traffic decapsulation (MPLS, PPoE)
 Up to 50,000 overlapping policy rules
 Rules are defined by conditions and actions
 Integration with advanced storage and analysis systems
 Filtered sessions enriched with DPI results (App ID)
Agata Use Case:
Very Large Traffic Analysis at
Asian Network (mn's of users)
DPI Engine
Data Collection
Reports
L7 Load Balancing
URL Filtering
Hardware Configurations
PART II:
Agata Technical Details
 Agata’s Network Intelligence is based on an advanced dynamic DPI engine for high speed
networks, data aggregation (big data) and analysis tools.
 Agata’s DPI based probes supports up to 20Gbps per blade.
 The probes are based on Broadcom XLP Multicore processors or Cavium Octeon.
Dynamic DPI engine
Topology
 Network analytics with sessions statistics, Protocols/Applications metadata extraction.
 The DPI engine identifies more than 1,000 applications and protocols (e.g. Skype,
Facebook, YouTube, Emails, etc.) and detects Non-standard/untrusted traffic and Traffic
headers modification.
 Provides full visibility and ability to find the relevant data with easy to use tools
 Extensive of on-demand/scheduled reports and graphs
 Extraction of network, metadata, subscribers, devices information
 Convert network traffic into content (Web pages, Emails & attachments, Instant Messages, VoIP)
 Keyword searching using regex in collected and indexed data and content
 Alerts and actions
 A centralized dashboard view
Network Analytics
 List of unknown encrypted sessions
 List of email attachments that were sent during certain time window
 Report on user’s traffic anomaly (e.g. access from Dev department to finance dep.)
 Report of sessions to unknown external geo-location
 Report on file sharing application usage: Dropbox, Skype, Google drive.
 Report on remote control sessions: SSH, Telnet, RDP, Teamviewer
 Content based reports – list of content containing specific regular expressions
 Event report (identify event anomaly such as change in protocol headers)
Cyber Forensics Reports – examples
Collected Information
Network Data Examples
• Unique ID
• Timestamp
• Site
• Subscriber Name/ID
• Statistics
 Session Duration
 Bytes In/Out
 Packets In/Out
 Live Connections
• Networking
 Source/Destination MAC addresses
 Encapsulation
 Protocol Type: IP/TCP/UDP
 Source IP and Port
 Destination IP and Port
 Protocol /Application
 Information from packet header/data
Statistics reports and graphs
Per session statistics (Bytes/Packets and Connections) on the network traffic is collected
constantly
An administrator can generate large variety of on-demand scheduled reports and graphs
The report generator interface allows drilling-down from all-network view to single session view
Metadata reports
Applications metadata is collected constantly
The system collects metadata on applications like WhatsApp, HTTP, VoIP, Emails, etc
The metadata is can be exported via csv files or SQL based DB interface.
Reports
 Advanced Layer 4 and Layer 7 load balancing
 The filters and classification engine supports up to 50,000 overlapping policy rules and
the rules are defined by conditions and actions
 The supported load balancing algorithms are:
 Round robin
 Weighted round robin
 Least loaded port
 Least connections per port
Layer 7 Load Balancer
 An online content filter demands to protect users (mobile and others) at risk
 HTTP/HTTPS support
 URL filtering by category
 File type blocking
 SSL Inspection
 Application Control
 P2P and IM blocking
 Internet applications blocking
 IP and Port blocking
 Provides social Media behaviour reports
URL Filtering
Probe – Hardware Option 1
HP Server + Cavium Octeon PCIe card
Probe – Hardware Option 2
Broadcom XLP
Thank You
Udi Levin
C. +972.544.510670
M. udi.levin@agata-solutions.com

More Related Content

What's hot

Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotServicePilot
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBALucas Ko
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Mumbai Academisc
 
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...APNIC
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)inventionjournals
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationJeanie Lo
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusSubbuBuddu
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATIONsarah ho
 
Cisco Stealtwatch
Cisco StealtwatchCisco Stealtwatch
Cisco StealtwatchRayudu Babu
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 

What's hot (18)

Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
 
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
IOT beginnners
IOT beginnnersIOT beginnners
IOT beginnners
 
Cisco Stealtwatch
Cisco StealtwatchCisco Stealtwatch
Cisco Stealtwatch
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 

Similar to Network Intelligence and Cyber Forensics Solution Overview

IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisJoachim Surich
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksSmartenIT
 
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...Motadata
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview viswesvaran d
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlowAuditor
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming InterfaceSeculert
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoringProgrammer
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Firoze Hussain
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsRick G. Garibay
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamInformaticaMarketplace
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)Jeff Green
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonCisco DevNet
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 

Similar to Network Intelligence and Cyber Forensics Solution Overview (20)

IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community Networks
 
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Network Intelligence and Cyber Forensics Solution Overview

  • 1. Overview PART I: Cyber & Our Solution PART II: Technical Details
  • 2.  Founded in 2008 by 2 R&D directors from Allot Communications  Extensive experience in networking, infrastructure, intelligence, data aggregation  Current customers include: government, enterprises and mobile operators  High-performance solutions for Network Intelligence (URL Filtering, Load Balancing and Network Analytics for Layer 7)  Security Solutions for Network Forensics About Agata
  • 3.  Intellectual Property (IP) is not safe  Man in the middle attacks by criminals  Data theft  Financial theft  Espionage  Organization is legally liable Risks and Threats From Cyber Focus on malware signatures – won't find the infected machines
  • 4.  Real-time (and Back-in-time ) analysis of data  Find threats by:  Analyzing unknown or suspicious files to uncover malicious behaviors  Using packet captures (PCAP) to record the unknown traffic  Utilizing behavioral botnet reports  Identify unknown mobile users, known exploits, remote users  Identify unknown geographical (and domain) sources of traffic  Analyze download history and content  20 Gbps Continuous packet capture with nanosec time stamping Agata Forensics Solution Record – Analyze - Track
  • 5.  Using Agata DPI Probe for 20Gbps traffic  High speed Layer-7 analysis (Meta data) and storage of data  Probe Network hierarchy: Passive tapping  Processing/collecting information based on tens of thousands of filters  Redirecting filtered traffic to external servers for advanced analysis  Using the following Agata capabilities:  Filter/Layer-7 classification engine  Traffic decapsulation (MPLS, PPoE)  Up to 50,000 overlapping policy rules  Rules are defined by conditions and actions  Integration with advanced storage and analysis systems  Filtered sessions enriched with DPI results (App ID) Agata Use Case: Very Large Traffic Analysis at Asian Network (mn's of users)
  • 6. DPI Engine Data Collection Reports L7 Load Balancing URL Filtering Hardware Configurations PART II: Agata Technical Details
  • 7.  Agata’s Network Intelligence is based on an advanced dynamic DPI engine for high speed networks, data aggregation (big data) and analysis tools.  Agata’s DPI based probes supports up to 20Gbps per blade.  The probes are based on Broadcom XLP Multicore processors or Cavium Octeon. Dynamic DPI engine
  • 9.  Network analytics with sessions statistics, Protocols/Applications metadata extraction.  The DPI engine identifies more than 1,000 applications and protocols (e.g. Skype, Facebook, YouTube, Emails, etc.) and detects Non-standard/untrusted traffic and Traffic headers modification.  Provides full visibility and ability to find the relevant data with easy to use tools  Extensive of on-demand/scheduled reports and graphs  Extraction of network, metadata, subscribers, devices information  Convert network traffic into content (Web pages, Emails & attachments, Instant Messages, VoIP)  Keyword searching using regex in collected and indexed data and content  Alerts and actions  A centralized dashboard view Network Analytics
  • 10.  List of unknown encrypted sessions  List of email attachments that were sent during certain time window  Report on user’s traffic anomaly (e.g. access from Dev department to finance dep.)  Report of sessions to unknown external geo-location  Report on file sharing application usage: Dropbox, Skype, Google drive.  Report on remote control sessions: SSH, Telnet, RDP, Teamviewer  Content based reports – list of content containing specific regular expressions  Event report (identify event anomaly such as change in protocol headers) Cyber Forensics Reports – examples
  • 11. Collected Information Network Data Examples • Unique ID • Timestamp • Site • Subscriber Name/ID • Statistics  Session Duration  Bytes In/Out  Packets In/Out  Live Connections • Networking  Source/Destination MAC addresses  Encapsulation  Protocol Type: IP/TCP/UDP  Source IP and Port  Destination IP and Port  Protocol /Application  Information from packet header/data
  • 12. Statistics reports and graphs Per session statistics (Bytes/Packets and Connections) on the network traffic is collected constantly An administrator can generate large variety of on-demand scheduled reports and graphs The report generator interface allows drilling-down from all-network view to single session view Metadata reports Applications metadata is collected constantly The system collects metadata on applications like WhatsApp, HTTP, VoIP, Emails, etc The metadata is can be exported via csv files or SQL based DB interface. Reports
  • 13.  Advanced Layer 4 and Layer 7 load balancing  The filters and classification engine supports up to 50,000 overlapping policy rules and the rules are defined by conditions and actions  The supported load balancing algorithms are:  Round robin  Weighted round robin  Least loaded port  Least connections per port Layer 7 Load Balancer
  • 14.  An online content filter demands to protect users (mobile and others) at risk  HTTP/HTTPS support  URL filtering by category  File type blocking  SSL Inspection  Application Control  P2P and IM blocking  Internet applications blocking  IP and Port blocking  Provides social Media behaviour reports URL Filtering
  • 15. Probe – Hardware Option 1 HP Server + Cavium Octeon PCIe card
  • 16. Probe – Hardware Option 2 Broadcom XLP
  • 17. Thank You Udi Levin C. +972.544.510670 M. udi.levin@agata-solutions.com