Sunteți pe pagina 1din 3

APM for Security

Forensics
Enhance Your IT Security with Post-Event
Intrusion Resolution

The right Application Performance Management (APM) solution can help IT operations deliver
superior performance for users. When incorporated into your IT security initiatives, deep
packet inspection can strengthen your existing antivirus software, Intrusion Detection System
(IDS), and Data Loss Prevention (DLP) solutions.

The ability to capture and store all activity that traverses your IT But, for every open acknowledgement, there are numerous intrusions
infrastructurelike a 24/7 security cameraenables your APM and violations that remain unreported, either because of concerns
tool to serve as the backstop of your business IT security efforts. regarding the organizations image or worse, because they have yet
This whitepaper outlines the essential product attributes required to be detected. Once an attacker is within the network, it can be very
to achieve these security objectives. difficult to identify and eliminate the threat without deep-packet
inspection.
The ominous headlines are incessant; corporate networks and IT
resources are under ever-increasing attacks from those seeking Security experts agree that the rapidly changing nature of malware,
sensitive customer or employee information. Whether from hack attacks, and government espionage practically guarantees
unfriendly governments, criminal organizations, or disgruntled your IT infrastructure will be compromised. The question is not
individuals, your critical information system assets are threatened. whether your corporate network will be compromised, but what
to do when the breach is detected. The best APM solutions offer
forensic capabilities with post-event intrusion resolution to track and
eliminate intrusions as well as fortify existing defenses to prevent
future attacks.

White Paper
We know hackers steal peoples Breach Detection
identities and infiltrate private Viruses, hacker attacks, and unauthorized accesses typically
generate a recognizable signature of packets. Full featured APM
e-mail. We know foreign countries solutions can use distributed network probes with complex
pattern-matching filters to detect these events and alert the
and companies swipe our corporate administrator to their presence on the network. These filters

secrets. Now our enemies are also specify the set of criteria under which an analyzer will capture
packets or trigger an alarm.
seeking the ability to sabotage our In the event the intrusion is initially undetected (for instance

power grid, our financial institutions, if it is perpetrated by a rogue employee inside the firewall),
the subsequent response and investigation can be conducted
and our air traffic control systems. by forensically viewing post-event traffic data. This capability
also aids in the case of compliance violations, where regulatory
We cannot look back years from now agencies often demand a full report on compromised data or

and wonder why we did nothing customer information.

APM appliances or Probes such as Observer GigaStor are


in the face of real threats to our capable of storing petabytes of packet-level traffic collected from

security and our economy. a variety of full-duplex network topologies; from the core, edge

President Barack Obama and branch. A component of the powerful Observer Performance
Management Platform, GigaStor is capable of storing up to 5 PB
2013 State of Union Address
of data, ensuring that every packet is retained for possible post-
event inspection.
Vital APM Security Features
An effective solution must offer: Security Forensics in Practice
yy High-speed (10 Gb and 40 Gb) data center traffic capture Consider this customer example: A world-wide Internet
The data center is at the core of todays IT infrastructure. Given the marketplace, with over 15 million unique website visits per month
volume and speed of trafficand therefore increase in potential and more than 2000 employees, needed an APM solution to
threatsyour APM solution must be faster. better manage and monitor their IT infrastructure. Spanning
yy Expert analytics of network activity multiple production centers and a large corporate campus, the
To find the specific illicit event among millions of legitimate packets you network incorporated in excess of 500 network devices and 5000
need analysis tools that offer deep-packet inspection to quickly assist servers. The multi-tiered and real-time nature of their mission
in determining when and where a particular anomaly or unexpected critical applications called for a solution that would quickly isolate
incident has occurred. service anomalies in order to avoid any negative revenue impact.

yy Filtering using Snort or custom user defined rules What began as three benign sounding user complaints
Snort is an open source network intrusion prevention and detection regarding slow network and application response time quickly
system that is the industry standard. The ability to filter packets against escalated into a potentially serious threat to security. The
these known threat signatures and alert when detected is critical to network engineer used a GigaStor to perform deep-packet
resolving many malware events. forensic analysis of traffic generated by one of the users
yy Event replay and session reconstruction workstations. She discovered it was sending a packet to every
Rooting out emerging threats means being able to rewind a network to device on the network; each of these destinations responded
view past events, often down to individual network conversations. in a similar fashion. This activity quickly saturated the network.
Desktop support and the security team were notified because
yy Capacity to store petabytes of traffic data for post-event analysis
an ongoing attack compromising nearly 100 users machines
Since it is often not until after intrusions occur that breaches are
appeared to be underway.
detected, it is critical network traffic is maintained for a relevant period
of timeat least 24 to 48 hours. This enables the APM solution to act
like a surveillance camera that is always on.

2 APM for Security Forensics - Enhance Your IT Security with Post-Event Intrusion Resolution
Less Secure More Secure

Firewall
Internal users
desktop
Sequential
IP + Anti-Virus

+ IDS

Once the situation was seemingly under control, the episode repeated
with the network again quickly becoming fully saturated. This caused
+ DLP
the network manager to infer that one of the users PCs was infected
with a backdoor trojan. GigaStor was used to examine network
activity, this time capturing suspicious activity at off-hours on a
+ APM Forensics SECURE

suspect laptop. With the Observer Platforms in-depth Expert Analysis,


it was determined a hacker had created an IRC chat room on the
laptop which enabled the network to be re-infected.

Conclusion: APM Forensics The


Creation of IRC chat on users Backstop to Your Security Efforts
Firewalls, anti-virus software, IDS and DLP systems are
necessary but no longer sufficient to achieve the most robust
protection or generate the paper trail for complete resolution
and documentation of breaches. With the capabilities to act like
a 24/7 network security camera by storing network traffic for
extended periods of time and perform deep packet inspection,
IRC chat is joined by hacker named APM solutions enable administrators and security personnel to
efficiently detect and root out intrusions, malware, and other
unauthorized activities within the IT infrastructure. In a world
of ever-increasing malware, hacker, and internal espionage
Hacker t3rr0r sending threats, the right APM solution can act as the final defense and
provide the quickest path to recovery.

The network manager summarized, We had implemented a robust,


best-in-class enterprise level IDS and DLP solution. Unfortunately,
none of these products identified this attack. Only GigaStor with
built-in security forensics was able to detect and determine the
root-cause.

Contact Us +1 844 GO VIAVI 2015 Viavi Solutions Inc.


(+1 844 468 4284) Product specifications and descriptions in this
document are subject to change without notice.
To reach the Viavi office nearest you, apmsecurityforensics-wp-ec-ae
visit viavisolutions.com/contacts. 30176210 901 0914

viavisolutions.com

S-ar putea să vă placă și