tcp attack detection http attack detection udp attack detection - intel… · 2018-04-30 ·...

2
TCP Attack Detection FTP Attack Detection HTTP Attack Detection ICMP Attack Detection UDP Attack Detection DNS Attack Detection VoIP Attack Detection Abnormal packet Attack Detection Signature based Detection Region based Detection Zero-Day Attack & Unknown Attack Detection 64 byte* Throughput Designated DDoS product that have passed all performance and functional testing of the CC certification criteria

Upload: others

Post on 17-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: TCP Attack Detection HTTP Attack Detection UDP Attack Detection - Intel… · 2018-04-30 · Applyflexible security policy that is suitable for Network environment with protection

TCP Attack Detection

FTP Attack Detection

HTTP Attack Detection

ICMP Attack Detection

UDP Attack Detection

DNS Attack Detection

VoIP Attack Detection

Abnormal packet Attack Detection

Signature based Detection

Region based Detection

Zero-Day Attack &Unknown Attack Detection

64 byte*Throughput

Designated DDoS product that have passed all performance and functional testing of the CC certification criteria

Page 2: TCP Attack Detection HTTP Attack Detection UDP Attack Detection - Intel… · 2018-04-30 · Applyflexible security policy that is suitable for Network environment with protection

Threat Analysis

Provide Threat InformationDistribute coping method

Signature DBBlacklist DB

Collect ThreatInformation

isthe Next Generation Network Security Solution to actively cope withthe persistingly changing security threats with the long yearsof know-how of SECUI, the No. 1 Network security company of Korea.

Recently, the DDoS attacks occur frequently across the society at large and It is difficult for the existing Anti-DDoS devices withthreshold-based detection engine to manage, since the attack has evolved, the purpose of attacks has cleared and they forminto a systematic shape. In order to cope with the persistingly changing DDoS Attack, advanced Anti-DDoS device is necessary

Provide wired-speed through optimized architecture with 64 bit Secui OS(TM) and high performance multi-core platformApplyflexible security policy that is suitable for Network environment with protection domain and protection profileBlock and detect detailed DDoS attacks with multi-layer detection enginesSettle the effective defense system with the threat management system and information security center

·

·

·

·

Supply 64 Bit OSand Multi-CoreLoad balancingprocess technology toeffectively use themulticore (SC FDE)Provide Wire-speed

· Detection and Block ofvarious DDoS attack(SM DDE)Support Snort, PCREInterwork withAnti-Bionet Solution

· Protection Domain /Protection profileComposed with In-Lineand Out-of-Path

· overall monitoringReal-time Dash boardsecurity policy SearchDetailed Log and report

·

·

·

·

··

·

·

·

HighPerformance Accuracy Flexibility Visibility Early warning system by interwork with STMS

- Interwork with Overall management, monitoring, Log management- SECUI MFD, SECUI MF2, SECUI MFI product analysis and threat management

Effective defense system with Secui security center

- Continuous update of DDoS designated signature- Accident prevention with blacklist information by malware analysis based cloud

Apply flexible DDoS protection policy that is suitable for Networkenvironment with virtual Domain

- Network setting as physical and logical virtual domain- Flexible security policy application with seperate profile designation per domain

Minimize the intervention of administrator by convinient settingand managing function.

- Able to check real-time attack status with overall dashboard and real-time monitoring function- Support security policy search and log based convinient security policy setting

Prevent the intrusion accident with zombie PCdetection/block solution

- Interwork with bot infected PC detect solution- Block the DDoS attack and prevent the internal information leak

Detect and block the various DDoS attack from IP layer toapplication layer

- Perfect detection from Flooding Attack to various application layer attack- DDoS attack detection for each countries by automatic learning

Abnormal protocoldetection

Service denyingdetection

Blacklist detection Application layerdetection

Automatic learningdetection

Protocol vunerabilitydetection

Region based detection Signature based detection

Abnormal protocol detection

Blacklist detection

Automatic learning detection

Region based detection

Service denying detection

Application layer detection

Protocol vunerability detection

Signature based detection

Local Network

Learning-based detection

Learning-based detection

Application layer detection

Region based detection

Region based detection

Protocol vunerability detection

Signature based detection

Service denying detection

Malicious trafficcopy and analysis

Zombie PC detection solution

Zombie detection resulttransmission

Attack command block Block the DDoS &Information leakage attempt

Overall Dashboard Global attack status

Interwork