In many cases, previously unidentified malware and back doors were identified through the use of these indicators in both network traffic and host-based information. The combination of both host- and network-based indicators continues to be the most reliable way to identify APT-related malware on a network.
ip host reputation
Plixer is pleased to announce a new weapon in the war against Internet threats: the all new Internet Threat Center (ITC). Based on hundreds of observation points deployed across the Internet, the ITC provides a near-realtime view of malicious actors across the globe. Plixer customers gain access to the ITC via regular updates to Internet host …
Possibly the most difficult network malware to detect today is the Advanced Persistent Threat or APT. I’ve also heard them referred to as advanced targeted attacks. Before I digress on how to detect this insidious enigma, I would like to provide some history and clear up some misconceptions about this type of attack.
IT Security : NetFlow, the proposed standard for network traffic analysis (when SNMP & Port Utilization just won’t cut it), has made leaps and bounds in Internet Security during the past few years. In part one of a two part series, I’d like to demonstrate