Corporate Partners

Detecting APT Activity with Network Traffic Analysis

Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Download Whitepaper
Related Whitepapers
Thanks for downloading Detecting APT Activity with Network Traffic Analysis. Here are some other white papers that we feel may be of interest to you given your recent download:
  • Meizhou Municipal Information Centre provides information services to the municipality of Meizhou, China, which has a population of 5.5 million people. The Information Centre is part of the Bureau of Economy and Information, and serves 1,000 municipal and county government bodies. The Meizhou Municipal Information Centre’s small staff provides and maintains information services to the city through the government portal site, extranet and data center. The IT staff wanted to avoid downtime and improve backup and recovery. Download whitepaper »

  • Organizations across the globe are finding disaster recovery increasingly important for a number of reasons. This white paper explains how virtualization technology can solve the cost vs. time dilemma traditional data recovery solutions pose, enabling organizations to quickly and cost effectively recover all server workloads. Download whitepaper »

  • Managing your data center means more than just keeping your server workloads running; it also means protecting these workloads. After all, servers are costly: You incur physical costs, such as capital, power and cooling costs, as well as software licensing and support costs. If your servers are worth all this expense, they’re worth protecting from unexpected downtime. Download whitepaper »

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place