Behavior-Based Security
Behavior-based security is a form of threat detection that
does not rely on known malicious signatures, but instead uses
informational context to detect anomalies in the network. Behavior-based
detection involves capturing and analyzing the flow of communication
between a user on the local network and a local, or remote destination.
These communications, when captured and analyzed, reveal context and
patterns of behavior which can be used to detect anomalies.
Behavior-based detection can discover the presence of an attack by a
change from normal behavior.
-
Honeypots - A Honeypot is a behavior-based
detection tool that first lures the attacker in by appealing to the
attacker’s predicted pattern of malicious behavior, and then, when
inside the honeypot, the network administrator can capture, log, and
analyze the attacker’s behavior. This allows an administrator to gain
more knowledge and build a better defense.
-
Cisco’s Cyber Threat Defense Solution Architecture
- This is a security architecture that uses behavior-based detection
and indicators, to provide greater visibility, context, and control. The
goal is to know who, what, where, when, and how an attack is taking
place. This security architecture uses many security technologies to
achieve this goal.
No comments: