Honeynet technology to spy out the purpose of intrusion and
Specialties of Trapnet
Enticing
Create a real-like environment to guide the penetration of attackers into systems vulnerable to information protection
Collection & Analysis
Detection and analysis of actual threats using protocol-specific intrusion detection and extraction and DPI based log collection
Visualization
Intuitive interface to help you identify significant trends in large attack logs
Management
Provides expanded structure, such as honeynet operational burden reduction and bandwidth, by simplifying virtual server management
Expectation effectiveness of Trapnet
- Increasing the cost toward attacker through corresponding response at spy level
- Visibility into domestic active vulnerability scanning and hacking attempts
- Providing legal response and evidence through acquisition of evidence for infringement
- Ability to establish countermeasures against critical vulnerabilities through attacker’s detection of spying and hacking trends
- Based on information on key vulnerable section identification and breach types, trends, and response priority guide
When to get help with Trapnet
- If you need a basis to respond to tracking / legislation based on spyware analysis and evidence acquisition.
- If you need guidance on generating a list of infringing IPs and key response guidelines for proactive threats.
- If you need to respond to vaccine- and sandbox-based detection failures.
- If a detection service for the risk of second infringement is required after an infringement incident.
- If you need to operate an environment that is vulnerable to information protection or an APT alarm service.
What is main features of Trapnet
Unified virtual server management
Administrative support such as domain registration / modification / deletion of virtual server group for inducing honeynet infringement traffic<br /> Simplified management of virtual information gathering equipment<br /> Simplified management of available network resources and domains<br /> Virtual server and service (port) management for virtual honeynet infringement historyDetecting infringing traffic through network data collection and analysis
- Support for individual sessions, PCAP format storage and download
- User policy assignment of key protocol-based malicious patterns such as HeartBleed
- Report on the calculation and classification of response priorities according to infringement cycle, attack characteristics, characteristics of infringing traffic scale
- Automated calculation of origin and destination country information of infringing traffic and infringement IP distribution report by country, trial and ISP
Detecting infringing traffic through network data collection and analysis
- Support for individual sessions, PCAP format storage and download
- User policy assignment of key protocol-based malicious patterns such as HeartBleed
- Report on the calculation and classification of response priorities according to infringement cycle, attack characteristics, characteristics of infringing traffic scale
- Automated calculation of origin and destination country information of infringing traffic and infringement IP distribution report by country, trial and ISP