Network Traffic Analysis and Intrusion Detection System – Deep Discovery

With Trend Micro Deep Discovery, you get a tool for a network traffic analysis and intrusion detection system. In addition to detecting advanced attacks, you also get overview of the communications of all devices.

Functionality:

Traffic monitoring with support for more than 100 protocols, for example:

Basic: DHCP, DNS, FTP, HTTP, HTTPS, ICMP, TFTP, SSH, NTP, TCP, UDP, WebSocket
Authentication: Kerberos, RADIUS
File: CIFS, DCE-RPC, SMB, SMB2
Communication: IMAP4, IRC, LDAP, POP3, SMTP, Gmail, Hotmail, Yahoo Mail, AIM, Skype,Yahoo,
P2P: Bittorrent, Direct Connect, eDonkey, Gnutella…
Administration: TELNET, RDP, VNC,
OT: MODBUS, SCADA
Databases: MSSQL, MYSQL, ORACLE, POSTGRES, SQL
VoIP: RTMP, RTSP, WMSP, SIP2
ARP, IGMP, IP, SNMP

Detection of unknown servers and services (based on whitelisting)
Domains, IP addresses/ranges, Kerberos, Active Directory, FTP, SMTP, HTTP/S proxy, domain controller, database server, file server (SMB), radius, web server, vulnerability scanner (e.g. Nessus, Nexpose…), JA3, JA3S

Attacker detection
The solution detects: Vulnerabilities (CVE), Hacking tools (e.g. Cobalt Strike, Metasploit, Meterpreter, PsExec…), Ransomware activity, use of Exploits and more.

Configurable sandboxing for Windows
Set up custom applications and specific versions (e.g. Office, Adobe Reader…)
Custom language version settings
File support: exe, dll, vxd, doc, jtd, msg, ppt, xls, cell, xml, docx, xlsx, pptx, rtf, swf, pdf, chm, jar, class, lnk, cab, mime, js, jse, ps1, vbe, vbs, hta, cmd, bat, htm, hta, xdp, rar, 7zip, pkzip, lzh, arj, gzip, jpg, gif, quicktime, pub, svg, html, slk, igy, url, csv, xht, xhtml, mht, mhtml, com

MacOS Analysis
For systems with macOS OS, executable files can be analyzed – macho, dmg, pkg

Android Analysis
For android OS systems, executable files can be analyzed – Apk

Sharing threats with other solutions
Native sharing with TippingPoint, Checkpoint, PaloAlto, IBM
Via API – Fortinet, BlueCoat and more
Ability to share findings and threats in YARA, STIX, and TAXII formats.
Based on analysis of the generated message, PCAP, OpenIOC and STIX file
Pairing logs/detections with MITRE techniques/tactics

EXTENSION with Deep Discovery Analyzer – sandbox analysis

Specific file types analysis
Ability to analyze “any” file type even at the cost of an unsupported vendor type (e.g.JPG/TIFF/PNG, etc. and connect to a specific image viewer installed in the Sandbox virtual environment)

Email submission
With the email sending feature, Deep Discovery Analyzer can receive and analyze email messages from enabled sender domains and SMTP servers.

CIFS/NFS submission
Automatic files scanning in network folders via CIFS or NFS

CLOUD submission
Automatic files scanning in network folders on cloud storage in AWS (S3 bucket) or Azure (Blob)

API submission
Ability to upload files for analysis via API

High sandbox performance
Up to 38,000 samples per day per 1 HW box analyzed

Sandbox support for Linux
Linux operating systems can also be created and analyzed

Detailed report on the activity of the analyzed samples
Detailed analysis of PDF/HTML file (what activity the file performed on which operating system – a clear comparison of what files were attacked after opening PDF/ZIP, etc., what stages/types of attack the file shows and their numbers.

Advanced analysis capabilities
Support of 100 MB of large files or more
Insertion of a password dictionary to decrypt files (archives, pdfs, files encrypted in MS Office)
Extraction of nested archives

Support of domains of Act No. 69/2019 Coll. on cybersecurity

  • Cybersecurity and information security risk management,
  • Security in the operation of information systems and networks,
  • Evaluation of vulnerabilities and security updates,
  • Protection against malicious code,
  • Network and communication security,
  • Acquisition, development and maintenance of information networks and information systems,
  • Event recording and monitoring,
  • Solving cybersecurity incidents.

Solution partner:

Key advantages:

  • Increase the overall visibility of network security (see functionalities)
  • Protection against zero-day vulnerabilities and advanced attacks
  • Support Incident Response Activities
  • Advanced email communication protection (phishing)
  • Central sandbox environment for other security solutions

Interested in network analysis and detection?