SlideShare una empresa de Scribd logo
1 de 57
Descargar para leer sin conexión
Network Forensics
for Wired and Wireless Networks
Jay Botelho
Director of Product Management
WildPackets
jbotelho@wildpackets.com
Follow me @jaybotelho

Show us your tweets!
Use today’s webinar hashtag:

#wp_networkforensics
with any questions, comments, or feedback.
Follow us @wildpackets
© WildPackets, Inc.

www.wildpackets.com
Administration
• All callers are on mute
‒ If you have problems, please let us know via the Chat window

• There will be Q&A
‒ Feel free to type a question at any time

• Slides and recording will be available
‒ Notification within 48 hours via a follow-up email

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

2
Agenda
•
•
•
•
•
•
•
•

What Is Network Forensics?
Myths/Realities in Network Forensics
Configuring Your Network for Forensics
Wired vs. Wireless Network Forensics
Use Cases

Performing Forensic Analysis
WildPackets Corporate Overview
WildPackets Product Line Overview

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

3
What Is Network Forensics?

© WildPackets, Inc.

www.wildpackets.com

4
What is Network Forensics ?
• Marcus Ranum is credited with defining Network
Forensics as “the capture, recording, and analysis of
network events in order to discover the source of
security attacks or other problem incidents.”
(wikipedia)

• It’s not like TV – employ forensics before the “crime”
- network traffic is transmitted and then lost, leaving
no clues behind

• Other names: packet mining, packet forensics, digital
forensics

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
What Purpose Does It Serve ?
• Allows us to find the
details of network events
after they have happened

• Eliminates the need to
reproduce network
problems

• Distill data to manageable
levels by employing
filters and analysis

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Network vs. Security Forensics
• Network forensics is a superset of security forensics
• Forensics is not just DPI (Deep Packet Inspection)
• Requires the lossless capture, storage, and analysis
of extremely large data volumes

• Network forensics: enterprise vs. lawful intercept
‒ Concerned with the process of reconstructing a network event
• Network or infrastructure outage
• Intrusion such as a “hack” or other penetration
‒ Provides a recording of the actual incident

• Based on live IP packet data captures
‒ A new way of looking at trace file analysis
‒ Continues from where traditional network troubleshooting ends
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Network Forensics Drivers
• Faster networks/greater data volumes
‒ 10/40G adoption grew 62% in 2012
‒ 75% of the investments in networking are for 10G1

• Richer data
• Subtler and more malicious security threats
‒
‒
‒
‒

Zero-day attacks
APTs (Advanced Persistent Threats)
75% of data breaches financially motivated
66% of breaches took months or longer to discover2

• Sampled data and high-level stats
‒ Flow-based network monitoring vs. detailed DPI analysis
1

http://www.infonetics.com/pr/2013/2H12-Networking-Ports-Market-Highlights.asp

2 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

8
Why Forensics?
• Validate what your logs are telling you
• Generate alarms/alerts on data you’ll never find in
logs

• Invest time analyzing, not reproducing
• Immediately begin investigating the issue – you have
a recording of the incident!

• Isolate key data – from multi-TB archives - rapidly
and intuitively

• Understand the depth of penetration for any incident

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Myths/Realities in Network
Forensics

© WildPackets, Inc.

www.wildpackets.com

10
Network Forensics

85%

The number of respondents that feel
network forensics is a necessity at 10G

31%

The number who are using network
forensics at 10G

The State of Faster Networks, WildPackets, Oct 2013
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

11
Network Forensics Usage
12%

For security
purposes

28%
For monitoring
intermittent network
issues
For monitoring
intermittent
application issues
For 24/7 transaction
analysis

24%

36%
The State of Faster Networks, WildPackets, Oct 2013
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

12
Challenges with Network Forensics

The State of Faster Networks, WildPackets, Oct 2013
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

13
10G – Driving Network Forensics Usage
 100 Participants
 Company size:

 43% - Large organizations
 26% - Medium
 31% - Small

 Functional Breakdown
 84% - Network Engineer
 15% - IT Director
 1% - Executive

The State of Faster Networks, WildPackets, Oct 2013
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

14
10G – Driving Network Forensics Usage

The State of Faster Networks, WildPackets, Oct 2013
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

15
The Implications of Doing Nothing
 64% of organizations reported that managing
network performance has become more complex
over last 12 months

 Organizations are losing on average $72,000 per
minute of unplanned network downtime

 48% of organizations reported that, on average,
they spend more than 60 minutes on repairing
performance issues - per incident
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Configuring Your Network for
Forensics

© WildPackets, Inc.

www.wildpackets.com

17
Requirements for a Network Forensics Solution
• Capturing and recording data
‒
‒
‒
‒

10/40G network support
No dropped packets – 100% fidelity
Continuously available
Always test in your environment

• Discovering data
‒ Timely results delivery
‒ Filtering for IP addresses, applications, etc.

• Analyzing data
‒ Automated analysis – Expert events
‒ Simple, intuitive workflow
‒ Data visualization from multiple perspectives
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

18
10G Network Analysis Workflow
Deploy 24x7
Monitoring

Identify Key
Analysis Pts

NO

Alarms/
Alerts

Problem?
YES

Rewind
Data
#wp_forensics

Analyze

Network Forensics for Wired and Wireless Networks

Tune if
Necessary
© WildPackets, Inc.
A Solution for Every Network

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

20
Data Capture from High-Speed Links

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Forensic Analysis – Capturing An Attack
2. Data Recorder records
and aggregates data
throughout attack

IDS/IPS System

3. Event logged, attack
partially tracked by IDS

Servers

1. Attack
bypasses firewall

#wp_forensics

4. Post event analysis reveals
attacker, method, damage!

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
10G Network Data Storage
• 1Gbps steady-state traffic assuming no storage
overhead:
7.68 GB/min
460 GB/hr
11 TB/day
2.9 days in a 32TB appliance

• 10Gbps:
76.8GB/min
4.6 TB/hr
110 TB/day
28 hours in a 128TB appliance
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Wired vs. Wireless Network
Forensics

© WildPackets, Inc.

www.wildpackets.com

24
802.11ac – Breaking the Gigabit Barrier

Gratuitous clipart - Please ignore

11 Mbps
1-2 Mbps 802.11b
<1 Mbps 802.11 1997 550%
100%
Proprietary
1989

#wp_forensics

1991

1999

433/866/1300+ Mbps
802.11ac
288% (vs. 450)
(to 6.93 Gbps)
300/450/600 Mbps
802.11n
54 Mbps
833%
802.11g/a
490%

2003

2009

2013

Source: Farpoint Group
Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

26
Additional Drivers for Wireless Forensics
• BYOD
‒ No configuration control
‒ Limited or no access to the end-user device
‒ Problems reported “after the fact”

• Point-of-Presence required
‒ Wireless data must be captured within a few hundred feet of the
device
‒ Vastly more collection points than for wired forensics

• Data volumes that rival wired data
‒ 1.3Gbps will be common with 802.11ac
‒ Mobile devices outnumbering wired devices

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

27
Wireless Forensics Solution
• As wireless approaches wired
speeds, it’s time to start
relying on the wire

• Distributed analysis using
deployed assets – APs – is the
only effective solution as
wireless speeds grow

• 24/7 capture/analysis ensures
problems aren’t missed

• Recording enables wireless
forensic analysis
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

28
Wireless Forensics Benefits
• Reduce MTTR

• Prioritize analysis tasks

‒ No need to reproduce a
problem
‒ No need to wait for it to
happen again

• Increase WLAN service
uptime
‒ WLANs are now missioncritical
‒ Mobility implies you won’t be
near the problem

‒ Deal with emergencies
immediately
‒ Handle routine investigations
as time permits
‒ Save data for long-term
analysis

• Reduce reaction time
‒ Data are always available for
analysis

• Reduce analysis costs
‒ A single solution for wireless
and wired analysis

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

29
Use Cases

© WildPackets, Inc.

www.wildpackets.com
Use Cases for Network Forensics
• Finding proof of a security attack
• Troubleshooting intermittent performance issues
• Monitoring user activity for compliance with IT and
HR policies

• Identifying the source of data leaks
• Monitoring business transactions
• Verifying VoIP and video over IP performance

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

31
Best Practices for Network Forensics
Capturing Network Traffic
1. Capture traffic continuously
2. Deploy a solution that captures traffic reliably
3. Set up filters to catch anomalies
Storing Traffic

4. Allocate sufficient storage for the volume of data
being collected
5. Adjust file sizes for the desired performance
optimization
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

32
Best Practices for Network Forensics
(cont.)
Analyzing Traffic
6. Select a network forensics solution that supports
filters and searches that are fast, flexible, and
precise
7. Record baseline measurements of network
performance
8. Use filters to zoom in on the problem at hand

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

33
Performing Forensic Analysis

© WildPackets, Inc.

www.wildpackets.com
WildPackets – The Network Forensics Myth Buster
Myth

Busted

Can’t analyze at 10G line rate
Dropped packets
Captured data is not reliable
Inability to collect packets at all network locations
Inadequate real-time stats

Real-time analysis no longer an option
Limited visibility into VoIP
Inability to analyze/search recorded traffic
No end-to-end visibility into application transactions
Limitations in security monitoring

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.

35
Q&A
Show us your tweets!
Use today’s webinar hashtag:

Follow us on SlideShare!

#wp_forensics

Check out today’s slides on SlideShare
www.slideshare.net/wildpackets

with any questions, comments, or feedback.
Follow us @wildpackets

© WildPackets, Inc.

www.wildpackets.com
WildPackets Corporate Overview
Optimizing Network and Application Performance

© WildPackets, Inc.

www.wildpackets.com
Corporate Background
• Experts in network monitoring, analysis, and troubleshooting
‒ Founded: 1990 / Headquarters: Walnut Creek, CA
‒ Offices throughout the US, EMEA, and APAC

• Customers spanning leading edge organizations
‒ Mid-market and enterprise lines of business
‒ Financial, manufacturing, ISPs, major federal agencies,
state and local governments, universities
‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000

• Award-winning solutions that improve network performance
‒ Internet Telephony, Network Magazine, Network Computing awards
‒ United States Patent 5,787,253 issued July 28, 1998
• “Apparatus and Method of Analyzing Internet Activity”
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Why Our Customers Need Us
• VoIP, video, cloud, virtualization, and key business
applications are saturating critical network services

• Evolving network technologies create discontinuities
‒ 1 Gig  10 Gig  40 Gig  100 Gig networks
‒ Wireless, BYOD initiatives

• Users and business can not tolerate network
problems for mission critical services
Increasing demand for better real-time network visibility,
network analytics, network forensics, and DPI
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
How We Create Value
We provide innovative, industry-leading, real-time
network performance management solutions
‒ Easy-to-use, easy-to-learn user interface
‒ Uniquely extensible solutions
‒ Wireless network leadership
‒ Detailed analytics related to network applications
‒ Fastest network traffic capture appliance in its class
‒ Technical superiority at competitive price point
WildPackets has continually advanced its solution to meet the needs of its
customers

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Unprecedented Network Visibility
NETWORK HEALTH

GLOBAL

WatchPoint can manage and report on key
device performance and availability across
the entire network, from anywhere on the network.

UNDERSTAND END-USER PERFORMANCE

DISTRIBUTED

Omnipliance network analysis and recorder appliances monitor
and analyze performance across critical network
segments, virtual environments, and remote sites.

PINPOINT NETWORK ISSUES ANYWHERE

PORTABLE

Omnipliance Portable can rapidly identify and troubleshoot
issues before they become major problems—wired or
wireless—down the hall or across the globe.

ROOT-CAUSE ANALYSIS

DPI
#wp_forensics

OmniPeek network analyzer performs deep packet inspection
and can reconstruct all network activity, including e-mail and
IM, as well as analyze VoIP and video traffic quality.

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
A History of Innovation
2001

2005

2009

2011

• First 802.11
wireless analyzer
• First network
analyzer with
automated expert
analysis

Combined
distributed
network and
VoIP
network
analysis

Innovative
dashboard
with drill-down for
VoIP
and video

• Total visibility with
zero packet loss
• First wireless
network analyzer to
support capture and
analysis of 802.11n
3-stream wireless

2008

2010

2012

2013

Distributed real-time
Enterprise-wide
troubleshooting Monitoring and Reporting

First to achieve 11
Gbps sustained
capture-to-disk

• Capture, record, and
analyze from 40G
network segments
• First wireless network
analyzer to support
801.11ac, k, r, u, v, w

Industry
leading
network
analysis and
recorder
appliances

2003

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Product Line Overview

© WildPackets, Inc.

www.wildpackets.com
Omni Distributed Analysis Platform
OmniPeek
Enterprise Packet Capture, Decode and Analysis
• Ethernet,1/10 Gigabit, 802.11, and voice and video over IP
• Portable capture and OmniEngine console
• Aggregate analysis data across multiple capture points

Omnipliance
Network Analysis and Recorder Appliances
• High-performance packet capture and real-time analysis
• Stream-to-disk for forensics analysis
• Integrated OmniAdapter network analysis cards up to 40G

WatchPoint
Centralized Enterprise Network Monitoring Appliance
• Aggregation and graphical display of network data
• WildPackets OmniEngines
• NetFlow and sFlow
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Omni Distributed Analysis Platform
Software and Turnkey Solutions
• Enterprise monitoring and reporting
‒ WatchPoint Server
‒ OmniFlow, NetFlow, and sFlow Collectors

• Network Analysis and Recorder Appliances
‒ Omnipliance CX, MX, TL
‒ Optional OmniStorage
‒ OmniAdapter analysis cards

• Distributed analysis software
‒ OmniPeek – Enterprise, Professional, Basic, Connect
‒ OmniPeek Remote Assistant
‒ OmniEngine Enterprise

• Portable solutions
‒ OmniPeek network analyzer
‒ Omnipliance Portable
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
OmniPeek Network Analyzer
• Distributed analysis manager
– Connect to and configure distributed OmniEngines and Omnipliances,

• Comprehensive dashboards present network traffic in real-time
– Vital statistics and graphs display trends on network and application
performance
– Visual peer-map shows conversations and protocols
– Intuitive drill-down for root-cause analysis of performance bottlenecks

• Visual Expert diagnosis speeds problem resolution
– Packet and payload visualizers provide business-centric views

• Automated analytics and problem detection 24/7
– Easily create filters, triggers, scripting, advanced alarms, and alerts

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
OmniPeek Remote Assistant
Distributed, End-user Packet Capture Made Simple
• Simple to deploy, simple to use
‒ Remote push, download from server, or even
email
‒ Simple user interface - eliminates confusion for
end user
‒ Full fidelity capture - see exactly what the PC
sees
‒ Wired or wireless

Trouble call from remote site network response is slow.

• Encrypted file
‒ Only the analyst can open it
‒ Different encryption keys for different locations
or customers

User downloads and installs
OmniPeek Remote. Encrypted capture
data sent back for analysis.

• Detailed client-side/end-user experience
analysis

• Perfect for Tech Support or IT Desktop
support
#wp_forensics

Network Forensics for Wired and Wireless Networks

Network analyst uses OmniPeek
Enterprise to quickly troubleshoot
problem without leaving the office.
© WildPackets, Inc.
OmniWiFi USB WLAN Capture Adapter
• A single device for all WLAN packet capture needs
• Driver included with Omni v7.9 CDs
• Tested and supported with OmniPeek and OmniEngine

• Product features:
•
•
•
•
•
•

USB device with extension cable
Dual band operation – 2.4GHz and 5GHz
Supports all standard international 802.11 channels (a/b/g/n)
Supports 802.11n - 3 transmit/receive streams (450Mbps)
Supports 802.11n 20MHz and 40MHz channel operation
Supports multi-channel aggregation and roaming

• Technical Details:
‒ Size (LWH): 6 inches, 1.5 inches, 5.5 inches
‒ Weight: 5.6 ounces

NOTE:
• Capture ONLY – no network services
• Does not capture 802.11ac

• Available via Amazon - $99/each
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
New Network Analysis and Recorder Appliances

Powerful
Precise
Affordable
The new family of WildPackets Network Analysis and Recorder
appliances gives IT organizations powerful and precise analysis of
high-speed networks in an affordable solution with half the
hardware footprint of rival offerings.

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Powerful
‒ Fastest network recorder in its class! Captures traffic up to 20Gbps of realworld traffic (all size packet distribution)
‒ Scales up to 128 TB of storage
‒ Provides simultaneous real-time analysis and a comprehensive Forensic
Search that rapidly searches through terabytes of captured traffic for the
details relevant to an investigation

Precise
‒ Captures complete network traffic, so you can analyze everything, not just
samples or high-level statistics
‒ Doesn’t drop packets or sacrifice accuracy for speed
‒ Supports rich, detailed analysis, including VoIP and video-over-IP traffic

Affordable
‒ Delivers outstanding price/performance (lower price; half the rack space)
‒ Allows mix of 1G/10G/40G interfaces without buying extra appliances
‒ Solutions start at $16,995

Your network is bigger and faster. Now your analysis solution is, too.
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Omnipliance TL
Industry Leading Network Analysis and Recorder Appliance

• Sets a new standard in capture-to-disk speeds
‒ 20Gbps sustained capture to disk rate with zero packet drop

• Best price/performance Network Analysis Appliance
in the market
‒ 20Gbps with only one Omnipliance TL + OmniStorage
‒ Consuming less rack space, less cooling, less electrical power

• Most flexible network interface offering
‒ 1G/10G/40G interfaces supported in a single unit eliminates
additional unit requirement

• Most accurate real-time analytics
‒ Packet-based processing and analysis vs. inaccurate samplebased calculation
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
WildPackets Network Analysis Recorder Appliances
Price/Performance Solutions for Every Application

Portable

Omnipliance CX

Omnipliance MX

Omnipliance TL

Ruggedized
Troubleshooting

Less Demanding Networks
Remote Offices

Datacenter Workhorse
Easily Expandable

Enterprise, HighlyUtilized Networks

Aluminum chassis / 17” LCD

1U rack mountable chassis

3U rack mountable chassis

3U rack mountable chassis

24GB RAM

16GB RAM

32GB RAM

64GB RAM

2 PCI-E Slots

2 PCI-E Slots

4 PCI-E Slots

4 PCI-E Slots

2 Built-in Ethernet Ports

2 Built-in Ethernet Ports

2 Built-in Ethernet Ports

2 Built-in Ethernet Ports

6TB Storage

4/8/16TB Storage

16/32TB Storage

32/48/64TB Storage
Optional OmniStorage:
32/48/64TB
Up to 128TB total Storage

OmniAdapter 1G and 10G

OmniAdapter 1G/10G MX

OmniAdapter 1G/10G MX

OmniAdapter 1G/10G/40G

6.5Gbps CTD

3.8Gbps CTD

8.8Gbps CTD

20Gbps CTD with
OmniStorage

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
WatchPoint
Centralized Monitoring for Distributed Enterprise Networks
•

High-level, aggregated
view of all network
segments
– Monitor per campus, per
region, per country

•

Wide range of network
data
– NetFlow, sFlow, OmniFlow

•
•
•

#wp_forensics

Network Forensics for Wired and Wireless Networks

Web-based, customizable
network dashboards
Flexible detailed reports
Direct link to detailed,
packet-based analysis

© WildPackets, Inc.
Comprehensive Support and Services
Standard Support





Premier Support

Maintenance and upgrades
Telephone and email contacts
Knowledgebase
MyPeek Portal






24 x 7 x 365
Dedicated escalation manager
2 customer contacts per site
Plug-in reconfiguration assistance

WildPackets Training Academy


Public, web-based, and on-site classes
 Complete curriculum: technology and product focused
 Practical applications and labs covering network analysis,
wireless, VoIP monitoring and advanced troubleshooting

Consulting and Custom Development Services


Deployment, configuration, and assessment engagement
 Systems integration and testing
 Application integration, driver, decode, interface development
#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
WildPackets Key Differentiators
• Visual Expert intelligence with intuitive drill-down
– Let computer do the hard work, and return results, real-time
– Packet /payload visualization is faster than packet-per-packet diagnostics
– Experts and analytics can be memorized and automated

• Automated capture analytics
– Filters, triggers, scripting, and advanced alarming system combine to provide
automated network problem detection 24x7

• Multiple issue network forensics
– Can be tracked by one or more people simultaneously
– Real-time or post capture

• User-extensible platform
– Plug-in architecture and SDK

• Aggregated network views and reporting
– NetFlow, sFlow, and OmniFlow

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
24x7 Network Monitoring,
Analysis, and Troubleshooting

#wp_forensics

Network Forensics for Wired and Wireless Networks

© WildPackets, Inc.
Thank You!
WildPackets, Inc.
1340 Treat Boulevard, Suite 500
Walnut Creek, CA 94597
(925) 937-3200
© WildPackets, Inc.

www.wildpackets.com

Más contenido relacionado

La actualidad más candente

Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsZyxware Technologies
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 
computer forensics
computer forensicscomputer forensics
computer forensicsshivi123456
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Sagar Rahurkar
 

La actualidad más candente (20)

Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Router forensics
Router forensicsRouter forensics
Router forensics
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Incident response process
Incident response processIncident response process
Incident response process
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 

Similar a Wired and Wireless Network Forensics

Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableSavvius, Inc
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksSavvius, Inc
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network Savvius, Inc
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekSavvius, Inc
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring Savvius, Inc
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Savvius, Inc
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?Savvius, Inc
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshopSTelligence Company
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance MonitoringcPacket Networks
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisSavvius, Inc
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSavvius, Inc
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Savvius, Inc
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 

Similar a Wired and Wireless Network Forensics (20)

Omnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise AffordableOmnipliance family - Powerful Precise Affordable
Omnipliance family - Powerful Precise Affordable
 
Real-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed NetworksReal-Time Visibility into High Speed Networks
Real-Time Visibility into High Speed Networks
 
Managing a Widely Distributed Network
Managing a Widely Distributed NetworkManaging a Widely Distributed Network
Managing a Widely Distributed Network
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
Network Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with OmnipeekNetwork Analysis Tips & Tricks with Omnipeek
Network Analysis Tips & Tricks with Omnipeek
 
The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring The Changing Landscape in Network Performance Monitoring
The Changing Landscape in Network Performance Monitoring
 
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
Visibility into 40G/100G Networks for Real-time and Post Capture Analysis and...
 
Are you ready for 802.11ac?
Are you ready for 802.11ac?Are you ready for 802.11ac?
Are you ready for 802.11ac?
 
Network Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeekNetwork Analysis Tips and Tricks with OmniPeek
Network Analysis Tips and Tricks with OmniPeek
 
Savvius_Introduction to workshop
Savvius_Introduction to workshopSavvius_Introduction to workshop
Savvius_Introduction to workshop
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
Importance of Network Performance Monitoring
Importance of Network Performance MonitoringImportance of Network Performance Monitoring
Importance of Network Performance Monitoring
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Gigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN AnalysisGigabit WLANs Need Gigabit WLAN Analysis
Gigabit WLANs Need Gigabit WLAN Analysis
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Security Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network AttacksSecurity Attack Analysis for Finding and Stopping Network Attacks
Security Attack Analysis for Finding and Stopping Network Attacks
 
network problem.pptx
network problem.pptxnetwork problem.pptx
network problem.pptx
 
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
Don't Let History Repeat Itself – Network Monitoring and Reporting with Watch...
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3Lumeta IPsonar Aligned to ITIL v3
Lumeta IPsonar Aligned to ITIL v3
 

Más de Savvius, Inc

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius VigilSavvius, Inc
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkSavvius, Inc
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsSavvius, Inc
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisSavvius, Inc
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Savvius, Inc
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?Savvius, Inc
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...Savvius, Inc
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewSavvius, Inc
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Savvius, Inc
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Savvius, Inc
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac DataSavvius, Inc
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringSavvius, Inc
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisSavvius, Inc
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acSavvius, Inc
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 UpdateSavvius, Inc
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual ServersSavvius, Inc
 

Más de Savvius, Inc (19)

Introducing Savvius Vigil
Introducing Savvius VigilIntroducing Savvius Vigil
Introducing Savvius Vigil
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Network Forensics Backwards and Forwards
Network Forensics Backwards and ForwardsNetwork Forensics Backwards and Forwards
Network Forensics Backwards and Forwards
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2Bright talk voip vofi webinar jan2015-v2
Bright talk voip vofi webinar jan2015-v2
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Are You Missing Something?
Are You Missing Something?Are You Missing Something?
Are You Missing Something?
 
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
VoIP Monitoring and Analysis - Still Top of Mind in Network Performance Monit...
 
WildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper PreviewWildPackets EMA Whitepaper Preview
WildPackets EMA Whitepaper Preview
 
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
Network Network Visibility - The Key to Rapidly Troubleshooting Network Perfo...
 
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
Wireless Network Analysis 101 VoFi (Voice over Wi-Fi)
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Capturing 802.11ac Data
Capturing 802.11ac DataCapturing 802.11ac Data
Capturing 802.11ac Data
 
Bringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network MonitoringBringing Big Data Analytics to Network Monitoring
Bringing Big Data Analytics to Network Monitoring
 
The blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysisThe blind spot in virtual servers - seeing with network analysis
The blind spot in virtual servers - seeing with network analysis
 
Introducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11acIntroducing network analysis and data capture for 802.11ac
Introducing network analysis and data capture for 802.11ac
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 
Real Packets from Virtual Servers
Real Packets from Virtual ServersReal Packets from Virtual Servers
Real Packets from Virtual Servers
 

Último

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Wired and Wireless Network Forensics

  • 1. Network Forensics for Wired and Wireless Networks Jay Botelho Director of Product Management WildPackets jbotelho@wildpackets.com Follow me @jaybotelho Show us your tweets! Use today’s webinar hashtag: #wp_networkforensics with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 2. Administration • All callers are on mute ‒ If you have problems, please let us know via the Chat window • There will be Q&A ‒ Feel free to type a question at any time • Slides and recording will be available ‒ Notification within 48 hours via a follow-up email #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 2
  • 3. Agenda • • • • • • • • What Is Network Forensics? Myths/Realities in Network Forensics Configuring Your Network for Forensics Wired vs. Wireless Network Forensics Use Cases Performing Forensic Analysis WildPackets Corporate Overview WildPackets Product Line Overview #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 3
  • 4. What Is Network Forensics? © WildPackets, Inc. www.wildpackets.com 4
  • 5. What is Network Forensics ? • Marcus Ranum is credited with defining Network Forensics as “the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.” (wikipedia) • It’s not like TV – employ forensics before the “crime” - network traffic is transmitted and then lost, leaving no clues behind • Other names: packet mining, packet forensics, digital forensics #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 6. What Purpose Does It Serve ? • Allows us to find the details of network events after they have happened • Eliminates the need to reproduce network problems • Distill data to manageable levels by employing filters and analysis #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 7. Network vs. Security Forensics • Network forensics is a superset of security forensics • Forensics is not just DPI (Deep Packet Inspection) • Requires the lossless capture, storage, and analysis of extremely large data volumes • Network forensics: enterprise vs. lawful intercept ‒ Concerned with the process of reconstructing a network event • Network or infrastructure outage • Intrusion such as a “hack” or other penetration ‒ Provides a recording of the actual incident • Based on live IP packet data captures ‒ A new way of looking at trace file analysis ‒ Continues from where traditional network troubleshooting ends #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 8. Network Forensics Drivers • Faster networks/greater data volumes ‒ 10/40G adoption grew 62% in 2012 ‒ 75% of the investments in networking are for 10G1 • Richer data • Subtler and more malicious security threats ‒ ‒ ‒ ‒ Zero-day attacks APTs (Advanced Persistent Threats) 75% of data breaches financially motivated 66% of breaches took months or longer to discover2 • Sampled data and high-level stats ‒ Flow-based network monitoring vs. detailed DPI analysis 1 http://www.infonetics.com/pr/2013/2H12-Networking-Ports-Market-Highlights.asp 2 http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 8
  • 9. Why Forensics? • Validate what your logs are telling you • Generate alarms/alerts on data you’ll never find in logs • Invest time analyzing, not reproducing • Immediately begin investigating the issue – you have a recording of the incident! • Isolate key data – from multi-TB archives - rapidly and intuitively • Understand the depth of penetration for any incident #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 10. Myths/Realities in Network Forensics © WildPackets, Inc. www.wildpackets.com 10
  • 11. Network Forensics 85% The number of respondents that feel network forensics is a necessity at 10G 31% The number who are using network forensics at 10G The State of Faster Networks, WildPackets, Oct 2013 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 11
  • 12. Network Forensics Usage 12% For security purposes 28% For monitoring intermittent network issues For monitoring intermittent application issues For 24/7 transaction analysis 24% 36% The State of Faster Networks, WildPackets, Oct 2013 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 12
  • 13. Challenges with Network Forensics The State of Faster Networks, WildPackets, Oct 2013 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 13
  • 14. 10G – Driving Network Forensics Usage  100 Participants  Company size:  43% - Large organizations  26% - Medium  31% - Small  Functional Breakdown  84% - Network Engineer  15% - IT Director  1% - Executive The State of Faster Networks, WildPackets, Oct 2013 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 14
  • 15. 10G – Driving Network Forensics Usage The State of Faster Networks, WildPackets, Oct 2013 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 15
  • 16. The Implications of Doing Nothing  64% of organizations reported that managing network performance has become more complex over last 12 months  Organizations are losing on average $72,000 per minute of unplanned network downtime  48% of organizations reported that, on average, they spend more than 60 minutes on repairing performance issues - per incident #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 17. Configuring Your Network for Forensics © WildPackets, Inc. www.wildpackets.com 17
  • 18. Requirements for a Network Forensics Solution • Capturing and recording data ‒ ‒ ‒ ‒ 10/40G network support No dropped packets – 100% fidelity Continuously available Always test in your environment • Discovering data ‒ Timely results delivery ‒ Filtering for IP addresses, applications, etc. • Analyzing data ‒ Automated analysis – Expert events ‒ Simple, intuitive workflow ‒ Data visualization from multiple perspectives #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 18
  • 19. 10G Network Analysis Workflow Deploy 24x7 Monitoring Identify Key Analysis Pts NO Alarms/ Alerts Problem? YES Rewind Data #wp_forensics Analyze Network Forensics for Wired and Wireless Networks Tune if Necessary © WildPackets, Inc.
  • 20. A Solution for Every Network #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 20
  • 21. Data Capture from High-Speed Links #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 22. Forensic Analysis – Capturing An Attack 2. Data Recorder records and aggregates data throughout attack IDS/IPS System 3. Event logged, attack partially tracked by IDS Servers 1. Attack bypasses firewall #wp_forensics 4. Post event analysis reveals attacker, method, damage! Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 23. 10G Network Data Storage • 1Gbps steady-state traffic assuming no storage overhead: 7.68 GB/min 460 GB/hr 11 TB/day 2.9 days in a 32TB appliance • 10Gbps: 76.8GB/min 4.6 TB/hr 110 TB/day 28 hours in a 128TB appliance #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 24. Wired vs. Wireless Network Forensics © WildPackets, Inc. www.wildpackets.com 24
  • 25. 802.11ac – Breaking the Gigabit Barrier Gratuitous clipart - Please ignore 11 Mbps 1-2 Mbps 802.11b <1 Mbps 802.11 1997 550% 100% Proprietary 1989 #wp_forensics 1991 1999 433/866/1300+ Mbps 802.11ac 288% (vs. 450) (to 6.93 Gbps) 300/450/600 Mbps 802.11n 54 Mbps 833% 802.11g/a 490% 2003 2009 2013 Source: Farpoint Group Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 26. #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 26
  • 27. Additional Drivers for Wireless Forensics • BYOD ‒ No configuration control ‒ Limited or no access to the end-user device ‒ Problems reported “after the fact” • Point-of-Presence required ‒ Wireless data must be captured within a few hundred feet of the device ‒ Vastly more collection points than for wired forensics • Data volumes that rival wired data ‒ 1.3Gbps will be common with 802.11ac ‒ Mobile devices outnumbering wired devices #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 27
  • 28. Wireless Forensics Solution • As wireless approaches wired speeds, it’s time to start relying on the wire • Distributed analysis using deployed assets – APs – is the only effective solution as wireless speeds grow • 24/7 capture/analysis ensures problems aren’t missed • Recording enables wireless forensic analysis #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 28
  • 29. Wireless Forensics Benefits • Reduce MTTR • Prioritize analysis tasks ‒ No need to reproduce a problem ‒ No need to wait for it to happen again • Increase WLAN service uptime ‒ WLANs are now missioncritical ‒ Mobility implies you won’t be near the problem ‒ Deal with emergencies immediately ‒ Handle routine investigations as time permits ‒ Save data for long-term analysis • Reduce reaction time ‒ Data are always available for analysis • Reduce analysis costs ‒ A single solution for wireless and wired analysis #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 29
  • 30. Use Cases © WildPackets, Inc. www.wildpackets.com
  • 31. Use Cases for Network Forensics • Finding proof of a security attack • Troubleshooting intermittent performance issues • Monitoring user activity for compliance with IT and HR policies • Identifying the source of data leaks • Monitoring business transactions • Verifying VoIP and video over IP performance #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 31
  • 32. Best Practices for Network Forensics Capturing Network Traffic 1. Capture traffic continuously 2. Deploy a solution that captures traffic reliably 3. Set up filters to catch anomalies Storing Traffic 4. Allocate sufficient storage for the volume of data being collected 5. Adjust file sizes for the desired performance optimization #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 32
  • 33. Best Practices for Network Forensics (cont.) Analyzing Traffic 6. Select a network forensics solution that supports filters and searches that are fast, flexible, and precise 7. Record baseline measurements of network performance 8. Use filters to zoom in on the problem at hand #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 33
  • 34. Performing Forensic Analysis © WildPackets, Inc. www.wildpackets.com
  • 35. WildPackets – The Network Forensics Myth Buster Myth Busted Can’t analyze at 10G line rate Dropped packets Captured data is not reliable Inability to collect packets at all network locations Inadequate real-time stats Real-time analysis no longer an option Limited visibility into VoIP Inability to analyze/search recorded traffic No end-to-end visibility into application transactions Limitations in security monitoring #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc. 35
  • 36. Q&A Show us your tweets! Use today’s webinar hashtag: Follow us on SlideShare! #wp_forensics Check out today’s slides on SlideShare www.slideshare.net/wildpackets with any questions, comments, or feedback. Follow us @wildpackets © WildPackets, Inc. www.wildpackets.com
  • 37. WildPackets Corporate Overview Optimizing Network and Application Performance © WildPackets, Inc. www.wildpackets.com
  • 38. Corporate Background • Experts in network monitoring, analysis, and troubleshooting ‒ Founded: 1990 / Headquarters: Walnut Creek, CA ‒ Offices throughout the US, EMEA, and APAC • Customers spanning leading edge organizations ‒ Mid-market and enterprise lines of business ‒ Financial, manufacturing, ISPs, major federal agencies, state and local governments, universities ‒ Over 7,000 customers / 60+ countries / 80% of Fortune 1,000 • Award-winning solutions that improve network performance ‒ Internet Telephony, Network Magazine, Network Computing awards ‒ United States Patent 5,787,253 issued July 28, 1998 • “Apparatus and Method of Analyzing Internet Activity” #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 39. Why Our Customers Need Us • VoIP, video, cloud, virtualization, and key business applications are saturating critical network services • Evolving network technologies create discontinuities ‒ 1 Gig  10 Gig  40 Gig  100 Gig networks ‒ Wireless, BYOD initiatives • Users and business can not tolerate network problems for mission critical services Increasing demand for better real-time network visibility, network analytics, network forensics, and DPI #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 40. How We Create Value We provide innovative, industry-leading, real-time network performance management solutions ‒ Easy-to-use, easy-to-learn user interface ‒ Uniquely extensible solutions ‒ Wireless network leadership ‒ Detailed analytics related to network applications ‒ Fastest network traffic capture appliance in its class ‒ Technical superiority at competitive price point WildPackets has continually advanced its solution to meet the needs of its customers #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 41. Unprecedented Network Visibility NETWORK HEALTH GLOBAL WatchPoint can manage and report on key device performance and availability across the entire network, from anywhere on the network. UNDERSTAND END-USER PERFORMANCE DISTRIBUTED Omnipliance network analysis and recorder appliances monitor and analyze performance across critical network segments, virtual environments, and remote sites. PINPOINT NETWORK ISSUES ANYWHERE PORTABLE Omnipliance Portable can rapidly identify and troubleshoot issues before they become major problems—wired or wireless—down the hall or across the globe. ROOT-CAUSE ANALYSIS DPI #wp_forensics OmniPeek network analyzer performs deep packet inspection and can reconstruct all network activity, including e-mail and IM, as well as analyze VoIP and video traffic quality. Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 42. A History of Innovation 2001 2005 2009 2011 • First 802.11 wireless analyzer • First network analyzer with automated expert analysis Combined distributed network and VoIP network analysis Innovative dashboard with drill-down for VoIP and video • Total visibility with zero packet loss • First wireless network analyzer to support capture and analysis of 802.11n 3-stream wireless 2008 2010 2012 2013 Distributed real-time Enterprise-wide troubleshooting Monitoring and Reporting First to achieve 11 Gbps sustained capture-to-disk • Capture, record, and analyze from 40G network segments • First wireless network analyzer to support 801.11ac, k, r, u, v, w Industry leading network analysis and recorder appliances 2003 #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 43. Product Line Overview © WildPackets, Inc. www.wildpackets.com
  • 44. Omni Distributed Analysis Platform OmniPeek Enterprise Packet Capture, Decode and Analysis • Ethernet,1/10 Gigabit, 802.11, and voice and video over IP • Portable capture and OmniEngine console • Aggregate analysis data across multiple capture points Omnipliance Network Analysis and Recorder Appliances • High-performance packet capture and real-time analysis • Stream-to-disk for forensics analysis • Integrated OmniAdapter network analysis cards up to 40G WatchPoint Centralized Enterprise Network Monitoring Appliance • Aggregation and graphical display of network data • WildPackets OmniEngines • NetFlow and sFlow #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 45. Omni Distributed Analysis Platform Software and Turnkey Solutions • Enterprise monitoring and reporting ‒ WatchPoint Server ‒ OmniFlow, NetFlow, and sFlow Collectors • Network Analysis and Recorder Appliances ‒ Omnipliance CX, MX, TL ‒ Optional OmniStorage ‒ OmniAdapter analysis cards • Distributed analysis software ‒ OmniPeek – Enterprise, Professional, Basic, Connect ‒ OmniPeek Remote Assistant ‒ OmniEngine Enterprise • Portable solutions ‒ OmniPeek network analyzer ‒ Omnipliance Portable #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 46. OmniPeek Network Analyzer • Distributed analysis manager – Connect to and configure distributed OmniEngines and Omnipliances, • Comprehensive dashboards present network traffic in real-time – Vital statistics and graphs display trends on network and application performance – Visual peer-map shows conversations and protocols – Intuitive drill-down for root-cause analysis of performance bottlenecks • Visual Expert diagnosis speeds problem resolution – Packet and payload visualizers provide business-centric views • Automated analytics and problem detection 24/7 – Easily create filters, triggers, scripting, advanced alarms, and alerts #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 47. OmniPeek Remote Assistant Distributed, End-user Packet Capture Made Simple • Simple to deploy, simple to use ‒ Remote push, download from server, or even email ‒ Simple user interface - eliminates confusion for end user ‒ Full fidelity capture - see exactly what the PC sees ‒ Wired or wireless Trouble call from remote site network response is slow. • Encrypted file ‒ Only the analyst can open it ‒ Different encryption keys for different locations or customers User downloads and installs OmniPeek Remote. Encrypted capture data sent back for analysis. • Detailed client-side/end-user experience analysis • Perfect for Tech Support or IT Desktop support #wp_forensics Network Forensics for Wired and Wireless Networks Network analyst uses OmniPeek Enterprise to quickly troubleshoot problem without leaving the office. © WildPackets, Inc.
  • 48. OmniWiFi USB WLAN Capture Adapter • A single device for all WLAN packet capture needs • Driver included with Omni v7.9 CDs • Tested and supported with OmniPeek and OmniEngine • Product features: • • • • • • USB device with extension cable Dual band operation – 2.4GHz and 5GHz Supports all standard international 802.11 channels (a/b/g/n) Supports 802.11n - 3 transmit/receive streams (450Mbps) Supports 802.11n 20MHz and 40MHz channel operation Supports multi-channel aggregation and roaming • Technical Details: ‒ Size (LWH): 6 inches, 1.5 inches, 5.5 inches ‒ Weight: 5.6 ounces NOTE: • Capture ONLY – no network services • Does not capture 802.11ac • Available via Amazon - $99/each #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 49. New Network Analysis and Recorder Appliances Powerful Precise Affordable The new family of WildPackets Network Analysis and Recorder appliances gives IT organizations powerful and precise analysis of high-speed networks in an affordable solution with half the hardware footprint of rival offerings. #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 50. Powerful ‒ Fastest network recorder in its class! Captures traffic up to 20Gbps of realworld traffic (all size packet distribution) ‒ Scales up to 128 TB of storage ‒ Provides simultaneous real-time analysis and a comprehensive Forensic Search that rapidly searches through terabytes of captured traffic for the details relevant to an investigation Precise ‒ Captures complete network traffic, so you can analyze everything, not just samples or high-level statistics ‒ Doesn’t drop packets or sacrifice accuracy for speed ‒ Supports rich, detailed analysis, including VoIP and video-over-IP traffic Affordable ‒ Delivers outstanding price/performance (lower price; half the rack space) ‒ Allows mix of 1G/10G/40G interfaces without buying extra appliances ‒ Solutions start at $16,995 Your network is bigger and faster. Now your analysis solution is, too. #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 51. Omnipliance TL Industry Leading Network Analysis and Recorder Appliance • Sets a new standard in capture-to-disk speeds ‒ 20Gbps sustained capture to disk rate with zero packet drop • Best price/performance Network Analysis Appliance in the market ‒ 20Gbps with only one Omnipliance TL + OmniStorage ‒ Consuming less rack space, less cooling, less electrical power • Most flexible network interface offering ‒ 1G/10G/40G interfaces supported in a single unit eliminates additional unit requirement • Most accurate real-time analytics ‒ Packet-based processing and analysis vs. inaccurate samplebased calculation #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 52. WildPackets Network Analysis Recorder Appliances Price/Performance Solutions for Every Application Portable Omnipliance CX Omnipliance MX Omnipliance TL Ruggedized Troubleshooting Less Demanding Networks Remote Offices Datacenter Workhorse Easily Expandable Enterprise, HighlyUtilized Networks Aluminum chassis / 17” LCD 1U rack mountable chassis 3U rack mountable chassis 3U rack mountable chassis 24GB RAM 16GB RAM 32GB RAM 64GB RAM 2 PCI-E Slots 2 PCI-E Slots 4 PCI-E Slots 4 PCI-E Slots 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 2 Built-in Ethernet Ports 6TB Storage 4/8/16TB Storage 16/32TB Storage 32/48/64TB Storage Optional OmniStorage: 32/48/64TB Up to 128TB total Storage OmniAdapter 1G and 10G OmniAdapter 1G/10G MX OmniAdapter 1G/10G MX OmniAdapter 1G/10G/40G 6.5Gbps CTD 3.8Gbps CTD 8.8Gbps CTD 20Gbps CTD with OmniStorage #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 53. WatchPoint Centralized Monitoring for Distributed Enterprise Networks • High-level, aggregated view of all network segments – Monitor per campus, per region, per country • Wide range of network data – NetFlow, sFlow, OmniFlow • • • #wp_forensics Network Forensics for Wired and Wireless Networks Web-based, customizable network dashboards Flexible detailed reports Direct link to detailed, packet-based analysis © WildPackets, Inc.
  • 54. Comprehensive Support and Services Standard Support     Premier Support Maintenance and upgrades Telephone and email contacts Knowledgebase MyPeek Portal     24 x 7 x 365 Dedicated escalation manager 2 customer contacts per site Plug-in reconfiguration assistance WildPackets Training Academy  Public, web-based, and on-site classes  Complete curriculum: technology and product focused  Practical applications and labs covering network analysis, wireless, VoIP monitoring and advanced troubleshooting Consulting and Custom Development Services  Deployment, configuration, and assessment engagement  Systems integration and testing  Application integration, driver, decode, interface development #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 55. WildPackets Key Differentiators • Visual Expert intelligence with intuitive drill-down – Let computer do the hard work, and return results, real-time – Packet /payload visualization is faster than packet-per-packet diagnostics – Experts and analytics can be memorized and automated • Automated capture analytics – Filters, triggers, scripting, and advanced alarming system combine to provide automated network problem detection 24x7 • Multiple issue network forensics – Can be tracked by one or more people simultaneously – Real-time or post capture • User-extensible platform – Plug-in architecture and SDK • Aggregated network views and reporting – NetFlow, sFlow, and OmniFlow #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 56. 24x7 Network Monitoring, Analysis, and Troubleshooting #wp_forensics Network Forensics for Wired and Wireless Networks © WildPackets, Inc.
  • 57. Thank You! WildPackets, Inc. 1340 Treat Boulevard, Suite 500 Walnut Creek, CA 94597 (925) 937-3200 © WildPackets, Inc. www.wildpackets.com