LOGO
Contact a Technical Expert
Request a local/remote demo
Contact the Sales Manager

Traffic data As the direct embodiment of user's IT business behavior, traffic data traceback analysis can provide user's IT behavior, conclusion, basis and certificate based on traffic data. The traffic generated by abnormal network access behavior or attack events may be fleeting. By crawling the network traffic, the parts that need to be concerned are extracted and post-hoc multi-dimensional analysis is carried out. It is of practical significance to realize real-time discovery, analysis and traceback for user critical business systems, applications and network behavior anomalies.

ydyximg_03
ydyximg_03

Network interaction It is the basis of business support, and ensuring the stability and reliability of the network is the necessary content of operation and maintenance management. Network operation and maintenance managers need to pay attention to key parameters such as network communication and network performance, and can find abnormal events and analyze and locate the root cause of problems through network interaction information. The related technologies of traffic traceback may include: full traffic collection, traffic analysis, protocol analysis, behavior analysis, trend analysis, intelligent learning, establishing intelligent baseline, etc. The forms of traffic traceback feedback may involve: network interaction process display, data visualization display, alarm, log, auxiliary decision-making basis, etc. Through the above means, we can provide network and security operation and maintenance management capabilities to achieve the goal of stable and reliable network. When the network is under security threats, we can rely on technical means and measures to realize investigation, traceability and forensics.

According to the requirements of network security Level Protection 2.0, post-audit, backtracking and analysis are important contents of security analysis. The network and communication security part of the system involved in security 2.0 level 3 can realize the detection and analysis ability of network attacks, especially unknown new network attacks, by deploying a traffic traceback analysis system. Due to the consideration of function design and data versatility, the existing security analysis tools usually do not have the function of original traffic data storage. Users will encounter great obstacles when tracing the source of attacks and requiring discovery, tracing and forensics. Based on the above reasons, users urgently need traffic traceback analysis capabilities to solve the needs of network event traceback and forensics, and to deal with new network attacks.
LOGO
TAP汇聚分流器(也称为:网络分流器、在线TAP、镜像TAP)可以实现流量数据的多点采集、复制、汇聚、灵活组合输出。可以解决交换机端口镜像不足、扩大分析探针覆盖范围、各类旁路分析设备争抢镜像资源的问题。提供流量采集、流量复制、流量汇聚等流量管控功能,可选的可视化、路径分析、数据分析、流量去重流量脱敏、时间戳、切片、数据包截短、流量过滤等流量数据功能。
数维通信提供多种系统平台方案,包括:回溯分析、交易分析、VTAP、虚拟化采集、云采集等功能。
Inline Bypass流量牵引保护器(也称为:bypass交换机)用于在部署各类串接安全设备的同时,提供极高的网络可靠性,满足多种链路流量的安全保护需求。