
24 Architecture
About the core architecture
data from the native format to the Symantec Network Security format, and
transmits the data to the software or appliance node.
About analysis
Symantec Network Security includes state-of-the-art correlation and analysis
that filters out irrelevant information and refines only what is meaningful,
providing threat awareness without data overload. Symantec Network Security
correlates common events together within an incident to compress and relate
the displayed information.
This section describes the analysis mechanism in greater detail:
■
About refinement
■
About correlation
■
About cross-node correlation
About refinement
Symantec Network Security detects both known and unknown (zero-day)
attacks, using multiple detection technologies concurrently. Event refinement
rules extend the Protocol Anomaly Detection capabilities. Symantec Network
Security matches generic anomalies against a database of refinement rules, and
for known attacks, reclassifies an anomaly event by retagging it with its specific
name.
About correlation
Symantec Network Security uses event correlation, the process of grouping
related events together into incidents. This produces a shorter, more
manageable list to sift through. Some types of intrusions, such as DDoS attacks,
generate hundreds of events. Others, such as buffer-overflow exploits, might
generate only one event. Event correlation brings each key event to the
forefront in an incident so that it remains visible despite floods of events from
other activities. It automates the process of sorting through individual events
and frees the user to focus on responding directly to the security incident.
Symantec Network Security correlates security events (intrusions, attacks,
anomalies, or any other suspicious activity), response action events (automated
actions taken by Symantec Network Security in response to an attack), and
operational events (action taken in the administration of the product, such as
logging in or rotating logs).
Содержание 10268947 - Network Security 7160
Страница 1: ...Symantec Network Security User Guide...
Страница 18: ...18 Introduction Finding information...
Страница 34: ...34 Architecture About management and detection architecture...
Страница 46: ...46 Getting Started About deploying node clusters...
Страница 64: ...64 Topology Database Viewing objects in the topology tree...
Страница 124: ...124 Log Files About log files...
Страница 134: ...134 Index...