75 views
Alexey Lednev / Positive Technologies No hacker attack can do without network interaction, and traffic can often give us many more answers about an information security incident than many people think. Sometimes it is even more reliable than other methods (host) of threat analysis. We show on the infrastructure diagram what an attack chain most often looks like. And then, using its example, we analyze various methods of traffic analysis with their pros and cons. In addition, we talk about the role of ML, why it is necessary to store raw traffic and how analysis for information security purposes can help IT. #nexthop #security #networks Conference website nexthopconf.com Conference TG channel t.me/YandexNextHop Conference chat t.me/YandexNextHopTalks Yandex Infrastructure: Website infra.yandex.ru TG channel t.me/yandex_infrastructure Blog on Habr habr.com/ru/companies/yandex_cloud_and_infra/profile