Behavioral Analysis - Next generation Threat Detection
by Lisa Vaas
Original intrusion detection solutions were based on blacklists and threat signatures that required extensive user customization and maintenance. Threat detection vendors today are, thankfully, moving to the far more proactive technologies associated with behavior analysis: an evolution to prevent malevolent guests from getting onto your networks and into your databases.
Malware, says Rob Rachwald, is weird. It has no manners. It's always sniffing around on the network. Before you know it, it's slipping off to connect back to an attacker, establishing a connection to your now-violated network. "That's not normal network behavior," Rachwald, senior director of research at FireEye, explained to SearchNetworking's Sally Johnson.
See the attached PDF for more.