Blue Team
search
⌘Ctrlk
Blue Team
  • Model
    • Asset Inventory
    • Network Mapping
    • Operational Activity Mapping
    • System Mapping
  • Harden
    • Agent Authentication
    • Application Hardening
    • Credential Hardening
    • Message Hardening
    • Platform Hardening
    • Source Code Hardening
  • Detect
    • File Analysis
    • Identifier Analysis
    • Message Analysis
    • Network Traffic Analysis
      • Administrative Network Activity Analysis
      • Application Protocol Command Analysis
      • Byte Sequence Emulation
      • Certificate Analysis
      • Client-server Payload Profiling
      • Connection Attempt Analysis
      • DNS Traffic Analysis
      • File Carving
      • Inbound Session Volume Analysis
      • IPC Traffic Analysis
      • Network Traffic Community Deviation
      • Network Traffic Signature Analysis
      • Per Host Download-Upload Ratio Analysis
      • Protocol Metadata Anomaly Detection
      • Relay Pattern Analysis
      • Remote Terminal Session Detection
      • RPC Traffic Analysis
    • Physical Access Monitoring
    • Platform Monitoring
    • Process Analysis
    • User Behavior Analysis
  • Isolate
    • Access Mediation
    • Access Policy Administration
    • Content Filtering
    • Execution Isolation
    • Network Isolation
  • Deceive
    • Decoy Environment
    • Decoy Object
  • Evict
    • Credential Eviction
    • Object Eviction
    • Process Eviction
  • Restore
    • Restore Access
    • Restore Object
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Detect

Network Traffic Analysis

Administrative Network Activity Analysischevron-rightApplication Protocol Command Analysischevron-rightByte Sequence Emulationchevron-rightCertificate Analysischevron-rightClient-server Payload Profilingchevron-rightConnection Attempt Analysischevron-rightDNS Traffic Analysischevron-rightFile Carvingchevron-rightInbound Session Volume Analysischevron-rightIPC Traffic Analysischevron-rightNetwork Traffic Community Deviationchevron-rightNetwork Traffic Signature Analysischevron-rightPer Host Download-Upload Ratio Analysischevron-rightProtocol Metadata Anomaly Detectionchevron-rightRelay Pattern Analysischevron-rightRemote Terminal Session Detectionchevron-rightRPC Traffic Analysischevron-right
PreviousSender Reputation Analysischevron-leftNextAdministrative Network Activity Analysischevron-right