How to Detect Malicious Covert Communications
HIGHLIGHTS
- By mathematically analyzing the subtle patterns within network traffic, AI-powered Vectra Detect exposes the true underlying behavior, such as malware receiving command-and-control instructions, attackers using remote access tools, or attackers delivering malware updates.
- To expose hidden tunnels, Vectra Detect performs a highly sophisticated analysis of the traffic to reveal subtle abnormalities within a protocol that give away the presence of a hidden tunnel.
- Vectra Detect uses data science and packet-level machine learning to reveal the presence of external remote access without dependence on signatures.
- Through a careful use of AI and data science, Vectra Detect can separate software that masquerades as a browser used by humans and reveal the presence of hidden communications within allowed applications.