White Paper

How to Detect Malicious Covert Communications

HIGHLIGHTS

  • By mathematically analyzing the subtle patterns within network traffic, AI-powered Vectra Detect exposes the true underlying behavior, such as malware receiving command-and-control instructions, attackers using remote access tools, or attackers delivering malware updates.
  • To expose hidden tunnels, Vectra Detect performs a highly sophisticated analysis of the traffic to reveal subtle abnormalities within a protocol that give away the presence of a hidden tunnel.
  • Vectra Detect uses data science and packet-level machine learning to reveal the presence of external remote access without dependence on signatures.
  • Through a careful use of AI and data science, Vectra Detect can separate software that masquerades as a browser used by humans and reveal the presence of hidden communications within allowed applications.
How to Detect Malicious Covert Communications
How to Detect Malicious Covert Communications
Select language to download
Complementry Access

Trusted by experts and enterprises worldwide

FAQs