Real-Time Metadata Analysis
Through metadata inspection, all incoming traffic is analyzed and classified in real time. The traffic undergoes processing by six modules that analyze network, event type, OS, application, attributes, and protocol information. This process enables detailed identification of traffic sources, destinations, user IDs and sessions, protocols, application types, and attributes such as video, text, and voice, ensuring precise application recognition. This technology goes beyond basic traffic filtering, rapidly and accurately identifying approximately 3,000 network applications and 500 protocols, even in SSL/TLS-encrypted traffic or complex multi-protocol environments.
Analysis Encrypted Traffic and Traffic Pattern
As more protocols and applications, such as Skype, Facebook, Twitter, and Dropbox, adopt encryption, accessing payloads or content directly has become increasingly challenging. MONITORAPP's NG DPI addresses this by leveraging packet size, timing, latency, throughput, behavior, and statistical analysis to effectively extract protocol and application information, even from encrypted traffic. For instance, video streams exhibit distinct characteristics, such as a saw tooth buffering pattern, unlike the stable throughput pattern of file downloads. This advanced analysis enables precise threat detection beyond simple traffic filtering, ensuring accurate identification of threats in SSL/TLS-encrypted traffic and complex multi-protocol environments.