Date: 8/31/2015, Author: Bogdan Danciu. Ixia ATI is happy to release our monthly botnet package covering August 2015, which can be downloaded from Strike Center here: .
Date: 8/25/2015, Author: Garett Montgomery. One of the things the Ixia BreakingPoint team takes pride in is the realism of our strikes. We strive to provide the most effective security device testing possible by emulating all the different methods attackers can use to exploit a vulnerability. This includes—but is not limited to—multiple protocols for file delivery, various data encoding schemes, shuffling the order and size of data packets, and randomizing the location of malicious values. All these variations raise the bar for testing security devices. To help truly mitigate a vulnerability a security device must be able to prevent its exploitation, regardless of the form it takes. In some cases, not all security devices are capable of accurately detecting an exploit in all its forms (think compressed Java applet/.jar). We believe that these examples can and should serve as valuable product differentiators.
Date: 8/20/2015, Author: Sougato Adhikari, Kingshuk Mandal. Segment Routing (SR) is how a packet knows which path to take. SR uses computer code for this. An SR path, from beginning to end, is broken into smaller parts called segments. These segments use IGP protocols like ISIS or OSPF. The path that a packet should follow is coded as a list of segments in that packet. These segments show sub-paths that combine to form the desired path. The path state doesn’t have to be stored in a router. Instead, the packet’s path is kept in the packet header. So the network doesn’t have to store SR-encoded flows.
Author: Bogdan Danciu. Ixia ATI is happy to release our monthly malware package covering August 2015, which can be downloaded from Strike Center here: .
Date: 8/3/2015, Author: David Avery. Ixia’s president and chief executive officer, Bethany Mayer, has been named to The Channel Company’s prestigious 2015 CRN® Top 100 list as one of the technology industry’s Top 25 Disruptors.
Virtual taps
Date: 7/31/2015, Author: Keith Bromley. Blind spots are a long-established threat to virtual data centers. They are inherent to virtual machine (VM) usage and technology due to the nature of VMs, lack of visibility for inter- and intra-VM data monitoring, the typical practices around the use of VM’s, and the use of multiple hypervisors in enterprise environments.
Date: 7/29/2015, Author: Keith Bromley. As is common in the high-tech industry, fixing one problem often creates another. The example I’m looking at today is network data encryption. Encryption capability, like secure sockets layer (SSL), was devised to protect data packets from being read or corrupted by non-authorized users. It’s used on both internal and external communications between servers, as well as server to clients. Many companies (e.g. Google, Yahoo, WebEx, Exchange, SharePoint, Wikipedia, E*TRADE, Fidelity, etc.) have turned this on by default over the last couple of years.