Network Blackbox

Full packet-based cyber threat hunting solution

Network Black Box is a differentiated next-generation NDR (Network Detection and Response) solution that supports automation of security operations through full traffic inspection based on full packet capture.

Visualize and analyze network security threats through
full packet capture-based traffic inspection.

Accident Prevention

Internal information leak detection

A01
Prevent security incidents in advance by detecting abnormal signs of internal and external security threats through traffic analysis
A02
Minimize and prevent major information leaks through monitoring internal data leaks and personal information leaks.
A03
The need to detect and respond to new security threats through internal network monitoring has emerged.

Accident analysis

Security Incident Tracking

B01
Immediate monitoring through rule setting for major threats
B02
Establishing malicious traffic analysis and response management
B03
Malicious file analysis through traffic inspection
B04
Search entire Host for malicious file downloads by file hash search

Accident response

Security incident response

C01
Reduce the time/cost of post-mortem follow-up
C02
Clear incident analysis and evidence collection through stored traffic after a security incident occurs
C03
Strengthening security in all directions, including threat detection, internal data leaks, and network forensics

Gain visibility

IT Security Management

D01
Gain network visibility through full traffic storage/analysis
D02
IP Profiling and IP Asset Status Monitoring
D03
Gain visibility into sensitive port usage

Capture & Collection1 Detection2 Hunting3
Forensic4 Response5

Next-generation NDR solution with all 5 core features

1 Capture & Collect

It continuously collects packets without loss in environments with high-speed, high-capacity traffic and provides efficient scalability even in large-scale networks through distributed storage.

Smart Packet Collection & Control

Effective packet collection control without loss by collecting, parsing, and filtering packets in real time using the Smart Packet Collection & Control (SPC) technology that stores packets without loss in a high-speed, large-volume traffic environment.

Patent number KR 10-2080477
Distributed Packet Storage

Distributed Packet Storage (DPS) technology is used to distribute and manage packet data databases by distributing them to multiple packet data nodes in a parallel distributed structure that is appropriate for the target network size, and processing large amounts of data.

Application Metadata Extraction

Using Application Metadata Extraction (AME) technology, we analyze the type of application of the packet that occurred, extract metadata according to RFC standard specifications, and index it.

2 Detection

Detect and respond quickly to anomalies and known/unknown threats using collected raw packets, metadata, session data, and original file and body content data.

Signature Intrusion Detection

Detects known attacks occurring on the network using Signature Intrusion Detection (SID) technology, detects standardized attack behaviors with high accuracy, and highlights detected patterns on the low packet analysis screen to provide intuitive confirmation of detection validity.

Behavior Anomaly Detection

By using user behavior-based detection (BAD, Behavior Anomaly Detection) technology, users' network activities are converted into metadata, usage frequency is analyzed and databased, and based on this, violations of regulations and internal abnormalities are quickly identified.

Patent application KR 10-2024-0107499Patent application KR 10-2024-0143546Patent application KR 10-2024-0157865
Content Analysis-Based Threat Detection

Using Content Threat Detection (CTD) technology, data transmitted through the network is stored and analyzed, various user behaviors are identified, and the original files and contents are restored, and then malware is detected and important internal data is leaked externally.

Patent application KR 10-2024-0143546

3 Hunting

By synthesizing various collected data and security threat detection, etc., and utilizing analysis such as security threat intelligence and attack tactics matrix, we proactively hunt for potential threats within networks and systems to prevent security incidents in advance.

Scenario-based threat hunting

Hunt for advanced persistent threats (APTs) with chaining characteristics of security threats by using scenario-based threat correlation detection (STC) technology for detected abnormalities, abnormal sessions and contents, and threat detection.

Patent number KR 10-2080479
Hunting based on intelligent attack tactics analysis

Using MITRE ATT&CK based Intelligent TTPs Analysis (MIA) technology, we matrix the tactics, techniques, and procedures used by hostile actors to hunt for potential threats before achieving the final goal.

Patent number KR 10-2733666
Digital-asset Threat Profiling

Using Digital Asset Threat Profiling (DTP) technology and Device Attribute Based Asset Classification and Management (DAB-ACM) technology, information and behavior history in packet data for all digital assets observed on the protected network are comprehensively collected to hunt for potential risky assets.

Patent number KR 10-2640648Patent number KR 10-2690828

4 Forensic

By analyzing network traffic and data using technology that quickly searches and extracts desired data from massive packet data, all activities on the network are tracked and quickly identified as detected and hunted security threats.

Packet Search Acceleration

Improved search speed by utilizing Packet Search Acceleration (PSA) technology, ultra-high-speed packet search by designing a database refined solely for search purposes and a search algorithm specialized for the database.

Patent number KR 10-2655234
Deep Content Search

Classify and manage user activities (email, social media, file uploads, etc.) using Deep Content Search (DCS) technology, and analyze/restore data to match the latest patterns through decoding pattern updates and packet rebuilding for new services.

Patent application KR 10-2024-0112139
Packet Stream Database

Packet Stream Database (PSD) is a table structure and algorithm that can quickly check whether key information (IP, country code, network group) matches.

5 Response

We provide a rapid response function by linking security equipment and security operation centers that can directly block and control all collected and analyzed information, as well as detected and hunted information, through various methods of linkage.

Syslog transfer

From the packet collection stage to data extraction, and from the detection and hunting stage, all information obtained is selected and transmitted to other systems as needed in a standardized SYSLOG format in the form of CEF.

REST API

Utilizing the built-in REST API function, all stored data and detection and hunting history are provided through automated information collection or on-demand information provision from external systems, providing rapid detection confirmation and response functions from external systems.

3rd Party Development

Rapidly confirms detected and hunted security threats through network forensics and sends control commands to security devices that can provide immediate information or directly control blocking or isolation, thereby linking rapid security threat response functions.

Network Black Box Threat Hunting Case