官术网_书友最值得收藏!

Identifying conversations and endpoints

You may want to view the list of IP endpoints that your system is communicating with. To achieve this, you can navigate to the Statistics tab and select Conversations, as shown in the following screenshot:

We can see that we have a variety of endpoints that are having conversations, the number of bytes transferred between the endpoints, and the duration of their data exchange. These options become extremely handy when you want to investigate malicious traffic and identify the key endpoints that are being contracted. Additionally, we can see that most of the conversations in the preceding screenshot involves 192.168.1.15 but we may not recognize the IP addresses its talking to.

 We can also make use of the Endpoints option from the Statistics tab, as shown in the following screenshot:

From the preceding screenshot, we can see all the endpoints, and sorting them using the number of packets will give us a clear understanding of the endpoints that are transmitting the highest number of packets, which is again quite handy when it comes to analyzing anomalous network behavior.

主站蜘蛛池模板: 南昌市| 军事| 辰溪县| 依安县| 榆树市| 五常市| 万年县| 利川市| 淮北市| 乌拉特中旗| 溆浦县| 栖霞市| 尤溪县| 鄂尔多斯市| 阿合奇县| 崇信县| 白沙| 井研县| 柯坪县| 敦化市| 阳高县| 梁河县| 韶山市| 邯郸县| 鹰潭市| 邮箱| 射洪县| 林口县| 鲜城| 开江县| 平山县| 临清市| 凤冈县| 文登市| 荔波县| 望奎县| 沾化县| 河南省| 吴川市| 靖西县| 凤冈县|