官术网_书友最值得收藏!

Identifying conversations and endpoints

You may want to view the list of IP endpoints that your system is communicating with. To achieve this, you can navigate to the Statistics tab and select Conversations, as shown in the following screenshot:

We can see that we have a variety of endpoints that are having conversations, the number of bytes transferred between the endpoints, and the duration of their data exchange. These options become extremely handy when you want to investigate malicious traffic and identify the key endpoints that are being contracted. Additionally, we can see that most of the conversations in the preceding screenshot involves 192.168.1.15 but we may not recognize the IP addresses its talking to.

 We can also make use of the Endpoints option from the Statistics tab, as shown in the following screenshot:

From the preceding screenshot, we can see all the endpoints, and sorting them using the number of packets will give us a clear understanding of the endpoints that are transmitting the highest number of packets, which is again quite handy when it comes to analyzing anomalous network behavior.

主站蜘蛛池模板: 兴化市| 蒙阴县| 民权县| 巴塘县| 高唐县| 泗阳县| 府谷县| 句容市| 扎兰屯市| 永仁县| 五大连池市| 乳山市| 定西市| 塔城市| 闸北区| 赤水市| 富蕴县| 依安县| 内黄县| 繁昌县| 绥化市| 长治市| 剑阁县| 出国| 长宁县| 普陀区| 富源县| 沂水县| 长阳| 唐河县| 南开区| 揭西县| 汤原县| 常宁市| 深州市| 任丘市| 资兴市| 盈江县| 改则县| 大同市| 瑞丽市|