The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network
11/22/2019Bot detection over IP networks isn't easy, but it's becoming a fundamental part of network security practice.
Post a Comment
Dark Reading is part of the Informa Tech Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Avidan Avraham is a Security Researcher in Cato Networks. Avidan has a strong interest in cybersecurity, from OS internals and reverse engineering, to network protocols analysis and malicious traffic detection. Avidan is also a big data and machine learning enthusiast who enjoys solving complex problem related to this world. Previously, he worked at IBM Trusteer and was responsible for a vast part of the company's detection and prevention capabilities: enterprise security threats and exploits, financial malware variants, and more. Today, in Cato Research Labs, he's focusing on network based security research and novel methods for finding threats in enterprise network environments.