Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Allot Goes Deep on Packets

Vendor's deep packet inspection lets service providers track user behavior

CHICAGO -- Globalcomm 2006 -- Auditing your service provider's monthly phone bill works wonders in preventing end users from making costly or inappropriate calls. What if you had that same level of detail when you examined the behavior of Internet-connected end users?

Allot Communications (Nasdaq: ALLT), a maker of deep packet inspection technology, this week at Globalcomm demonstrated a new traffic management appliance, the AC-2500, which could let service providers give IT departments exactly this sort of information.

The AC-2500 lets service providers inspect, identify, and analyze hundreds of applications and protocols, track subscriber behavior, and prioritize traffic, according to Allot.

The system is designed to help service providers create classes of service that they can offer at different price levels. But a key element of the product is the NetXplorer management software, which lets network administrators track bandwidth usage and drill down to individual users, applications, and service plans. Using this data, NetXplorer can trigger alarms programmed to identify potential security risks, according to the vendor.

Deep-packet inspection has been available for some time, but it is usually done as a means of analyzing traffic patterns and end-user behavior over time. The Allot product, which can support throughput rates as fast as 5 Gbit/s, analyzes this data in real time, at carrier-class speeds.

Using the Allot product, service providers could conceivably track network behavior down to the end-user level and warn IT managers of potentially risky activities. The technology also could be used to analyze subscriber behavior over periods of time, much as is done in the phone bill model.

Allot offers deep packet inspection tools for the enterprise as well, but they don't perform at carrier-class speeds. The feature is available now; pricing is dependent on configuration of the product, which can accommodate up to 8 Gbit/s of capacity.

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-23
Sourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
PUBLISHED: 2019-10-23
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
PUBLISHED: 2019-10-23
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response cap...
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An authenticated remote non-administrative user can read unauthorized shared files, as demonstrated by the filename=*public*%25252Fadmin_OnlyRead.txt substring.
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An unauthenticated attacker can download log files via the include/makecvs.php?Event= substring.