article page
| 1
| 2
| 3
| 4
|
Measure Impact to Network Protocols, Services, and Applications
Detecting the presence of a network problem (normal or malicious) without a deep understanding of the effects to the QoS of the services and applications involved is meaningless to network operators. What matters the most to an operator is satisfying the SLA signed with their customers by meeting the QoS metrics. Consequently, a GTI system must provide visibility into QoS metrics for SLA compliance. A GTI system captures, creates, and profiles IPSLA metrics used to monitor the correct behavior of network protocols, services, and applications. Those metrics such as RTT, jitter, packet losses, and Layer-7 SLA metrics specific to the most used protocols are generated either using information collected from DPI appliances or by a close interaction with network routers whose IOS supports such functionality. When any of the metrics being baselined violate a specific criteria being configured by the operator, an alert is triggered and detailed reports are displayed. Operators might decide to prioritize their tasks by using this metric as an example (since it is the one they measure as a source of revenue with their customers).
Real-Time Forensic Analysis
Forensic analysis is another key feature of a GTI system. Operators must have a converged operational view across the network traffic, routing, topology, service, and application behavior. The operator must access tabular and graphical reports before, during, and after a problem has occurred and corrective action has been taken. A GTI system allows an operator to dig deeper into an alert detected by close interaction with DPI boxes or routers that have seen the malicious stream. Raw flow and packet information can be captured and extensively analyzed by security personnel.
The GTI system provides two ways for the operator to carry out the forensic task: passive or active. Passive forensic analysis allows the operator to store flow and packet records in an external database. Active forensic analysis, also known as forensic on-demand, allows the operator to retrieve information directly from the network as required.
Suggest Where and How to Take an Action
As part of their duties, operators must be in a position to react to a problem quickly and precisely. This means that the GTI system has to pinpoint to the operator which network elements have seen the anomaly being detected and suggest which network