Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 R2 - REV1 Manual page 241

Table of Contents

Advertisement

TCP resets
threat posing
threat under
threat view
threshold sentry
Time Series
TopN
TopN Time Series
Transmission
Control Protocol
(TCP)
Update Daemon
view
view objects
violation
Whois
For TCP-based applications, STRM can issue a TCP reset to either the client or
server in a conversation. This stops the communications between the client and
the server.
The degree or level of threat an attacker (source) is posing; calculated per interval.
Threat posing is calculated using the aggregated target category, added to the
aggregated Attacker then multiplied by the average number of offenses the
attacker has been associated with.
The degree or level of threat the target (destination) is under; calculated per
interval. Threat under is calculated using the target category aggregate for an
interval, multiplied by the average number of offenses the target has been
associated with.
A security-based custom view that contains object groups based on possible
threats to your network, including DOS, worms, and stealth activities.
Monitors your deployment for activity that exceeds the configured threshold of the
sentry. STRM monitors relevant network objects and identifies whenever a
threshold is exceeded. Thresholds can be based on any data collected by STRM,
not just packet count or bandwidth.
A reporting chart that graphs data based on time. This chart focuses on the
networks or IP address data information from the selected networks.
Displays the top N networks or IP address information for the data you are viewing.
For example, if you are using a Geographic view for U.S. data traffic, TopN can
display the top five networks generating traffic in the U.S.
A reporting graph option that focuses on the top N networks or IP address data
information, based on time, for the data you are graphing.
A reliable stream service that operates at the transport-layer Internet protocol,
which ensures successful end-to-end delivery of data packets without error.
Stores all processed data.
Network activity is classified into a number of views that reflect a particular aspect
or property of the activity. These views determine what and how information is
displayed.
Groups and components in the defined view.
Includes a violation of corporate policy.
Allows you to look up information about registered Internet names and numbers.
STRM Users Guide
G
235
LOSSARY

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager 2008.2 r2

Table of Contents