Page 68 - CDM Cyber Warnings February 2014
P. 68




























DB Networks IDS - 6300













DB Networks IDS-6300 is a core network Intrusion Detection The IDS-6300 has proven to be extremely accurate at identifying
System that immediately detects even the most obfuscated and SQL injection attacks without throwing false positive alarms.
advanced SQL injection attacks. The IDS-6300 accomplishes
this through our patent-pending SQL behavioral analysis The IDS-6300 is easy to set up and can be deployed with no
technology. modifications to existing applications, databases, or security
systems.
DB Networks IDS-6300 next generation core IDS immediately
detects advanced SQL injection attacks. The IDS-6300 detects About DB Networks
even the most obfuscated and advanced SQL injection attacks DB Networks is a privately held corporation headquartered in
through our patent-pending SQL behavioral analysis technology. San Diego, CA. Over five years of development has been invested
into the company's intellectual property in complex behavioral
The IDS-6300 operates passively, on the organization's core analysis and database security. Members of the management
network that connect the database servers to the application team have been successful in creating new markets across the
servers, and is operationally transparent. Once operational, the security, database and network domains.
IDS-6300 rapidly learns the unique SQL environment in which
it's operating. It captures, parses, and learns the dynamic SQL Today's security solutions require the enterprise to complete
being generated by the application. extensive customization of signature files and perform time-
consuming and on-going maintenance of these files simply to
From that learning it creates a unique multi-dimensional detect a small portion of known attacks. Maintenance of these
behavioral model of how the application generates its dynamic solutions often is dependent on significant investment in
SQL statements to access the database. Each SQL statement from customization that requires expert understanding of the web,
the application is then subjected to a thorough lexical analysis application and database tiers.
and SQL semantic analysis against the behavioral model. Any
rogue SQL statements are immediately identified and an alarm �Most Innovative Intrusion Detection System for 2014� -
procedure is invoked. CDM





CYBER DEFENSE MAGAZINE - ANNUAL EDITION 68
   63   64   65   66   67   68   69   70   71   72   73