Quickly learn the definitions and functions of key networking technologies, and how Netscout incorporates these technologies into products and solutions. These pages can help you understand benefits, what you can do with the technology, and how it works, with links to additional resources.
For education and training specific to Netscout products and solutions, please visit our Support and Services page.
In-depth guides and blogs written by talented network and security experts.
Learn About Cybersecurity
Cybersecurity fundamentals and modern techniques for safeguarding and defending electronic data from cyberattacks.
Learn About Network Monitoring
Key information on getting full network visibility to finally see and understand your entire network
Learn About DDoS Attacks
In a distributed denial-of-service (DDoS) attack, a network of computers work in tandem to overflow an access point and prevent legitimate users from accessing a service.
Learn About Mobile Network Monitoring and 5G
Understanding mobile network technologies to monitor and manage your entire network.
F-L
What is jitter?
Jitter is distortion of a voice signal due to mistiming, which can lead to poor quality Voice over IP (VoIP) calls. VoIP views in nGenius software provide detailed information about jitter and other quality indicators. In nGenius Voice | Video Manager, jitter is variations in packet-to-packet delay. A positive jitter value indicates that the packet was delivered to the jitter buffer later than expected.
What is Kill Chain?
An intelligence driven defense process, originally developed by Lockheed Martin, which allows information security professionals to proactively remediate and mitigate advanced threats in the future. Reconnaissance – harvesting email addresses, conference information, etc. Weaponization – Coupling exploit with backdoor into deliverable payload...
An intelligence driven defense process, originally developed by Lockheed Martin, which allows information security professionals to proactively remediate and mitigate advanced threats in the future.
Reconnaissance – harvesting email addresses, conference information, etc.
Weaponization – Coupling exploit with backdoor into deliverable payload.
Delivery – Delivering weaponized bundle to the victim via email, web, USB, etc.
Exploitation – Exploiting a vulnerability to execute code on victim’s system.
Installation – installing malware on the asset.
Command and Control – Command channel for remote manipulation of victim.
Action and Objectives – With “hands on Keyboard” access intruders accomplish their original goal.
What is LAC?
LAC (Location Area Code) is per mobile industry numbering specifications, the Location Area Code (LAC) is one of three identifiers that define the international value known as Location Area Identity (LAI). A Location Area is a set of Routing Areas controlled by an SGSN. The Location Area Identity is composed of the Mobile Country Code (MCC) and Mobile Network Code (MNC) of the operator and the Location Area Code. The Location Area Code identifies a location within the Public Land Mobile Network (PLMN). See also RAC (Routing Area Code).
What is the Locard Principal?
The principal holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it, and that both can be used as forensic evidence. In the case of cybercrime, the perpetrator will leave some evidence that they have been inside your network.
What is the Log Event Extended Format (LEEF)?
What is a Low and Slow DDoS Attack?
A Low and Slow DDoS attack, also known as a slow-rate attack, involves what appears to be legitimate traffic at a very slow rate. This type of state exhaustion DDoS attack targets application and server resources and is difficult to distinguish from normal traffic. Common attack tools include Slowloris, Sockstress, and R.U.D.Y. (R U Dead Yet?), which create legitimate packets at a slow rate, thus allowing the packets to go undetected by traditional mitigation strategies. Low and slow attacks are often HTTP focused but can also involve Long-Lived TCP sessions (slow transfer rates) that attack any TCP-based service.
Cybersecurity Awareness Month
Every October, the NETSCOUT team promotes the conversation around Cybersecurity Awareness Month. We share resources and expertise on how everyone, from end users to service providers, can improve their cyber literacy, keep up with the newest technologies, and join the industry.
Learn how to stay safe online with our helpful resources.