SOC Processing

Figure 1 shows the attack detection and tracing process.

Figure 1 Attack detection and tracing process
  1. The SOC periodically obtains security-related system statistics, including packet loss caused by CP-CAR, CPU load, and service availability on each application module.
  2. The SOC works with the attack detection module to determine whether the system is under attack. If there is no attack, the SOC continues to collect statistics. If there is an attack, the SOC starts the attack source tracing process to locate the source of the attack.
  3. The SOC outputs a preliminary conclusion about the attack source to the module collecting packet summaries. After this module discovers suspicious attack packets, the SOC saves information about these packets in the database.
  4. After sampling packets, the SOC analyzes statistics and outputs attack reports based on the configured profile that describes how to identify an attack.
  5. The SOC delivers a policy to isolate or defend the attack based on users' requirements.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic