

Using the embedded network packet scan algorithms, the application detects signs of falsified addresses in ARP packets and various anomalies in the TCP and IP protocols. When the conditions defined in an active Intrusion Detection rule are detected in traffic, the application registers a rule-triggering event. Intrusion Detection rules and embedded network packet scan algorithms are used to detect such activity. This functionality lets you monitor traffic to detect signs of attacks or unwanted network activity. Lists of monitored system commands are generated when you configure the settings of Process Control devices. Values of industrial process parameters are tracked with the aid of Process Control rules that are used by the application to detect unacceptable values. This functionality lets you monitor traffic to detect the values of process parameters and the systems commands transmitted or received by devices.


This functionality lets you monitor interactions between devices of the industrial network. For the purpose of Asset Management, the application generates a table containing information that is received automatically from traffic or information that is manually provided. In conjunction with Process Control functionality, read/write operations for programmable logic controllers are also monitored. The application can also define device settings for Process Control. To automatically receive information about devices, the application analyzes industrial network traffic according to the rules for identifying information about devices and the protocols of communication between devices. This functionality lets you monitor the activity of devices and track changes to device information based on data received in network packets. In Kaspersky Industrial CyberSecurity for Networks, industrial network traffic analysis is provided by the following functionality: Industrial network traffic analysis functionality Overview of Kaspersky Industrial CyberSecurity for Networks functionality
