Cybersecurity Use Case

Cyber Defense for Critical Networks

Extreme Throughput and High-Resolution Traffic Intelligence

Boost your cyber defense solutions with high-resolution traffic intelligence

Extreme Throughput and High-Resolution Traffic Intelligence

As cyber attacks against critical public and private infrastructures become increasingly sophisticated, effective threat analytics require accurate and detailed input from different sources. One key source of information is the network traffic itself. The more detailed the traffic visibility available to analytics solutions, the more accurate the detection and investigation capabilities will be.

Qosmos Probe: An Advanced DPI Sensor

A sensor (or software probe) using Deep Packet Inspection (DPI) provides the most granular detail available, delivering a complete picture of activity in any size network. By passively capturing packets, detecting applications, parsing protocols, and extracting traffic metadata, it can significantly improve detection of attacks and raise the performance of proactive threat hunting.

The Qosmos Probe is a DPI sensor that embeds the market-leading DPI engine, Qosmos ixEngine®. This engine offers the broadest protocol coverage in the market, recognizing more than 4000 protocols and applications, including IoT and M2M/SCADA protocols, with support for custom protocols.

The Qosmos Probe leverages years of experience in cyber defense environments and is a key component of the security technology stack for government-run Security Operations Centers (SOCs). For these sensitive environments, combining DPI information with a proprietary, confidential solution creates an additional layer of security, complementing turnkey commercial products such as IDS, which have technical capabilities that can be known by attackers.

Qosmos Probe

DPI Sensor Applications

1. A rich information feed to strengthen threat analytics
  • Information extracted from traffic flows boosts machine learning for threat analytics platforms. This translates into more accurate alerts, shorter time-to-detection, and fewer false positives.
2. An expert tool for network forensics and threat hunting
  • A DPI sensor streamlines investigations and improves time-to-detection for network forensics and threat hunting by capturing and storing detailed traffic information in a database where it can be rapidly and easily accessed for query and visualization.
  • In addition, the sensor provides high information resolution using a fraction of the storage required for full packet capture because it only requires traffic metadata (sender, receiver, device type, file type, etc.), discarding irrelevant content, such as video.

Industry Recognition

Enea Qosmos wins Gold in the 2021 InfoSec Award     Enea Qosmos wins Gold in the 2022 CYBERSECURITY EXCELLENCE AWARDS     Enea Qosmos ixEngine is a winner of the 2022 Cloud Computing Product of the Year Award

Enea Qosmos Technology Reveals Hidden Threats

  • Get maximum visibility into all encrypted traffic to support triage for decryption, advanced analytics for anomaly detection, and forensics.
Virtual Private Networks (VPNs)
  • Accurately identify the use of dozens of VPN applications, including those most commonly deployed for malicious activities. VPN protocols detected with blocking use cases.
  • Detect anonymous proxy services that may be cloaking harmful activities, including those using multiple layers of encryption.
Complex Tunneling
  • Gain visibility into traffic using complex tunneling, with full protocol paths revealed for up to 16 levels of encapsulation.
Covert Communication Channels
  • Detect non-standard tunneling activities over legitimate protocols such as DNS or ICMP, which may indicate unauthorized or illegal activities.
Domain Fronting
  • Reveal the use of routing schemes in Content Delivery Networks (CDNs) and other services that mask the intended destination of HTTPS traffic (direct or tunneled).
Traffic Spoofing
  • Identify apps (e.g., eProxy, HTTP Injector) that combine techniques (such as protocol header customization, proxies, tunneling & domain fronting) to evade detection.
File Spoofing
  • Detect inconsistencies such as a false MIME type or a mismatch between the original hash and computed hash.
P2P Misuse
  • Classify obfuscated P2P traffic to support forensics and behavioral modeling of network traffic.
Device Identification
  • Identify OS and Device in the company’s network to set specific rules in a BYOD world.
Enea Qosmos next-generation Deep Packet Inspection technology reveals hidden threats for Cyber Defense applications


Using Cyber Sensors to Detect Advanced Threats – Case Study: Sunburst Attack via Solarwinds


Qosmos Probe as a DPI Sensor for Cyber Defense


Boost Suricata Threat Detection with Real-Time Traffic Intelligence

Enea Qosmos technology boosts Suricata IDS/IPS performance


Qosmos ixEngine: Next-Generation DPI for Maximum Traffic Visibility

Qosmos ixEngine: Next-Generation DPI for Maximum Traffic Visibility