, New Honeywell proximity sensors are rugged and reliable in extreme environments – now from TTI, Inc.
, New Honeywell proximity sensors are rugged and reliable in extreme environments – now from TTI, Inc.

Rohde & Schwarz Cybersecurity’s Deep Packet Inspection Software Now Detects Bitcoin Transactions in Network Traffic

The new Bitcoin protocol classification functionality enhances network analytics and security solutions to identify Bitcoin network activity. This enables enterprises to identify, control and block bitcoin transactions within a network.

Rohde & Schwarz Cybersecurity, a leading IT security company, today announced the availability of its new Bitcoin protocol classification capabilities provided by the deep packet inspection (DPI) engine R&S PACE 2. The OEM software solution is now able to reliably detect and classify the Bitcoin protocol in network traffic in real time.

Bitcoin is a cryptocurrency and a digital payment system. Transactions are made peer-to-peer and are written directly on a distributed ledger named “blockchain”. The digital money is issued and managed without any central authority – meaning no governments or banks are involved. The virtual money can be exchanged for other currencies, products and services and shopping web sites accept cryptocurrencies as a method of payment.

With the new Bitcoin protocol classification capabilities provided by R&S PACE 2, vendors embedding the DPI engine in their network security and analytics solutions are now able to classify Bitcoin transactions within IP-based network traffic in order to fully understand how a network is utilized.

They can accurately and reliably identify Bitcoin network activities and implement security policies accordingly. This increases their visibility of and their control over potential security risks related to Bitcoin transactions.

The DPI software library R&S PACE 2 provides powerful and reliable detection and classification of thousands of applications and protocols by combining deep packet inspection and behavioral traffic analysis – regardless of whether the protocols use advanced obfuscation, port-hopping techniques or encryption. DPI is needed everywhere in the network where intelligent decisions need to be made based on the nature of IP traffic, whether it is wanted or unwanted traffic, good or malicious.

Comments are closed.