This website uses cookies to make your use of the site more convenient. For continuing to browse the site, please accept the use of cookies. For details, please read our Privacy Policy.
Packet Capture Solution
Network Monitoring Solution


【White Paper】SYNESIS For Cybersecurity



In May of 2017, the “WannaCry” network cryptoworm was set loose onto the world, causing chaos in data centers across the globe. According to some estimates, this cryptoworm impacted more than 200,000 organizations in 150 countries.


WannaCry belongs to a class of cryptoworms known as ransomware and the way they work is especially treacherous. This cryptoworm attacks Windows operating systems (OS) by going after a known exploit in the OS.It would encrypt files and demand a ransom payment in exchange for decrypting these same files. If your files were affected by this worm, and you do not pay the ransom, the net effect is as if your files had been deleted.Furthermore, this worm has a transport mechanism which allows itself to propagate over networks, potentially creating havoc on networks near and far.


A month after this worm was unleashed, a total of over $130,000 (US) was paid by victims to have their files decrypted. Both Microsoft and the British government believe a certain Asian rogue country was the launching point for WannaCry.


Then in late March of 2018, officials in Atlanta,Georgia reported that the city’s computer systems were still not yet fully operational after the city was hit with a wide scale ransomware attack the previous week. It left the capital city crippled with  many city employees unable to access the Internet or email. In many city offices, it was reported that many were operating on pen and paper instead of computers.


Meanwhile, Wi-Fi access at Hartsfield-Jackson Atlanta International Airport, the world’s busiest airport, was turned off as a precaution. Hackers ultimately demanded a $51,000 ransom payment. The cost in lost productivity, however, was far greater.

These two recent incidents highlight how much our digital infrastructure is at risk due to cyber attacks.




The field of Network Forensics is a sub-branch of digital forensics relating to the monitoring of networks and also capturing network traffic for further analysis. Organizations can only benefit from network forensics by having complete records of past network events for their protection as well as their customers.


As organizations grow so also does the amount of network traffic they generated and received. IT groups may keep long-term records of network traffic in metadata form but the most  comprehensive form of network record keeping are packets.


But recording all network packets is typically not possible. Packets will be lost due to oversubscription due to high traffic rates and limited storage.


Modern network security appliances from many cybersecurity companies are designed to protect organizations from security breaches including malware, viruses, trojan horses and cryptoworms like WannaCry. They are often an enterprise’s first line of defense.


Furthermore, these appliances are often updated to insure that they have the latest signature profiles of malware, viruses, trojan horses and cryptoworms to aid with detection.

These appliances are designed and optimized for packet-level, real-time analysis; as such, they lack a number of proven capabilities that would make them more adept at and capable of identifying and combating cyber attacks.


For example, these appliances typically have limited storage capabilities and cannot store any large amounts of data or network packets, particularly in high-speed networks. This limits any ability to perform any meaningful network forensics once an attack has taken place. Without such information, there is no way to examine the network packets and flows that have contributed to this breach.





For download the entire WhitePaper , please login  and download here. (Registration in Japanese only , please contact to for English communication.)