ABSTRACT

In clouds, just as in information technology, professionals' internal network, detection relies upon being able to see the traffic, which means that the security team needs to have the time and resources to deploy sensors into the network at key locations. Hackers commonly use social engineering to construct amazingly good malicious emails that tantalize users into clicking on a link to malware that infects their network from the inside. Many criminal systems use the concept of ARP poisoning, so that the workstation talks to one network interface and the destination/ router talks to another, in much the same way that a legitimate web proxy functions. The whole concept of out-of-band management networks gained acceptance as devices such as serial console servers and IP-based Keyboard Video and Mouse became necessary when data centers exploded in size and complexity. By physically separating this “Hail Mary” network from the production infrastructure, engineers prevent in-band attacks from locking them out of the enterprise network.