Attackers infiltrate internal networks through multiple entry points and increasingly
sophisticated techniques. Once inside, they infect systems with malware, explore to identify
targets, and spread laterally across the network to achieve their ultimate objectives.
PIOLINK TiFRONT Security Switch leverages multiple security engines to build a multi-layered
defense architecture within internal networks. This enables proactive and preemptive
responses to threat propagation, effectively containing and mitigating security incidents before they escalate.
Proprietary security algorithm based on Frequency Matrix
Automatically identifies and blocks only malicious traffic without administrator intervention
Responds to zero-day threats without relying on signatures
Maintains full line-rate performance even while security functions are active
Detects and blocks new attacks through continuous profile updates
Automatically blocks and reports lateral movement attempts from infected internal devices
Provides forensic-ready data for incident analysis
Detects and blocks worm propagation attacks
Utilizes data collected by the PIOLINK Cyber Threat Intelligence (CTI) team and multiple threat detection channels
Provides in-depth analysis to support threat prevention and rapid policy creation
Identifies and blocks IPs communicating with attackers’ C2 servers
As network traffic volumes continue to grow, switches must process increasingly complex traffic with speed and stability. TiMatrix, the core security service of TiFRONT, selectively detects and blocks malicious traffic generated by user endpoints. With a hardware and logical separation between switching and security engines, TiMatrix delivers robust security services without traffic latency. By detecting and controlling malicious traffic within the internal network, TiMatrix prevents secondary damage caused by outbound malicious traffic and ensures overall network stability.

vCAT is an active security engine designed to detect and block malware infections and internal lateral movement. It deploys vTraps, decoy systems disguised as real hosts on the security switch, and monitors scanning attempts or access to these traps to identify malicious activieies. Because attackers are unaware of the existence of vTraps, any attempt to access them is treated as anomalous behavior. This allows vCAT to analyze attacker intent and capture early-stage intrusion attempts.

vCAT Security Engine Operation Process
vCAT lures malware into vTraps, analyzes its behavior, and immediately isolates the
accessing host. Through this process, vCAT proactively prevents internal malware
propagation, ensuring a secure and resilient network environment.
Fake Response
The security switch configures vTraps and responds when malware attempts to access them. Attackers perceive vTraps as real hosts and are unknowingly lured into interaction. #vTrap #Malware Luring
Worm Detection
Attack types lured to vTraps are identified and analyzed. Packets generated during malware access attempts are captured and analyzed to distinguish malware types and behavioral characteristics. #Malware Analysis #Packet Pattern Analysis
Worm Definition
Profiles are predefined sets of detection criteria that enable the switch to identify and analyze various threat types. Continuously updated malware databases play a critical role in detecting and analyzing new and variant malware threats. #Malware Database “Profiles” #Advanced & Unknown Threat Detection
Infected Host Block
TiFRONT Security Switch isolates anomalous IPs attempting to access vTraps, preventing further attack propagation. Internal users are also blocked if they access vTraps, in accordance with the Zero Trust security model that assumes no implicit trust within the network. #Real-time Detection & Blocking #Internal Spread Prevention #Zero Trust Implementation
Five Stages of Cyber Attacks
Cyber attacks typically follow these five stages, progressing from initial intrusion to final objective completion.

Overcoming Threshold-Based Limitations
Threshold-independent detection: vTrap is deployed as a decoy meticulously disguised to appear as a legitimate, existing system. Any access to this address is inherently considered abnormal and can be detected regardless of threshold settings.
Detection of low-and-slow attacks: Even slow, distributed scans below threshold levels are detected upon a single vTrap access.
Behavior-based analysis: Analyzes actual packet behavior and malware characteristics for accurate detection
Defense Against Advanced and Unknown Attacks
Detection and learning of unknown threats: New attack patterns are collected and analyzed through vTraps, automatically updating the threat database
Attacker behavior-based detection: Detects threats based on actual attacker actions such as scanning, intrusion, or malware delivery
Attacker profiling and preemptive defense: Identifies repeated access attempts and provides early warnings of insider threats or long-term infiltration attempts
Real-time and Adaptive Defense
Real-time Detection and Blocking: Immediately isolates the host from the network upon access to a vTrap, preventing further damage and lateral spread.
Attack Trend Analysis and Enhanced Response Strategies: Uses attack data collected from vTraps to refine security policies and adjust thresholds of the TiMatrix security engine.
Insider Threat Detection & Zero Trust Reinforcement
Internal Network Threat Detection: Immediately detects anomalous behavior from insider threats or infected PCs when internal users attempt to access a vTrap.
Zero Trust Environment Implementation: Enforces the Zero Trust security model by verifying and validating every access within the network.
By combining the mechanisms of TiMatrix and vCAT, TiFRONT delivers a comprehensive security
environment that continuously monitors real-time threats through behavior analysis, proactively defends
against targeted attacks, and supports post-incident analysis through intrusion data analytics.


| TiMatrix Security Engine (Malicious Traffic Blocking) |
vCAT Security Engine (Worm Spread Prevention) |
|
|---|---|---|
| Security Engine Mechanisms |
Detects and selectively blocks only malicious traffic through behavior analysis Detection and blocking of new threats Detects and blocks threats in real time without affecting switch performance, with automatic release when threats subside Allows security levels and thresholds to be tailored to the organization’s network environment, minimizing false positives |
By deploying vTrap, which is engineered to appear as a legitimate system, targeted attacks are deliberately lured Attacker intent analysis and early intrusion attempt detection Early detection of attacks leveraging unknown vulnerabilities Proactive defense against zero-day and targeted attacks |
| Attack Type Coverage |
Protection against Protocol Anomaly, Flood, Scanning, and Spoofing attacks |
Provides profiling of targeted attacks based on intrusion attempt data (e.g., WannaCry, LockBit, NotPetya) |
| TiMatrix 보안엔진 (유해 트래픽 차단) |
|---|
| 보안엔진 매커니즘 |
|
행위 분석 기반으로 유해트래픽만 선별적으로 탐지·차단 새로운 위협도 탐지·차단 가능 스위치 성능에 영향을 주지 않으면서도 실시간으로 위협을 탐지 및 차단하고 자동으로 해제 조직의 네트워크 환경에 맞도록 보안 등급과 임계치를 설정하여 오탐을 최소화 |
| 공격 유형 대응 |
Procotol Anomaly, Flood, Scanning, Spoofing 공격 대응 |

| vCAT 보안엔진 (웜 확산 차단) |
|---|
| 보안엔진 매커니즘 |
|
공격자가 실제 시스템으로 착각하도록 설계된 vTrap을 배치하여 타깃형 공격을 유도 공격자의 의도를 분석하거나 초기 침입 시도를 탐지 알려지지 않은 취약점을 악용한 공격에 대해서도 초기 징후 포착 가능 제로데이 및 타깃형 공격에 대한 선제적 방어 |
| 공격 유형 대응 |
침입 시도 데이터를 분석하여 타깃형 공격에 대한 프로파일링 제공 (WannaCry, Lockbit, NetPetya 등) |
TiFRONT Security SwitchComprehensive Threat Detection and Response : Continuously monitors anomalous activities across the entire network in real time through behavior-based analysis and proactively defends against targeted attacks.
Proactive Prevention & Post-incident Analysis : Provides real-time attack defense based on thresholds and supports proactive prevention and post-incident analysis through intrusion attempt data analysis.
Efficiency : Delivers maximum security effectiveness at minimal cost through a network switch–based architecture.