Exploratory Data Analysis of Network Traffic in Industrial Control Systems
|
|
|
- Toby Robbins
- 10 years ago
- Views:
Transcription
1 Exploratory Data Analysis of Network Traffic in Industrial Control Systems Carlos Ortega, Anvit Srivastav, Priya Ahuja, Michael Christian, Alvaro Cardenas August 21, 2014 Abstract In this paper we have presented the different network monitoring tools and Network security monitoring tools for Intrusion Detection based on our study and evaluation. We analyzed these tools by working on sample data sets in order to get familiar with the framework and analyze the pros and cons of different tools. Later we used one of these tools to derive results from Industrial Control systems data which was 200GB in size. We derived useful results using these tools such as network architecture and various useful graphs for analyzing the behaviour of network traffic. 1 Introduction The different network monitoring tools that we worked on are Zenoss,Snorby,Sguil and Splunk.We also analyzed and worked with Bro IDS which is a network security monitoring tool for Intrusion Detection systems. Our goal was to study,evaluate and compare these available network monitoring tools.first we worked on all these tools with sample data sets in order to evaluate the tool based on its performance and utility. Later, we used one of these tools to study and derive results from the Industrial COntrol Systems data which have been summarized below in Section 5. We used Bro IDS to generate Bro logs for 200GB data from Industrial Control Systems. We used logs generated from Bro to generate useful results 1
2 by writing python scripts.the results obtained have been summarized in Section 5 of the paper. In Section 2, we have summarized our ananysis of Zenoss, Sguil, snorby and Splunk. In Section 3, Bro IDS ans the exercise which was performed to study it has been explained.in Section 4, we have summarized the Comparision of the different tools studied based on the features that each of these provide.section 5 consist of the results obtained from the study of Industrial Control systems data. 2 Network Monitoring Tools 2.1 ZENOSS Introduction Zenoss is an open source network,application and server management platform which is based on the Zope application server. Zenoss Core provides a web interface which allows you to monitor availabilty,functionality,performance and events of networks,servers,services and applications. Zenoss has the monitoring availabity of network devices using SNMP, SSH and WMI, network services such as HTTP, POP3, FTP and SNMP as well as host resources such as processor and disk usage on most network operating systems.also, Zenoss has the capabilty to automatically discover network resources as well as any changes in the configuration of the network. Zenoss can be downloaded from here [2]. It is a single product that monitors real and virtual servers and network devices.zenoss uses a model driven architecture.zenoss builds a model for every device it monitors to drive the monitoring.for any device we can see the availabity and uptime,cpu Utilization, the status of key components, the OS system version and the system information. It is easy to identify if all the servies are performing properly and also helps us to identify the software installed.in addition to availabity and configuration information it provides about varoius devices, it is comprehensive event manager and it collects events both from system log files and also generates its own events when its model driven policy detects an issue such as a performance threshold violation. Zenoss analyzes and collects performance information and 2
3 charts it.you can choose a longer time period to see if current performance is not normal. And look at both OS and application metrics side by side to see correlation.zenoss supplements system provided metrics with its own sysnthetic transations that directly measure application performance and it includes predictive thresholds that automatically alert you about abnormal behaviour even if you don t know what normal is. There is a traffice light signal which shows and alerts about any issues with the device or network. Zenoss manages both devices and networks that are ON. It models upstream and downstream connections for deives. So if a Router fails you do not get availabity notifications for every device downstream of the failed router.one of the most powerful feature of Zenoss is the ability to look at the network from the presepective of the device.any network issues are automatically notifies of to the user associated thus helping with the complete monitoring of devices as well as issues generated. As a part of learning exercise we analyzed a virtual machine using zenoss. All the informaion regarding the machine like the status of the machine, intefaces, devices connected, CPU utilization was studied. Also the network map of the machines showing network configurations and connections was analyzed. When we talk about using Zenoss for analyzing any existing data, it does not provide us the flexibilty to do the same. Therfore, with Zenoss you can only monitor deivces or network tht are physically associated with your machine Technologies used in Zenoss The different technologies used in zenoss are aa follows: a. Zope - It is an application server written in Python b. Python - It is an extensible programming language used in Zenoss. c. SNMP - Monitoring protocol that is responsible for collecting status information of systems d. RRDtool - This is the tool that is responsible for generating graphs in Zenoss. e. MYSQL - An open soure database which is used in Zenoss for maintaining data about configuation and availabity of devices and networks present. 3
4 2.1.3 Key Features a. Discovery b. Availability Monitoring c. Performance Monitoring d. Event Management ZenPacks A ZenPack is an extension to Zenoss. It is a way of adding the abiltiy to monitor new kind of devices and also to add new capabilties to Zenoss itself.since there are a variety of hardware and software that need to be monitored, Zenpacks allow us to monitor everything.there are hundreds of ZenPacks available, some developed, supported, and maintained by Zenoss, and many others that are developed and maintained by the Zenoss user community. Earlier we talked about Zenoss not supporting monitoring of existing network data. With the use of Zenpacks we can however achieve this functionality by using Splunk Zenpack. The Splunk ZenPack allows you to monitor the results of a Splunk search using Zenoss. More information on Splunk can be found here [1]. 2.2 SGUIL Introduction The sguil client is written in Tcl/Tk and can be run on any operating system that supports Tcl/Tk. Sguil is described as an aggregation system for network security monitoring tools.sguil simply ties together the outputs of various security monitoring tools into a single interface, providing us with the most information in the shortest amount of time and at a same place.it gathers all the information related to IDS alerts, full content packet logs and all other useful information into the database of TCP/IP sessions.when you indentified any kind of IDS alert, Sguil client allows you to access and query the database and decide on how to deal with the situation. 4
5 2.2.2 Architecture A Sguil system consist of a sguil client, sguil server and a number of sguil network Sensors.The sguil sensors perform all network monitioring tasks and on regular basis they feed information gathered back to the server. This information is then managed and stored in the database at the server. The Sguil clients can then query the desired information from the server database. 2.3 SNORBY Introduction Snorby is an open source ruby on rails web application for network security monitoring that interfaces with current popular intrusion detection systems (Snort, Suricata and Sagan) Features Snorby is front end web application for any application that logs events in the unified2 binary output format. It doesn t perform any network monitoring tasks by itself, instead it depends on other IDS s such as Snort to report data to it. Since snorby itself is just a dashboard, it allows them to have sensors for events of their choice or even have custom sensors in the IDS of their choice. It also supports full packet capture so that the users can see complete packets which makes it easier to determine if an attack occurred. Snorby can generate hourly/daily/weekly or monthly graphs and reports for monitoring data. It allows classification of events based on preset classes or based on user defined custom classes. It also features hotkeys which allow users to quickly borwse, view and classify events in the web application without the use of the mouse which makes working with it exremely fast and responsive. 5
6 2.4 SPLUNK Introduction Splunk Enterprise is the leading platform for real-time operational intelligence. Its a fast and secure way to search and visualize massive streams of data. Splunk was founded to pursue a disruptive new vision: make machine data accessible, usable and valuable to everyone. Machine data is one of the fastest growing and most pervasive segments of big data generated by websites, applications, servers, networks, mobile devices and all the sensors and RFID assets that produce data every second of every day. By monitoring and analyzing everything from customer clickstreams and transactions to network activity and call records and more Splunk turns machine data into valuable insights no matter what business you re in. It s what they call Operational Intelligence Features There are many features within Splunk, one of the most important is Universal indexing. It s a way of aggragting all of the data from a specified data source. Also with universal indexing data can be index in real time. Another nice feature of Splunk is the Search feature. Once the data is index it can then be searched to find potential threats, attacks, viruses...etc. this makes for a very efficent way to find your problems. 6
7 3 Bro IDS 3.1 Intro The Bro Network Security Monitor is a powerful tool used for intrusion detection. There are two essential components that make Bro the powerful tool it is. The Event Engine is used to transform the packet stream into events, which abstracts much of the complexity of dealing with packets. It is the job of the Polocy Script Interpreter to decide what to do with the events. 3.2 Bro IDS homework The homework was to do the exercises that were part of a workshop done in Below is an overview of these exercises. The first part covers the first four exercises. The second part covers the last three exercises Part I In this section we will discuss the first four exercises of the Bro workshop. We will go over the set up of bro and what I think is good practice for beginners. Bro is a powerful network analysis framework that is self-proclaimed to be very different than the normal IDS and I would agree. The first exercise in Bro is the getting started exercise. This is by far one of the simplest exercises out of the four. In this exercise we start by configuring the Bro source code. Steps one through four are only needed if you are doing a fresh instal of Bro, in my case I installed Bro along with the Security Onion application. In steps one through four we set paths and privileges for Bro. If you do not complete step number four on the Linux system then you will have to run the first bro command along with the Sudo command. Step four gives Bro the necessary privileges to run as the root user. Step four was the only step I found to be necessary to run if you already had Bro installed. You will also want to complete steps five through eight as well, running through these steps will get you familiar with using BroControl and running Bro directly along with teaching you what log files are and what they look like. BroControl is an interactive shell for operating Bro s installation. You may also run Bro from inside the interactive shell(brocontrol). You may also run Bro directly from a temp folder. When running Bro directly it 7
8 will also store the log files in the working level directory. It would be good practice to learn how to run Bro from both BroControl and directly from a temp file. Once you understand what Log files are you can start to parse out information you need using the Bro-Cut utility. Bro-Cut is a utility that can be used to parse out specific information out of Log files. Exercise two Understanding and Examining Bro Logs gives you an in depth look into Bro Log files. It will show you how Log files are generated using the r command in Bro. Bro is filled with helpful commands and you can view them all by running the h command. This section also shows you how to parse information from whichever Log file you would like information from. You can list the requested information in descending order as well as ascending order. This will be done using your awk tool for processing data you could also do this with Bro-Cut as mentioned earlier. Bro calls the Awk tool their Swiss army knife for log processing. This tool allows users to quick retrieve any information he/she needs from the Log files. Using this tool will allow you to find all connections lasting longer than one min, find all IP addresses of web servers that send more than more than 1 KB back to a client, and show a breakdown of the number of connections by service. The next exercise was very interesting because it s the first time we have seen Bro in action so far speak. Exercise three teaches us about notices and alarms. Exercise three Handling Notices is where things started to get interesting to me, because it was able to give me real time feedback and by default Bro does some analysis on some Network traffic by itself and determines if there s any interesting information for you to look at. This interesting information is also known as Notices in Bro. In this exercise you will learn how to run Bro on a network trace and see if there s any suspicious activity currently on the network. Lastly this exercise will teach you how to write policies and how to get Bro to trigger alarms. In exercise four Bro Programming Primer you will begin to learn the Bro scripting language. You will look at tables and vectors,and Records along with Functions. I believe spending plenty of time on this section will be of good value because you havet to become pretty familiar with the language to get Bro to do what you want it to do any way and this is a great place to start. 8
9 After doing these exercises I can tell you that some were a piece of cake and where just a matter of doing exactly as the instructions directed me to and others where the exact opposite with no solution online. In exercise one the only issue I ran into was due to not running step four, which allowed Bro to run as the root user. I solved this problem by running Bro with the Sudo command to give it the required permissions. In the first exercise I also found that beyond the bro documentation found on the Bro website there isn t much help out there and that was pretty consistent throught the rest of the excercises. Exercise two s final step gave me problems because I wasn t exactly sure how to run the script that tells Bro to change the separator for Bro. I solved this problem by downloading the file for the exercise and saving it in the working directory, then simply run the script provided Part II The final exercises focused more on real world situations and build up from the first exercises. Overall these where very engaging, however some of the solutions were outdated. This caused some confusion that will be discussed further on. The fifth exercises was arguably the most confusing to complete. This is not because it was difficult, but rather because the topics are covered in this exercise are not adequately discussed in the bro videos. The first part deals with certificates and how to allow Bro to trust custom certificates. Essentially this part just consists of running a few Bro command lines. The first command was to run Bro with a script that is somewhere in the installation directory. After seeing the solution the location of the scripts can be found by doing a find on the script that is used in the solution. These ssl Bro scripts in Security Onion are found here: /opt/bro/share/bro/policy/protocols/ssl/. The rest of the first part consist of the same type of problem. The last two parts of this exercise dealt with events. The actual Bro scripts that are needed to solve the problems are quite simple, but doing event scripts for the first time can be quite frustrating. It is important to note that the solution to the second part will not work if the version of Bro is That being said, the problem with the solution is that the parameters for the x509 certificate event have changed since Bro 2.0. Looking up the updated event in the doc- 9
10 umentation will help solve the problem. Perhaps being one of the funner exercises, the sixth exercise was the most engaging to complete. This exercise consists of five parts, all of which revolve around a central story of a company, Huge Big Dairy, and how their security has been compromised by the hacktivist group Synonymous. Part one deals with web authentication. The goal is to find the web server that uses weak authentication using the pcap file provided. After that it is possible to find the users password by telling bro to capture passwords and run Bro with the pcap file again. The second part is where things begin to get more interesting. This time another pcap file is given and the goal is to find the file that was leaked and determine the type of attack. Finding the file is not too complicated, but knowing the name of the attack can be tricky if someone is not familiar with the semantics of security. After figuring out that this was a directory traversal attack the next step is to see if it was successful. This can be done by looking at the status code of each HTTP request. In the end it is possible to see that there was a successful attempt at fetching the classified file. The third part of the exercise has to do with . The information that is provided states that HBDairy believes someone forwarded sensitive information using unencrypted . A pcap file is provided, to solve this the SMTP traffic needs to be analyzed. At first this seems pretty straight forward. However using the solution provided does not work because of some minor differences between Bro version. For example, after finding a potential UID from the SMTP log, the provided solution is to search for that UID in the smtp entities.log file, a file that is not created in new Bro versions. Instead the UID needs to be searched for in the files.log file. After this the file that was ed needs to be extracted. The solution that is given does not work anymore but there is another solution that will extract all the files here: The last two parts of exercise six deal with examining the dns log and http log files. In the fourth part the goal is to figure out why the employees cannot access youtube.com. After that you need to see how long the downtime was. The last part deals with a CSRF attack done by Synonymous to an employee. 10
11 The last exercise is the most challenging and advance. It is definitely one to revisit. The first part is to make a sidejacking detector by basically seeing if a cookie is being reused. The second and last part is more complicated and is to make a webcat analyzer for Facebook. 3.3 Afterthoughts Overall after finishing the exercises there is a greater appreciation of Bro. Although there are some aspects of Bro that can be daunting to understand, overall Bro is very versatile and can do a lot more things than what was covered in the exercises. The only potential issue is that while Bro does contain a substantial amount of documentation, some of the documentation can be difficult to follow. This causes a trial and error approach to using and learning new parts of Bro. 4 Comparision of Network Monitoring Tools Features Zenoss Snorby Splunk Sguil Squert OSSIM Platform Puthon,Java Tcl/Tk AutoDiscovery Yes Data Storage Method SQL Flatfile SQL Plugins Yes (ZenPacks) Yes Triggers/Alerts Yes Yes Yes Yes Yes Web-Based No Generate Graphs Yes Yes Yes No No 11
12 5 Results : Analysis of Industrial Control Systems Data 5.1 Figure 1 : Network Architecture This figure summarizes the picture of the netowrk architecture that was obtained after studying and getting results from the ICS data.there were 12
13 different types of protocol used for communication in the network like TCP, UDP, ICMP, IGMP, SNMP and MODBUS. The MODBUS traffic flow was observed to happen between the and the internal network IPs.More detailed picture of network flow is given in Figure 2 below. As shown in the figure, There were 2 IPs that were dominating the entire communication and Both, and talk each other as well as other Internal network IPs. All communication with the outside world was done only through the However, was not at all involved in the MODBUS packets communication. Based on the study, we observed that there was one IP address which was the only IP other than that communicated directly with the outside world, this seemed to serve as a PROXY. Thus, this is the brief network picture that was obtained after studying the data from ICS. 5.2 Figure 2 : Modbus Traffic Flow in the Internal Network 13
14 This Figure depicts the MODBUS data flow between and the internal network.we can see from the figure that communicated with everyone in the internal network. Whereas, there are few communication in which is not involved. Such communications which do not involve have been shown in the figure clearly is not at all participating in the MODBUS traffic flow. 5.3 Figure 3 : New non modbus connections per minute It can be inferred from the figure that the majority of connections are formed within the first 1.5 hours. After that there are a few new connections that take place intermittently. However, there is a sudden surge in connections at 1156 minutes when 111 new connections were formed. 14
15 5.4 Figure 4 : New modbus connections per minute As can be seen from the graph, almost all the connections are made within the first 3 minutes. In fact, the data showed that most of the connections were made in the first 6 seconds. After the first 3 mins, there are absolutely no new connections except in the interval minutes 4 small peaks were observed. It is interesting to note that the first and the second peak occur at 1154 and 1156 minutes, which is almost the same time period where the peak from the non modbus connection graph was observed. 15
16 5.5 Figure 5 : New non modbus IPs per minute This graph is similar to the non modbus connection graph for the most part. It shows that most of the new IPs are discovered within the first 1.5 hours after which a few new IPs are discovered intermittently. It also features a sudden surge at 1156 minutes when 88 new IPs are discovered. It can be inferred that most of the times that a new connection is made, the IPs being connected to are new IPs. 16
17 5.6 Figure 6 : New modbus IPs per minute It is interesting to see that this graph also runs parallel to the new modbus connection graph. The majority of connections take place within the first 3 minutes and then there are no new IPs except the 4 small peaks observed around minutes. Hence, even for the modbus connections, most of the connections are being made to new IPs. 17
18 5.7 Figure 7 : Number of non modbus packets per minute The number of bytes being transferred for non modbus packets fluctuates but for the most part, the number of bytes being sent per minute stays under 20,000 and it shoots up close to 30,000-40,000 intermittently. There are few peaks which shot above even 50,000 bytes a minute in the range minutes. 18
19 5.8 Figure 8 : Number of non modbus packets per minute Unlike the non modbus graph, the number of bytes transferred over modbus stayed within 5,000 and it crossed 20,000 only 13 times. However, There is a huge peak at 782 minutes when 232,314 bytes were transfered. 19
20 5.9 Figure 9 : Different Protocol Types with their Percentage 20
21 21
22 Protocol Percentage TCP Modbus/TCP SNMP ARP ICMP x NBNS UDP HSRP SMB SAMR DN DHCPv SMB DCERPC CLDAP BROWSER LDAP NTP Modbus Visualizations With D3 and Gephi In order to analyze and visualize the network data, Bro was used to create logs. The Bro logs made it possible to extract the relevant information much easier and faster than if we used the pcap files directly. Since there were 166 pcap files, there were 166 sets of Bro logs. Each Bro log contained logs for the modbus, dns, and connection, as well as others. Since the logs were easy to parse, using python it was possible to extract relevant information and create json or csv files to be used with D3 or Gephi. 6.1 The First PCAP File In order to have an understanding of the modbus network, the initial exploratory analysis was of the first pcap file. This served as a way to try different theories before committing to the entirety of the data. 22
23 6.1.1 Figure 9 : Distribution of Modbus Connections This image was taken from an animation done in D3 showing the connections from the central server to different RTUs. In this image you can see 23
24 how in the last second of the first pcap file there is a large disparity in the number of connections being made to the different RTUs Figure 10 : Distinct Modbus Connections at Each Second In this graph we observe the distinct modbus connections for the first pcap file at each second. This means that each second we count the number of distinct connections for that second. When graphed it is possible to see that there is a uniformity in the way that the network behaves. What is interesting to see is the blue dots, which represents when the number of distinct connections drops significantly. This happens about every 26 secs starting at second Using The Entire Data After examining the first pcap file, attention was shifted into analyzing all of the data. Using what was learned from the previous examinations from the first pcap file we further examined the data to see what was the pattern of connections Frequency of Modbus Connections The next set of graphs show how often the main server was communicating with the RTUs. What this means is that the graphs show how often sets of 24
25 communications occur. It is important to note that 0 secs is not included. This is because it was observed that bursts of connections to a single RTU occur within a second. For example the server might communicate with a single RTU 300 times in one second, this burst might not be seen again for 5 secs. This turned out to be a fair assumption to make, however it did not always provide clear results. Figures 11,12 : Selected RTUs With Majority of Intervals of 1sec The top image shows two of the addresses of the RTUs that have the top total connections as seen on Figure 9. As you can see nearly 100 % of the time there are communications every second. This might also indicate that these RTUs are critical to the system and therefore need constant monitoring. 25
26 The bottom image shows different addresses of the RTUs that have about 75 % of their intervals at 1 second. The remainder is mostly of 2 seconds. At first this seemed odd, but since we are using a second as our time frame, what seemed to happened was that a series of communications spanned more than one second. For example let A be an RTU. Now lets say that the server started a burst of communications with A at time x and finished at time x+3. It then continued to make the same burst every 2 seconds. Based on the current way that the graphs were made, there would be three 1 second intervals and just one 2 second interval. This suggests that using a second as the time frame might be too large. Figure 13 : Selected RTUs With Majority of Intervals of 2sec Here we have some RTUs which the server communicates to for the most part every 2 seconds. This further shows how the modbus network is rigid, controlled, and to an extent predictable. Figure 14 : RTUs With Majority of Intervals of 3sec 26
27 This image is similar to Figure 13 except that the communications happen every 3 seconds. Figure 15 : RTUs With Majority of Intervals of 5sec These RTUs also seemed to behave in an odd way. However just like Figure 12, the time frame of 1 second might not be small enough to have conclusive results. Figure 16,17 : RTUs With Majority of Intervals of 300sec 27
28 The last set of RTUs are very unique since the server communicate with them almost every 300 seconds. A possible explanation for this is that these RTUs are not critical to the system and therefore do not require constant monitoring. 28
29 6.2.2 Figure 18 : Complete modbus network This graph was made using Gephi. The Graph shows the complete modbus network. The nodes are color coded based on indegree where white is 0, light blue is 1, medium blue is 2, and dark blue is 3. These represent the number of sources that connect to that particular node.the center white circle represents the central server which can be seen in Figure 2 with address As you can see most of the connections happen from the central 29
30 server to different RTUs. However there are 7 other nodes that the central server does not communicate with. It is also possible to see that some RTUs communicate with each other Figure 19 : Hive plot of the complete modbus network This graph shows the same information as Figure 18 but in a way that shows the connections between RTUs more clearly. There are 8 different connections between the RTUs. These are represented by the yellow lines. The graph also shows the addresses that the central server does not communicate with. These are the nodes in red and the one in purple. It is clear 30
31 that there are some communications from the red nodes to the RTUs(yellow nodes), these are represented in red lines. There is also a single connection from the red nodes to a purple node. More analysis would need to be done to conclude the purpose of the red and purple nodes(address). One possibility is that these addresses may also be RTUs. 31
32 References [1] Splunk. [2] Zenoss user community. 32
Exploratory Analysis of Modbus and general IT network flows in Water SCADA System
Exploratory Analysis of Modbus and general IT network flows in Water SCADA System Anvit Srivastav Michael Christian Southern Wesleyan University Central, SC 29630 Carlos Ortega University of Illinois,
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
Bro at 10 Gps: Current Testing and Plans
U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Monitor Solution Best Practice v3.2 part of Symantec Server Management Suite
Summary When implementing Monitoring and Alerting part of Server Management suite. The following items are areas that should be reviewed. It is important to start to monitor what you need and add/build
USE HONEYPOTS TO KNOW YOUR ENEMIES
USE HONEYPOTS TO KNOW YOUR ENEMIES SHERIF MOUSA (EG-CERT) 9 MAY 2012 WHAT ARE WE GOING TO TALK ABOUT? What exactly happens on the end of your Internet connection. Open Source tools to set up your own Honeypot
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
Richard Bejtlich [email protected] www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04
Network Security Monitoring with Sguil Richard Bejtlich [email protected] www.taosecurity.com / taosecurity.blogspot.com BSDCan 14 May 04 Overview Introduction to NSM The competition (ACID, etc.)
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
Assets, Groups & Networks
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How To Test The Bandwidth Meter For Hyperv On Windows V2.4.2.2 (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2
BANDWIDTH METER FOR HYPER-V NEW FEATURES OF 2.0 The Bandwidth Meter is an active application now, not just a passive observer. It can send email notifications if some bandwidth threshold reached, run scripts
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
StruxureWare TM Center Expert. Data
StruxureWare TM Center Expert Data End to end data center infrastructure management software for monitoring and control of power, cooling, security and energy usage from the building through IT systems
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Kaseya 2. User Guide. for Network Monitor 4.1
Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
MONyog White Paper. Webyog
1. Executive Summary... 2 2. What is the MONyog - MySQL Monitor and Advisor?... 2 3. What is agent-less monitoring?... 3 4. Is MONyog customizable?... 4 5. Licensing... 4 6. Comparison between MONyog and
TPAf KTl Pen source. System Monitoring. Zenoss Core 3.x Network and
Zenoss Core 3.x Network and System Monitoring A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system Michael Badger TPAf KTl Pen source I I flli\ I I community
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
mbits Network Operations Centrec
mbits Network Operations Centrec The mbits Network Operations Centre (NOC) is co-located and fully operationally integrated with the mbits Service Desk. The NOC is staffed by fulltime mbits employees,
Features Overview Guide About new features in WhatsUp Gold v12
Features Overview Guide About new features in WhatsUp Gold v12 Contents CHAPTER 1 Learning about new features in Ipswitch WhatsUp Gold v12 Welcome to WhatsUp Gold... 1 What's new in WhatsUp Gold v12...
Getting Started with PRTG Network Monitor 2012 Paessler AG
Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Network Security Monitoring
Network Security Coleman Kane [email protected] September 24, 2014 Cyber Defense Overview Network Security 1 / 23 Passive Passive 2 Alert Alert Passive monitoring analyzes traffic with the intention
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
MONyog White Paper. Webyog
1. Executive Summary... 2 2. What is the MONyog - MySQL Monitor and Advisor?... 2 3. What is agent-less monitoring?... 3 4. Is MONyog customizable?... 4 5. Comparison between MONyog and other Monitoring
A SURVEY ON AUTOMATED SERVER MONITORING
A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. [email protected] Abstract This paper covers the automatic way of server
Network device management solution
iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System
DEPLOYMENT GUIDE Deploying the BIG-IP LTM with the Cacti Open Source Network Monitoring System Version 1.0 Deploying F5 with Cacti Open Source Network Monitoring System Welcome to the F5 and Cacti deployment
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory
Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
The Bro Network Intrusion Detection System
The Bro Network Intrusion Detection System Robin Sommer International Computer Science Institute, & Lawrence Berkeley National Laboratory [email protected] http://www.icir.org System Philosophy Bro
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Special Edition for Loadbalancer.org GmbH
IT-ADMINISTRATOR.COM 09/2013 The magazine for professional system and network administration Special Edition for Loadbalancer.org GmbH Under Test Loadbalancer.org Enterprise VA 7.5 Load Balancing Under
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
MSP End User. Version 3.0. Technical Solution Guide
MSP End User Version 3.0 Technical Solution Guide N-Compass Remote Networking Monitoring Architecture How Does N-Compass Help Small & Medium Businesses? Proactive IT management The ability to do predictive
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
The Definitive Guide. Monitoring the Data Center, Virtual Environments, and the Cloud. Don Jones
The Definitive Guide tm To Monitoring the Data Center, Virtual Environments, and the Cloud Don Jones The Nimsoft Monitoring Solution SERVICE LEVEL MONITORING VISUALIZATION AND REPORTING PRIVATE CLOUDS»
MySQL Enterprise Monitor
MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
AlienVault Unified Security Management (USM) 4.x-5.x. Deploying HIDS Agents to Linux Hosts
AlienVault Unified Security Management (USM) 4.x-5.x Deploying HIDS Agents to Linux Hosts USM 4.x-5.x Deploying HIDS Agents to Linux Hosts, rev. 2 Copyright 2015 AlienVault, Inc. All rights reserved. AlienVault,
Improved metrics collection and correlation for the CERN cloud storage test framework
Improved metrics collection and correlation for the CERN cloud storage test framework September 2013 Author: Carolina Lindqvist Supervisors: Maitane Zotes Seppo Heikkila CERN openlab Summer Student Report
Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
StruxureWare TM Data Center Expert
StruxureWare TM Data Center Expert Infrastructure management from rack to row to room to building Deploy in minutes, manage from anywhere, analyze instantly, integrate with other management systems. End
Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker
Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker
HP Remote Monitoring. How do I acquire it? What types of remote monitoring tools are in use? What is HP Remote Monitoring?
HP Remote Monitoring HP Remote Monitoring is an efficient, secure means of collecting and reporting usage data from your printing and imaging output environment. What is HP Remote Monitoring? HP Remote
Intrusion Detection Systems (IDS)
Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Open Source Network Security Monitoring With Sguil
Open Source Network Security Monitoring With Sguil David J. Bianco President Vorant Network Security, Inc. [email protected] Table of Contents Intro to Network Security Monitoring (NSM) NSM with Sguil Sguil
Network Security Monitoring
CEENET/GEANT Security Workshop Sofia, 2014 Network Security Monitoring An Introduction to the world of Intrusion Detection Systems Irvin Homem [email protected] Stockholm University Who am I? Of Indian and
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
Smart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Big Brother: Network Monitoring Software. Kevin Orlowski. System Administration
Big Brother 1 Big Brother: Network Monitoring Software Kevin Orlowski System Administration Big Brother 2 Abstract Big Brother is a system and network monitor distributed by Quest Software. It displays
Network Security Platform 7.5
M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
FileNet System Manager Dashboard Help
FileNet System Manager Dashboard Help Release 3.5.0 June 2005 FileNet is a registered trademark of FileNet Corporation. All other products and brand names are trademarks or registered trademarks of their
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
Monitoring Microsoft Exchange to Improve Performance and Availability
Focus on Value Monitoring Microsoft Exchange to Improve Performance and Availability With increasing growth in email traffic, the number and size of attachments, spam, and other factors, organizations
Monitor TemPageR 4E With PageR Enterprise
Monitor TemPageR 4E With PageR Enterprise TemPageR 4E is AVTECH Software s Real-Time Temperature Monitor with Data Logging, SNMP & Unlimited Alerting. It is designed specifically to monitor 1-4 digital
Unified Security Management (USM) 5.2 Vulnerability Assessment Guide
AlienVault Unified Security Management (USM) 5.2 Vulnerability Assessment Guide USM 5.2 Vulnerability Assessment Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool
TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
