Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
|
|
|
- Lilian Garrett
- 10 years ago
- Views:
Transcription
1 Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
2 Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo 2
3 What is Netflow Netflow = Netflow is a traffic monitoring technology developed by Cisco Networks. Flows are unidirectional/bidirectional and contain connection related data such as: Source and destination IP address. Source and destination port. Source and destination AS. Protocol ( TCP, UDP, ICMP etc. ), TCP flags. Logical input and output interfaces. Bytes and packet counters. 3
4 Background - OSI layer model Netflow contains information from layers 3 and 4. [Packets + Segments] 4
5 Pcap vs Netflow TCP/IPv4 Header Netflow TCP/IPv4 Netflow UDP 5
6 Netflow <=> Call logs Netflow it s like detailed phone bill for your network traffic. Contains metadata of network packets without the actual payload. Full pcap 100GB Netflow 375MB 6
7 Netflow versions Netflow versions available 7
8 Netflow example Netflow SYN SYN-ACK ACK GET /index.html ACK (Content) Date flow start Duration Proto Src Ip addr:port Dst IP addr:port Flags Packets Bytes :00: TCP : > :80..S :00: TCP :80 -> :5431 A.S
9 Uni-directional vs Bi-directional Uni-directional netflow Host A -> Host B Host B -> Host A Src Dst Dst Src Bi-directional netflow Host A <-> Host B Src Dst 9
10 Flow sampling Flow sampling is used to reduce load on routers by limiting the number of packets selected for analysis Not all the traffic might be relevant for our purpose. - Samples can be taken every n packets - Sample particular time intervals - Discard not relevant ports & interfaces - Collect only for particular subnets - Random sampling & deterministic sampling 10
11 Architecture considerations 11
12 Adversaries 12
13 Security metrics & Security goals Security metrics Peak on particular ports (139, 445 etc ) Top talkers / Top bandwidth consumers Increased numbers of concurrent connections to the web server Large number of SYN packets Connections to suspicious IPs Connections to a-typical ports Security goals Investigate past attacks (forensics) Detect on-going attacks Prevent against future attacks 13
14 Netflow analysis and visualization Overview Details Flows on demand 14
15 Go with the flow Example of how to activate netflow export. Cisco IOS netflow export example: Router(config)#ip flow-export version 5 Router(config)#ip flow-export source FastEthernet 2/48 Router(config)#ip flow-export destination Router(config)#interface FastEthernet2/48 Router(config-if)#ip route-cache flow 15
16 Toolbox nfsen + nfdump Nfsen Web based frontend Display flows Framework to automate tasks NfDump Collect and store flows Process flows on cmd-line 16
17 nfdump ( v1.5.7 ) features: Nfdump CMD line based tool comparable to tcpdump. Written in C, designed to be fast. Stores netflow data in time sliced files. Supports sflow, netflow format v5,v7 and v9. All processing options support IPv4 and IPv6. Powerful pcap like filter syntax: ( proto tcp and dst net /16 and src port > 1024 and bytes < 600 ) or ( bps > 1k and ip in [ /24 ].. Flexible flow aggregation: srcip,dstip,srcport,dstport,srcas,dstas,proto Efficient filter engine: > 6 Mio flows/s on 3GHz Intel. Lots of fast Top N statistics. User defined output formats. 17
18 Nfdump Nfdump architecture 18
19 Nfdump syntax Protocol version: inet or ipv4 inet6 or ipv6 Protocol: TCP, UDP, ICMP or Proto <num> Ip address: IP a.b.c.d or HOST a.b.c.d SourceDestination: SRC or DST Network: NET a.b.c.d / num Port: <SourceDestination> PORT [comp]<num> TCP Flags: flags <tcpflags> A. ACK S. SYN F. FIN R. Reset P. Push U. Urgent X all flags Packets, Pkt/s Bytes: packets [comp] num [scale] bytes [comp] num [scale] pps [comp] num [scale] Examples: host host and port 123 net /24 and not host tcp and (src ip or dst ip ) and flags S and bytes >
20 Nfsen general overview page Nfsen - home 20
21 Nfsen - nav Nfsen navigation page 21
22 Netflow processing output Nfsen - out 22
23 Netflow profile & alert tab Nfsen - profile 23
24 Profile: Nfsen more about profiles Custom view of netflow data with filters applied Can be created on historical netflow data as well as live data (static, continuous) Can contain one or more channels Channel are incoming sources of netflow, for ex: firewall, border router, webserver, dmz etc 24
25 Intro to the scenarios 1. Boot the imported VM image ENISA_CERT_Exercises.ova 2. Log into `Trainee` account (user:trainee, pass:exercises) 3. `cd /home/trainee/desktop` On the desktop there are two scripts: `nfsen_start.sh`, `nfsen_stop.sh` First run the `./nfsen_stop.sh` afterwards run the `./nfsen_starts.sh` 4. The netflow data is available in the folder `/data/nfsen/profiles-data/live/upstream1` 25
26 The story We are working in ITSec dep. for a big ISP. There is a netflow collector for monitoring the ISP address space. The ISP has received a report about a Ddos attack being carried by a customer 1 Identify when the attack was carried 2 Identify the target of the attack Identify what IPs are involved in the attack 3 Identify modus operandi Mitigation measures 26
27 Step.1 Lets check the overview panel `cd /data/nfsen/profiles-data/live/upstream1` `ls lhs` (long-listing format + human readable + sorted) What do we notice? 27
28 Step
29 Step.2 Top 10 statistics for DST IP ordered by flows/packets/bytes 29
30 Step.2+ Top 10 flow records aggregated by dstip 30
31 Step.2+ continued We have our victim 31
32 Step.3 Role of the attacked server? 32
33 Step.4 Attackers Who are the badboys? 33
34 How the attack was carried out? Step.5 How? 34
35 Online demo At the following link there is production nfsen:
36 Wireshark & pcap intro Wireshark capture & display filters A capture filter is used to select which packets should be saved to disk while capturing. For capture filters Wireshark uses the BPF syntax. (BPF is module that runs in the kernel) like tcpdump Display filters are used to change the view of a capture file. They take advantage of the full dissection of all packets. This makes it possible to do very complex and advanced filtering when analyzing a network tracefile. ers.pdf 36
37 Wireshark & pcap intro Capture filter Display filter 37
38 Example capture/display filters Example capture filters: host net /24 host and not (port 80 or port 25) dst port 135 and tcp port 135 and ip[2:2]==48 Example display filters: 38
39 Pcap = packet capture Pcap analysis part 1 Step 1. Go to: cd /home/trainer/documents/exercises/07_nf/adds We will investigate the following pcap: drive-by-download_fast-flux.pcap Open it with wireshark One of the customer IPs got infected. Let s try to figure out how. See `dns` & `http` requests 39
40 Pcap part 2 First let s play with display filters, filtering different protocols Filter: dns Who is our client? Which is the dns server? What kind of interesting requests/answers we spot? Now lets try to exclude legitimate IPs and see http requests Filter:!(ip.addr == ip.addr == ip.addr == ) && http Can we spot anything in particular? 40
41 tshark tcpdump Tshark [ -2 ] [ -a <capture autostop condition> ]... [ -b <capture ring buffer option>]... [ - B <capture buffer size> ] [ -c <capture packet count> ] [ -C <configuration profile> ] [ - d <layer type>==<selector>,<decode-as protocol> ] [ -D ] [ -e <field> ] [ - E <field print option> ] [ -f <capture filter> ] [ -F <file format> ] [ -g ] [ -h ] [ - H <input hosts file> ] [ -i <capture interface> - ] [ -I ] [ -K <keytab> ] [ -l ] [ -L ] [ -n ] [ -N <name resolving flags> ] [ -o <preference setting> ]... [ -O <protocols> ] [ -p ] [ - P ] [ -q ] [ -Q ] [ -r <infile> ] [ -R <Read filter> ] [ -Y <display filter> ] [ - s <capture snaplen> ] [ -S <separator> ] [ -t ad a r d dd e ] [ - T pdml psml ps text fields ] [ -v ] [ -V ] [ -w <outfile> - ] [ -W <file format option>] [ -x ] [ -X <extension option>] [ -y <capture link type> ] [ -z <statistics> ] [ <capture filter> ] tshark R http.request T fields e http.host -r drive-by-download_fast-flux.pcap tshark R http.request T fields e http.request.uri r drive-by-download_fastflux.pcap tshark R http.request T fields e http.request.full_uri r drive-by-download_fastflux.pcap Can you see any malicious requests? tshark r drive-by-download_fast-flux.pcap R dns T fields e dns.qry.name e dns.resp.addr e dns.resp.ttl 41
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Netflow For Incident Detection 1
Netflow For Incident Detection 1 Michael Scheck / Cisco CSIRT [email protected] Introduction Netflow is often deployed for network billing, auditing, and accounting. However, Netflow can also be for incident
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
[Optional] Network Visibility with NetFlow
[Optional] Network Visibility with NetFlow TELE301 Laboratory Manual Contents 1 NetFlow Architecture........................... 1 2 NetFlow Versions.............................. 2 3 Requirements Analysis...........................
7. Exercise: Network Forensic
60 CERT Exercises Handbook 7. Exercise: Network Forensic Main Objective Targeted Audience Total Duration The objective of the exercise is to familiarize students with standard network monitoring tools,
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
User Documentation nfdump & NfSen
User Documentation nfdump & NfSen 1 NFDUMP This is the combined documentation of nfdump & NfSen. Both tools are distributed under the BSD license and can be downloaded at nfdump http://sourceforge.net/projects/nfdump/
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
19. Exercise: CERT participation in incident handling related to the Article 13a obligations
CERT Exercises Handbook 223 223 19. Exercise: CERT participation in incident handling related to the Article 13a obligations Main Objective Targeted Audience Total Duration This exercise provides students
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
7. Exercise: Network Forensic
CERT Exercises Toolset 59 7. Exercise: Network Forensic Main Objective Targeted Audience Total Duration The objective of the exercise is to familiarize students with standard network monitoring tools,
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Using Argus to analyse network flows. David Ford OxCERT Oxford University Computer Services
Using Argus to analyse network flows David Ford OxCERT Oxford University Computer Services What are network flows? A convenient way of representing traffic on your network Contain a timestamp, the source/
Network Traffic Analyzer
Network Traffic Analyzer Configuring NetFlow or sflow on Network Devices Revision 1.2.9 - (11-03-2015)!1 Introduction This document explains how to configure network devices such as Switches to send NetFlow
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Analysis of a DDoS Attack
Analysis of a DDoS Attack December 2014 CONFIDENTIAL CORERO INTERNAL USE ONLY Methodology around DDoS Detection & Mitigation Corero methodology for DDoS protection Initial Configuration Monitoring and
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
An overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT [email protected] 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Analysis of Network Beaconing Activity for Incident Response
Analysis of Network Beaconing Activity for Incident Response FloCon2008 Peter Balland, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Fluke Networks NetFlow Tracker
Fluke Networks NetFlow Tracker Quick Install Guide for Product Evaluations Pre-installation and Installation Tasks Minimum System Requirements The type of system required to run NetFlow Tracker depends
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Revealing Botnets Using Network Traffic Statistics
Revealing Botnets Using Network Traffic Statistics P. Čeleda, R. Krejčí, V. Krmíček {celeda vojtec}@ics.muni.cz, [email protected] Security and Protection of Information 2011, 10-12 May 2011, Brno,
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Network Traffic Analysis using HADOOP Architecture. Zeng Shan ISGC2013, Taibei [email protected]
Network Traffic Analysis using HADOOP Architecture Zeng Shan ISGC2013, Taibei [email protected] Flow VS Packet what are netflows? Outlines Flow tools used in the system nprobe nfdump Introduction to
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
TELCO challenge: Learning and managing the network behavior
TELCO challenge: Learning and managing the network behavior M.Sc. Ljupco Vangelski CEO, Scope Innovations Kiril Oncevski NOC, ISP Neotel Skopje Presentation overview Challenges for the modern network monitoring
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross [email protected] Charles Herring [email protected] 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details
Challenges in NetFlow based Event Logging
Challenges in NetFlow based Event Logging Stefan Künkel IsarNet [email protected] 31.03.2012 Agenda Introduction Getting Events Example NSEL What is it? Analysis Example CGN Motivation NAT overview NAT Logging
Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN
Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Packet Capture, Filtering and Analysis
Today s Challenges with 20 Years Old Issues [email protected] January 20, 2012 Promiscuous mode Introduction Promiscuous mode BPF BPF - Filter Syntax BPF - Filter Syntax 2 BPF - Filter Syntax
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA
USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA CPSC 441 TUTORIAL JANUARY 30, 2012 TA: RUITING ZHOU The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Traffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
GregSowell.com. Mikrotik Security
Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview
Internetwork Expert s CCNA Security Bootcamp IOS Firewall Feature Set http:// Firewall Design Overview Firewall defines traffic interaction between zones or trust levels e.g. ASA security-level Common
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Network Forensics. Toolset, Document for students. February 2015. www.enisa.europa.eu
www.enisa.europa.eu About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private
