Network Trace Analysis



Similar documents
COMP416 Lab (1) Wireshark I. 23 September 2013

Lab VI Capturing and monitoring the network traffic

Introduction to Wireshark Network Analysis

Network Security: Workshop

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Introduction to Analyzer and the ARP protocol

Capture and analysis of the network traffic with Wireshark

Introduction to Passive Network Traffic Monitoring

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Network Connect & Junos Pulse Performance Logs on Windows

How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc

Tcpdump Lab: Wired Network Traffic Sniffing

A Research Study on Packet Sniffing Tool TCPDUMP

EKT 332/4 COMPUTER NETWORK

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Solution of Exercise Sheet 5

Introduction to Network Security Lab 1 - Wireshark

Network Connect Performance Logs on MAC OS

Unix System Administration

VisuSniff: A Tool For The Visualization Of Network Traffic

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

How To Design A Layered Network In A Computer Network

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

TCP/IP Basis. OSI Model

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Module 1: Reviewing the Suite of TCP/IP Protocols

Netflow Collection with AlienVault Alienvault 2013

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

Networks - EtherNet IP Course (Version 5.1)

BASIC ANALYSIS OF TCP/IP NETWORKS

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

TCP Packet Tracing Part 1

Sniffer s Network Packet Analyzer. Basics

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Vertex VoIP Caller ID (Version 1.5)

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

A DIY Hardware Packet Sniffer

Monitor network traffic in the Dashboard tab

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

Network Traffic Analysis

Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A

Lab Conducting a Network Capture with Wireshark

Lab - Using Wireshark to View Network Traffic

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Interconnecting Cisco Network Devices 1 Course, Class Outline

A network monitoring tool for student training

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Question: 3 When using Application Intelligence, Server Time may be defined as.

McAfee Network Security Platform Administration Course

NOS for Network Support (903)

Firewalls. Ahmad Almulhem March 10, 2012

A Protocol Based Packet Sniffer

Monitoring PostgreSQL database with Verax NMS

Introducing FortiDDoS. Mar, 2013

How To Configure Voice Vlan On An Ip Phone

Chapter 8 Monitoring and Logging

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

Application-Centric Analysis Helps Maximize the Value of Wireshark

COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command Document Revision History... 10

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Network Virtualization Based on Flows

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Implementing Network Monitoring Tools

GlobalSCAPE DMZ Gateway, v1. User Guide

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Intrusion Detection, Packet Sniffing

Semester Thesis Traffic Monitoring in Sensor Networks

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Protocols and Architecture. Protocol Architecture.

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Lab 1: Packet Sniffing and Wireshark

Introduction to Endpoint Security

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Pharos Control User Guide

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012

How To Learn Cisco Cisco Ios And Cisco Vlan

Network Agent Quick Start

Network sniffing packet capture and analysis

Network sniffing packet capture and analysis

Application Delivery Networking

Computer Networks/DV2 Lab

Mediatrix 4404 Step by Step Configuration Guide June 22, 2011

Network Management and Monitoring Software

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Network Troubleshooting with the LinkView Classic Network Analyzer

"Charting the Course...

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Transcription:

Network Trace Analysis Version 1.0 Facebook LinkedIn Twitter Dmitry Vostokov Software Diagnostics Services

Wireshark Hark Listen (to) Hark! There s the big bombardment. Speak in one s ear; whisper Shorter Oxford English Dictionary Hark back (idiom) To return to a previous point, as in a narrative http://www.thefreedictionary.com/hark

Prerequisites Interest in software diagnostics, troubleshooting, debugging and network trace analysis Experience in network trace analysis using Wireshark or Network Monitor

Why? A common diagnostics language Network diagnostics as software diagnostics

Software Diagnostics A discipline studying abnormal software structure and behavior in software execution artifacts (such as memory dumps, software and network traces and logs) using pattern-driven, systemic and pattern-based analysis methodologies.

Diagnostics Pattern A common recurrent identifiable problem together with a set of recommendations and possible solutions to apply in a specific context.

Pattern Orientation Pattern-driven Finding patterns in software artefacts Using checklists and pattern catalogs Pattern-based Pattern catalog evolution Catalog packaging and delivery

Catalog Classification By abstraction Meta-patterns By artifact type Software Log* Memory Dump Network Trace* By story type Problem Description Software Disruption UI Problem By intention Malware

Traces and Logs

Trace and Log Patterns

Software Narrative A temporal sequence of events related to software execution.

Software Trace A sequence of formatted messages Arranged by time A narrative story

Network Trace A sequence of formatted packets as trace messages Arranged by time A narrative story

Network Trace Analysis Software Trace Analysis Patterns Network Trace Analysis Patterns

Capture Tool Placing Sniffer placing Process Monitor placing

Trace Maps Network map Deployment architecture map

Name Resolution MAC -> IP and IP -> DNS PID -> process name

Trace Presentation Trace Presentation A (Discourse) Trace Presentation B (Discourse) Trace Presentation C (Discourse) Trace 1 (Plot, Sujet) Trace 2 (Plot, Sujet) Trace 3 (Plot, Sujet) Trace 4 (Plot, Sujet) Trace 5 (Plot, Sujet) Full Trace (Story, Fable, Fabula)

Minimal Trace Graphs Time # Src Dst Time Message

Pattern-Driven Analysis Logs Checklists Patterns Action

Pattern-Based Analysis Usage Software Trace Discovery Pattern Catalog + New Pattern

Pattern Classification Vocabulary Error Trace as a Whole Large Scale Activity Message Block Trace Set

Reference and Course Catalog from Software Diagnostics Library Software Trace Analysis Patterns Free reference graphical slides Accelerated-Windows-Software-Trace-Analysis-Public.pdf Training course* Accelerated Windows Software Trace Analysis * Available as a full color paperback book, PDF book, on SkillsSoft Books 24x7. Recording is available for all book formats

Selected Patterns

Master Trace Pattern Category Trace Set Normal network capture

Message Current Pattern Category Trace as a Whole Time # Src Dst Time Message Time # Src Dst Time Message 10.100 10.100 J 1 > J 2 Packets/s 10.200 12.100

Message Density Pattern Category Trace as a Whole Time # Src Dst Time Message D 1 > D 2

Characteristic Block Pattern Category Large Scale Time # Src Dst Time Message D 1 < D 2 L 1 > L 2

Example

Thread of Activity Time # Src Dst Time Message Pattern Category Activity Time # Src Dst Time Message

Adjoint Thread Time # Src Dst Time Message Pattern Category Activity Filtered by: Time # Src Dst Time Message Source Destination Protocol Message Expression

No Activity Time # Src Dst Time Message Pattern Category Activity We messages from other servers but only see our own traffic

Discontinuity Pattern Category Time # Src Dst Time Message Time # Src Dst Time Message Activity

Dialog Time # Src Dst Time Message Conversation between 2 endpoints

Significant Event Pattern Category Message Time # Src Dst Time Message Time Reference feature in Wireshark

Marked Messages Pattern Category Message Annotated messages: session initialization [+] session tear-off [-] port A activity [+] port B activity [-] protocol C used [-] address D used [-] Marked Packets feature in Wireshark [+] activity is present in a trace [-] activity is undetected or not present

Partition Time # Src Dst Time Message Pattern Category Trace as a Whole Head Prologue Core Connection initiation (Prologue) and termination (Epilogue) Epilogue Tail

Inter-Correlation Pattern Category Trace Set Several packet sniffers at once Internal and external views Process Monitor log + network trace

Circular Trace Pattern Category Trace as a Whole Time # Src Dst Time Message Problem Repro

Split Trace Pattern Category Trace Set Time # Src Dst Time Message # PID TID Time Message # PID TID Time Message

Paratext Info column in Wireshark

Frames Time # Src Dst Time Message Pattern Category Large Scale OSI, TCP/IP Layers

Visibility Limit Pattern Category Trace as a Whole Visibility window for sniffing PC 3 sniffer PC 1 PC 2

Incomplete History Packet loss Missing ACK

Possible New Patterns Full Trace (promiscuous mode) Embedded Message (PDU chain, protocol data unit, packet) Ordered Message (TCP/IP sequence numbers) Illegal Message (sniffed with illegally obtained privileges) Dual Trace (in / out, duplex)

Further Reading Practical Packet Analysis, 2 nd edition, by Chris Sanders Software Diagnostics Institute Memory Dump Analysis Anthology: Volumes 3, 4, 5, 6, Volume 7 is in preparation (July, 2013) Introduction to Software Narratology Malware Narratives

What s Next? Accelerated Network Trace Analysis Generative Software Narratology Pattern-Oriented Hardware Signal Analysis

Q&A Please send your feedback using the contact form on DumpAnalysis.com

Thank you for attendance! Facebook LinkedIn Twitter