Flow Monitoring Tools, What do we have, What do we need?

CSUC - Consorci de Serveis Universitaris de Catalunya
Maria Isabel Gandía Carriedo
9th SIG-NOC Meeting
ARNES, Ljubljana, 08-04-2019
Flow Monitoring Tools:
What do We Have? What do we need?
Disclaimer
ü I’m neither a developer nor an expert on Network Flow Monitoring
Tools. I’m a user of some of the following tools and I have put together
the information I got as a user with what I have searched about some
other popular tools and the input from Jisc, NORDUnet and AMRES.
ü The idea is to offer SIG-NOC an abstract with useful information about
currently used flow monitoring tools.
Nework Flow Monitoring Tools… Just Monitoring?
üSome functionalities go far beyond pure flow monitoring:
• DDoS mitigation (blackholing, scrubbing centre, Flowspec…).
• SNMP support to sync flows with actual traffic volumes.
• BGP-peering with the core to do forward-path analysis.
• Open APIs to integrate towards other tools (NSO, Nagios, Stats)
• Trend reports to do Capacity Planning
• Segregated logins to give filtered views to different users.
• Report generation.
• …
A Common Path for Many Network Flow Monitoring Tools
ü There are good Network Flow monitoring Open Source tools, but they
are hard to manage (no GUI, different programs for different actions…).
ü A Research Group works on a great monitoring user-friendly Open
source or not very expensive tool.
ü They create a Company / They develop a different flavour for commercial
use / They are bought by another company.
Some Network Flow Monitoring Tools
ü Argus
ü NFSEN / NFDUMP
ü Nimbus (formerly FlowSonar (Team Cymru))
ü SILK / FlowBAT
ü PMACCT
ü NetVizura - NetFlow Analyzer (formerly ICmynet
ü Talaia (Formerly SMARTxAC, now Auvik)
ü NTOP/NTOPNG
ü Fastnetmon Community / Advanced
ü DDPS
ü Arbor Networks SP (formerly Peakflow) (+TMS?) (from Netscout)
Argus (Audit Record Generation and Usage System)
ü https://qosient.com/argus/
ü GPLv3, with other licensing agreements available for commercial,
governmental and educational users. No public Git-like repository.
ü Status: Last versions argus-3.0.8.2 and argus-clients-3.0.8.2 (from
2016), Mailing list is active, ArgusPro (with commercial hardware and
software versions of argus) is under development
ü Threat intelligence: No
ü Machine learning: No
ü Supported protocols/inputs: Netflow (1-8, support for v9 is not clear),
Flow-Tools, (Sflow and Jflow, maybe on demand), Port mirroring
ü Users: Gloriad
Argus (Audit Record Generation and Usage System)
ü Argus is a bidirectional network flow generator and aggregator It’s
structured as a server and a suite of supporting clients.
ü The server (Argus) retrieves packets, it assembles them into binary
data (representing flows) and writes this binary data to disk and/or a
network socket (argus data stream).
ü The argus-clients package provides a set of more than 30 binaries and
scripts that read flow data from files of binary flow data and do actions
like printing, processing, sorting, aggregating, tallying, collecting,
distributing, archiving, and anonymizing data.
ü Argus provides reachability, availability, connectivity, duration, rate,
load, good-put, loss, jitter, retransmission and delay metrics for all
network flows, and captures most attributes that are available from the
packet contents, such as L2 addresses, tunnel identifiers (MPLS,
GRE, IPsec, etc...), protocol ids, SAP's, hop-count, options, L4
transport identification (RTP detection), host flow control indications,
etc...
NFDUMP/NFSEN
ü https://github.com/phaag/nfdump, http://nfsen.sourceforge.net/
ü BSD
ü Status: updated
ü Threat intelligence: No
ü Machine-learning: No
ü Supported protocols/inputs: netflow v1, v5/v7,v9,IPFIX and SFLOW
ü Users: Uninett, SURFsara, GARR, SWITCH, BelWü, PIONIER, DeIC
NFDUMP/NFSEN
ü nfdump is a toolset:
• nfcapd collects the data, sent from exporters and stores the flow records into
files. Multiple netflow streams can be collected by a single collector.
• nfdump reads the netflow data from one or many files stored by nfcapd and
displays it and/or creates top N statistics of flows, bytes, packets. All data is
stored to disk, before it gets analyzed.
• nfanon (for anonymization),
• nfexpire (for data expiration),
• nfreply (to export the files stores by nfcapd),
• sfcapd (for sflow collection),
• etc.
ü NfSen (NetFlow Sensor) is a graphical web based front end for the nfdump
netflow tools. It allows users to display flows, packets and bytes using RRD
(Round Robin Database).
Nimbus (formerly FlowSonar, (Team Cymru))
ü http://www.team-cymru.com/nimbus.html
ü Type: commercial, cloud-based
ü Threat intelligence feeds: yes (IP reputation and Botnet controllers)
ü “Price”: access to participant's information (NDA required)
ü Users: CSUC (FlowSonar)
Nimbus (formerly FlowSonar, (Team Cymru))
ü Flowsonar is based on nfdump/NfSen and it works on-premises.
ü Flowsonar offers graphs for flows, packets and bits/s, per-protocol
graphs, alerts and customized filters.
ü Nimbus is a cloud-based netflow collection, analysis, and reporting
platform. The partner exports their flows to a private IP and port over
an encrypted tunnel.
ü Nimbus uses a Kibana-based portal and provides with XML versions
of the threat intelligence feeds. It is focused on real-time threat
monitoring.
SiLK (System for Internet-Level Knowledge) / FlowBAT
ü https://tools.netsa.cert.org/silk/, http://www.flowbat.com/
ü Type: GPLv2 & Government Purpose License Rights (GPLR).
However, there is no public Git-like repository for the project, all
patches should be sent to the CMU team.
ü Status: updated. Last version, silk-3.18.1 (March 2019)
ü Threat intelligence feeds: No
ü Machine learning: No
ü Supported protocols/inputs: IPFIX (from yaf software, not from
routers), NetFlow (v5, v9) and sFlow v5, or PDUs from a router
ü Users: JISC
SiLK (System for Internet-Level Knowledge)
ü SiLK is a tool suite with two categories of applications:
• The SiLK Packing System: daemon applications that collect flow data and
convert them into a more space efficient format, storing the packed records
into service-specific hourly binary flat files.
• The SiLK Analysis Suite is a collection of command-line tools that read
binary files containing SiLK Flow records and partition, sort, and count
these records. The analysis tools interoperate using pipes, allowing a user
to develop relatively sophisticated queries.
ü It is suited for analyzing traffic on the backbone or border of a large,
distributed enterprise or mid-sized ISP. However, it has not been
designed for real-time flow analysis.
ü Analysis Pipeline is a separate suite which works along with real-time
analysing of flow data records. It can take flow records from SiLK files
as they are created or IPFIX data from any application.
ü FlowBAT is a graphical flow-based analysis tool designed to work with
a SiLK-based NetFlow system as a back-end. Other third-party GUI
are SiLKWeb and iSiLK.
pmacct
ü http://www.pmacct.net/
ü Type: GPLv2
ü Status: Updated,
ü Threat intelligence: No
ü Machine learning: No
ü Supported protocols/inputs: libpcap, Netlink/NFLOG, NetFlow
v1/v5/v7/v8/v9, sFlow v2/v4/v5 and IPFIX. -It also Collects Streaming
Telemetry data
ü Users: PSNC
http://uowits.github.io/herbert-gui/index.html
pmacct
ü pmacct is a set of multi-purpose passive network monitoring tools. It
can account, classify, aggregate, replicate and export forwarding-plane
data, collect and correlate control-plane data via BGP and BMP;
collect infrastructure data via Streaming Telemetry.
ü Each component works both as a standalone daemon and as a thread
of execution for correlation purposes (ie. enrich NetFlow with BGP
data).
ü pmacct can save data to many types of backends (relational DB, non-
SQL DB, flat files, etc).
ü It’s able to tag, filter, redirect, aggregate and split captured data.
ü It has a BGP daemon for visibility of BGP multi-path routes.
ü It does Packet classification via nDPI .
ü You can use tools like Project Herber (http://uowits.github.io/herbert-
gui/index.html) to print graphs with the data.
NetVizura - NetFlow Analyzer (formerly ICmynet)
ü References: https://www.netvizura.com/netflow-analyzer
ü Type: Research/commercial, on-premises
ü Status: updated
ü Threat inteligence feeds: Yes, through in-depth forensics
ü Machine learning: No
ü Supported protocols/inputs: NetFlow, IPFIX, NSEL, sFlow and
compatible netflow-like protocols.
ü Users: AMRES
NetVizura - NetFlow Analyzer (formerly ICmynet)
ü Netvizura NetFlow Analyzer helps net admins with bandwidth
monitoring, network traffic investigation, analyses and reporting. It
supports the following features:
• Device Traffic Analysis - traffic distribution analysis per interface, device or
subnet, used network planning
• Custom Traffic Analysis - analysis per flow type, subnet, organization unit,
etc.
• End User Traffic Analysis - analysis per end user, apps and protocols used,
throughput, etc.
• In-Depth Forensics - through raw data analysis and queries
• Traffic Reports - PDF traffic report
• Threshold Alarms - throughput and volume threshold and alarms,
notifications via email
• Dashboard Overview - realtime alarm prioritization and presentation
• Powerful Settings - Flow sampling and filtering, Top N analysis, managing
data and archives
• Flexible Data Collection - multi-vendor support
TALAIA (evolution of SMARTxAC, now Auvik)
ü https://www.talaia.io/, https://es.slideshare.net/CSUC_info/1127-smar-
tx-ac-network-polygraph-catnix-publicable, https://www.auvik.com/
ü Type: commercial, on-premises and Cloud-based
ü Status: deprecated as it was (bought by Auvik)
ü Threat intelligence feeds: No
ü Machine learning: yes
ü Supported protocols: Netflow, IPFIX
ü Users: CSUC, RedIRIS
TALAIA (evolution of SMARTxAC, now Auvik)
ü Talaia was a spin-off of Universitat Politècnica de Catalunya (UPC /
BarcelonaTech) for their former project SMARTxAC (Traffic Monitoring
System for Anella Científica) and it was bought by Auvik.
ü Talaia gets Netflow information, it analyzes it using Deep Packet
Inspection information taken from capture linecards in the main
connection lines and shows this information in a graphical interface.
ü It is a multi-tenant solution (each institution only sees the information
associated with its IP addresses).
ü It has views for applications, protocols, top N, autozoom, geolocation,
anomalies, flows and reports.
ü The platform is able to authenticate federated users.
ü Auvik offers an integrated solution for Managed Service Providers
(MSP), offering several tools in a single platform (Configuration
Management, Service Monitoring, IPAM, Inventory Management,
Password Management...). Flow monitoring is one of the functionalities,
although they don't offer the on-premises solution nor the federated
access and it's still work-in-progress to integrate Talia with their platform.
NTOP/NTOPNG
ü https://www.ntop.org/
ü Type: GPLv3 & commercial (but free for Education)
ü Status: Updated
ü Threat intelligence feeds: No
ü Machine learning: No
ü Users: TSSG/WIT
ü Supported protocols/inputs: sFlow, NetFlow (v5 & v9) and IPFIX
support through nProbe
NTOP/NTOPNG
ü NTOP-NG is a web-based traffic analysis and flow collection software
that provides a web GUI to access monitoring data. It provides detailed
views on active hosts, flows, IP addresses, Mac addresses,
Autonomous systems.
ü It can be used to monitor and report live throughput, network and
application latencies, Round Trip Time (RTT), TCP statistics
(retransmissions, out of order packets, packet lost), and bytes and
packets transmitted.
ü It requires to install nProbe as an intermediate flow collector, a probe
to install in the middle for detailed L7 application dissection or per-
packet realtime analysis. This intermediate step is needed as ntopng
does not understand Netflow, so nProbe acts like a translator.
ü NTOPNG can listen to a SPAN port directly.
Fastnetmon Community / Advanced
ü https://github.com/pavel-odintsov/fastnetmon, https://fastnetmon.com/
ü Type: Community edition Open source (GPLv2), Advanced edition
commercial (free one-month trial license available)
ü Status: Both editions updated, more development on Advanced edition.
ü Threat intelligence: No
ü Machine-learning: No
ü Supported protocols/inputs: NetFlow (v5, v9), IPFIX, sFlow (v4, v5), Port
mirror/SPAN capture with PF_RING, SnabbSwitch, NETMAP and
PCAP. Commercial version offers support for more protocols
ü Users: DeiC (for DDPS)
https://fastnetmon.com/screenshoots-fastnetmon-advanced/
Fastnetmon Community / Advanced
ü FastNetMon is a volumetric DDoS detector able to perform a
configurable action when defined thresholds are exceeded (notifying,
blackholing, sending BGP Flowspec rules, switching off a server…) .
ü The blocked IPs are announced via BGP with ExaBGP.
ü It has support for the most popular attack types (syn_flood, udp_flood,
icmp flood, ip_fragmentation_flood, DNS amplification, NTP
amplification, SSDP amplification, SNMP amplification).
ü It includes an API and a JSON based database for
configuration/attacks. It can be integrated with Graphite and InfluxDB.
ü The advanced FastNetMon includes bundled support for Grafana,
using InfluxDB or ClickHouse. It can expose total bandwidth, per host
bandwidth, per network bandwidth and arbitrary traffic reports from
traffic persistency database (peering reports, per prefix reports). Some
pre-created dashboards are available.
ü More differences at https://fastnetmon.com/compare-community-and-
advanced/
DDPS (DeiC DDoS Protection Service)
ü https://github.com/deic-dk/DDPS-documentation
ü Type: DDPS is copyright 2015-2017 DeiC, Denmark. Licensed under
the Apache License, Version 2.0
ü Status: Updated
ü Threat intelligence: No
ü Machine learning: No
ü Users: DeIC
https://github.com/deic-dk/DDPS-documentation
DDPS (DeiC DDoS Protection Service)
ü DDPS relies on FastNetMon Community and it is conceived as an
automated system for DDoS mitigation: it detects attacks and
automatically triggers mitigation.
ü Based on BGP Flowspec, it is intended to be used in a system where
detection is placed as close as possible to the target (FastNetMon in
the customer’s network) and mitigation is placed as close as possible
to the source(s) of the attack (DeiC).
ü End-users may add, edit, or cancel mitigation rules as well as view
archived rules and statistical information.
ü The project is split in sub-projects:
• DDPS fastnetmon
• DDPS database daemon
• DDPS NODE
• DDPS web-user interface
• DDPS Customer Site Simulation
• DDPS DDoS simulator
Arbor Networks SP (formerly Peakflow) (+TMS) (Netscout, formerly Arbor)
ü https://www.netscout.com/arbor-ddos
ü Type: commercial
ü Status: on-premises, evolving to a cloud-based mitigation solution
ü Threat intelligence feeds: yes
ü Supported protocols/inputs: NetFlow, sFlow, J-Flow, IP FIX,
ü Users: BelNET, CSUC, JISC
ü Arbor offers a solution for monitoring (Peakflow/SP) and a different
product for DDoS mitigation (TMS), although the front-end is in the SP.
It is based on Netflow, SNMP and BGP information. It compares
Netflow data to SNMP data to set the thresholds. It works with pre-
defined managed objects and it has four main functions:
• Monitoring (SP)
• DDoS detection (SP)
• DDoS mitigation (TMS)
• Reports (SP)
Arbor Networks SP (formerly Peakflow) (+TMS) (Netscout, formerly Arbor)
ü It offers different views, like:
• Traffic (per application, AS, customer, protocol, etc)
• Alerts (including Summary, Activity reports, etc)
• Mitigations
• Reports
ü The alerts thresholds are defined by the administrators of the platform.
ü There are three different types of detection:
• Threshold (fixed), in bps and pps. It applies to the whole object
• Profile (with different configurable multiplying factors) in bps and pps. It
applies to the whole object.
• Host, in bps and pps. It applies to each host inside the object. There are
many types of protocols and the administrators must define a threshold for
each one of them (NTP, ICMP, etc).
ü There are different types of users with different permissions, although
it is not exactly a multi-tenant platform.
ü It has SOAP and REST APIs.
More Network Monitoring Tools
ü AlienVault (AT&T Cybersecurity since February 2019)
ü Insight2 (based on Argus)
ü OSSIM (Open Source Security Information Management)
ü Deepfield
ü Kentik
ü Flowmo
ü Scrutinizer (plixer)
ü ManageEngine
ü SolarWinds NetFlow Traffic Analyzer
ü ..
What do we have? What do we need?
ü Does your current tool cover your needs? The Incubator subtask under
the Network Technologies and Services Development in the Géant
Project may propose to contribute to the development of an open
source alternative to the commercial tools, from scratch or though
contributions to existing open source tools.
ü Let’s play with Mentimeter.
Thanks for your attention!
Questions?
mariaisabel.gandia@csuc.cat
1 of 30

Recommended

Network Penetration Testing by
Network Penetration TestingNetwork Penetration Testing
Network Penetration TestingMohammed Adam
99 views51 slides
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout by
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron SchildkroutKafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkroutconfluent
11.9K views27 slides
dlux - Splunk Technical Overview by
dlux - Splunk Technical Overviewdlux - Splunk Technical Overview
dlux - Splunk Technical OverviewDavid Lutz
7.4K views41 slides
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin... by
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...
Room 2 - 3 - Nguyễn Hoài Nam & Nguyễn Việt Hùng - Terraform & Pulumi Comparin...Vietnam Open Infrastructure User Group
357 views32 slides
Nmap by
NmapNmap
NmapMegha Sahu
323 views15 slides
Splunk Architecture by
Splunk ArchitectureSplunk Architecture
Splunk ArchitectureKishore Chaganti
7.3K views19 slides

More Related Content

What's hot

Routed networks sydney by
Routed networks sydneyRouted networks sydney
Routed networks sydneyMiguel Lavalle
473 views35 slides
Security Monitoring with eBPF by
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPFAlex Maestretti
7K views27 slides
Stephan Ewen - Scaling to large State by
Stephan Ewen - Scaling to large StateStephan Ewen - Scaling to large State
Stephan Ewen - Scaling to large StateFlink Forward
2.6K views27 slides
CGNAT Wide Screen by
CGNAT Wide ScreenCGNAT Wide Screen
CGNAT Wide ScreenZCorum
521 views19 slides
Opentelemetry - From frontend to backend by
Opentelemetry - From frontend to backendOpentelemetry - From frontend to backend
Opentelemetry - From frontend to backendSebastian Poxhofer
383 views29 slides
Network Access Control (NAC) by
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)Forescout Technologies Inc
5.1K views13 slides

What's hot(20)

Stephan Ewen - Scaling to large State by Flink Forward
Stephan Ewen - Scaling to large StateStephan Ewen - Scaling to large State
Stephan Ewen - Scaling to large State
Flink Forward2.6K views
CGNAT Wide Screen by ZCorum
CGNAT Wide ScreenCGNAT Wide Screen
CGNAT Wide Screen
ZCorum521 views
ksqlDB: A Stream-Relational Database System by confluent
ksqlDB: A Stream-Relational Database SystemksqlDB: A Stream-Relational Database System
ksqlDB: A Stream-Relational Database System
confluent1.4K views
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl... by Hidetsugu Sugiyama
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...
Hidetsugu Sugiyama908 views
Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features) by Kai Wähner
Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features)Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features)
Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features)
Kai Wähner6.3K views
Zabbix by pundir5
ZabbixZabbix
Zabbix
pundir58.1K views
OpenvSwitch Deep Dive by rajdeep
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
rajdeep63.9K views
More Than Monitoring: How Observability Takes You From Firefighting to Fire P... by DevOps.com
More Than Monitoring: How Observability Takes You From Firefighting to Fire P...More Than Monitoring: How Observability Takes You From Firefighting to Fire P...
More Than Monitoring: How Observability Takes You From Firefighting to Fire P...
DevOps.com383 views
Squirreling Away $640 Billion: How Stripe Leverages Flink for Change Data Cap... by Flink Forward
Squirreling Away $640 Billion: How Stripe Leverages Flink for Change Data Cap...Squirreling Away $640 Billion: How Stripe Leverages Flink for Change Data Cap...
Squirreling Away $640 Billion: How Stripe Leverages Flink for Change Data Cap...
Flink Forward3.2K views
KSQL: Streaming SQL for Kafka by confluent
KSQL: Streaming SQL for KafkaKSQL: Streaming SQL for Kafka
KSQL: Streaming SQL for Kafka
confluent6.7K views
Stream processing using Kafka by Knoldus Inc.
Stream processing using KafkaStream processing using Kafka
Stream processing using Kafka
Knoldus Inc.1.6K views
DevConf 2014 Kernel Networking Walkthrough by Thomas Graf
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking Walkthrough
Thomas Graf8.3K views
Storage Capacity Management on Multi-tenant Kafka Cluster with Nurettin Omeroglu by HostedbyConfluent
Storage Capacity Management on Multi-tenant Kafka Cluster with Nurettin OmerogluStorage Capacity Management on Multi-tenant Kafka Cluster with Nurettin Omeroglu
Storage Capacity Management on Multi-tenant Kafka Cluster with Nurettin Omeroglu
HostedbyConfluent319 views
Apache Flink and what it is used for by Aljoscha Krettek
Apache Flink and what it is used forApache Flink and what it is used for
Apache Flink and what it is used for
Aljoscha Krettek1.4K views
Introducing the Apache Flink Kubernetes Operator by Flink Forward
Introducing the Apache Flink Kubernetes OperatorIntroducing the Apache Flink Kubernetes Operator
Introducing the Apache Flink Kubernetes Operator
Flink Forward778 views

Similar to Flow Monitoring Tools, What do we have, What do we need?

OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri by
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriOSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriNETWAYS
66 views58 slides
Network Protocol Analyzer by
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
6.7K views11 slides
Handout: 'Open Source Tools & Resources' by
Handout: 'Open Source Tools & Resources'Handout: 'Open Source Tools & Resources'
Handout: 'Open Source Tools & Resources'BDPA Education and Technology Foundation
3.7K views42 slides
Current and Future of Apache Kafka by
Current and Future of Apache KafkaCurrent and Future of Apache Kafka
Current and Future of Apache KafkaJoe Stein
9K views33 slides
network-management Web base.ppt by
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
19 views45 slides
Cytoscape and External Data Analysis Tools by
Cytoscape and External Data Analysis ToolsCytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis ToolsKeiichiro Ono
1.3K views24 slides

Similar to Flow Monitoring Tools, What do we have, What do we need?(20)

OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri by NETWAYS
OSMC 2013 | Monitoring network traffic using ntopng by Luca DeriOSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
OSMC 2013 | Monitoring network traffic using ntopng by Luca Deri
NETWAYS66 views
Network Protocol Analyzer by Sourav Roy
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
Sourav Roy6.7K views
Current and Future of Apache Kafka by Joe Stein
Current and Future of Apache KafkaCurrent and Future of Apache Kafka
Current and Future of Apache Kafka
Joe Stein9K views
network-management Web base.ppt by AssadLeo1
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo119 views
Cytoscape and External Data Analysis Tools by Keiichiro Ono
Cytoscape and External Data Analysis ToolsCytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis Tools
Keiichiro Ono1.3K views
Tim eberhard bajug3_talk by Tim Eberhard
Tim eberhard bajug3_talkTim eberhard bajug3_talk
Tim eberhard bajug3_talk
Tim Eberhard1.5K views
Tools.pptx by ImXaib
Tools.pptxTools.pptx
Tools.pptx
ImXaib6 views
CS8091_BDA_Unit_IV_Stream_Computing by Palani Kumar
CS8091_BDA_Unit_IV_Stream_ComputingCS8091_BDA_Unit_IV_Stream_Computing
CS8091_BDA_Unit_IV_Stream_Computing
Palani Kumar57 views
Best practices and lessons learnt from Running Apache NiFi at Renault by DataWorks Summit
Best practices and lessons learnt from Running Apache NiFi at RenaultBest practices and lessons learnt from Running Apache NiFi at Renault
Best practices and lessons learnt from Running Apache NiFi at Renault
DataWorks Summit31.9K views
Linux IT Monitoring tools - An Overview by viswesvaran d
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview
viswesvaran d26 views
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek by vivekrajan
Logging : How much is too much? Network Security Monitoring Talk @ hasgeekLogging : How much is too much? Network Security Monitoring Talk @ hasgeek
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
vivekrajan1.1K views
Cisco Stealtwatch by Rayudu Babu
Cisco StealtwatchCisco Stealtwatch
Cisco Stealtwatch
Rayudu Babu178 views
RedSplice_Network_Traffic_Examiner_Datasheet by Laurentiu Nicula
RedSplice_Network_Traffic_Examiner_DatasheetRedSplice_Network_Traffic_Examiner_Datasheet
RedSplice_Network_Traffic_Examiner_Datasheet
Laurentiu Nicula68 views
Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ... by Nagios
Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ...Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ...
Nagios Conference 2013 - Sam Lansing - Getting Started With Incident Manager ...
Nagios1.3K views

More from CSUC - Consorci de Serveis Universitaris de Catalunya

The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
140 views25 slides
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci... by
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...
Facilitar la gestión, visibilidad y reutilización de los datos de investigaci...CSUC - Consorci de Serveis Universitaris de Catalunya
72 views26 slides
La gestión de datos de investigación en las bibliotecas universitarias españolas by
La gestión de datos de investigación en las bibliotecas universitarias españolasLa gestión de datos de investigación en las bibliotecas universitarias españolas
La gestión de datos de investigación en las bibliotecas universitarias españolasCSUC - Consorci de Serveis Universitaris de Catalunya
107 views13 slides
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte... by
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...
Disposes de recursos il·limitats? Prioritza estratègicament els teus projecte...CSUC - Consorci de Serveis Universitaris de Catalunya
19 views40 slides
Les persones i les seves capacitats en el nucli de la transformació digital. ... by
Les persones i les seves capacitats en el nucli de la transformació digital. ...Les persones i les seves capacitats en el nucli de la transformació digital. ...
Les persones i les seves capacitats en el nucli de la transformació digital. ...CSUC - Consorci de Serveis Universitaris de Catalunya
19 views16 slides

More from CSUC - Consorci de Serveis Universitaris de Catalunya(20)

Recently uploaded

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
179 views7 slides
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
63 views12 slides
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
117 views25 slides
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
120 views13 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 views23 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
153 views59 slides

Recently uploaded(20)

Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue63 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... by ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool by ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software140 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views

Flow Monitoring Tools, What do we have, What do we need?

  • 1. Maria Isabel Gandía Carriedo 9th SIG-NOC Meeting ARNES, Ljubljana, 08-04-2019 Flow Monitoring Tools: What do We Have? What do we need?
  • 2. Disclaimer ü I’m neither a developer nor an expert on Network Flow Monitoring Tools. I’m a user of some of the following tools and I have put together the information I got as a user with what I have searched about some other popular tools and the input from Jisc, NORDUnet and AMRES. ü The idea is to offer SIG-NOC an abstract with useful information about currently used flow monitoring tools.
  • 3. Nework Flow Monitoring Tools… Just Monitoring? üSome functionalities go far beyond pure flow monitoring: • DDoS mitigation (blackholing, scrubbing centre, Flowspec…). • SNMP support to sync flows with actual traffic volumes. • BGP-peering with the core to do forward-path analysis. • Open APIs to integrate towards other tools (NSO, Nagios, Stats) • Trend reports to do Capacity Planning • Segregated logins to give filtered views to different users. • Report generation. • …
  • 4. A Common Path for Many Network Flow Monitoring Tools ü There are good Network Flow monitoring Open Source tools, but they are hard to manage (no GUI, different programs for different actions…). ü A Research Group works on a great monitoring user-friendly Open source or not very expensive tool. ü They create a Company / They develop a different flavour for commercial use / They are bought by another company.
  • 5. Some Network Flow Monitoring Tools ü Argus ü NFSEN / NFDUMP ü Nimbus (formerly FlowSonar (Team Cymru)) ü SILK / FlowBAT ü PMACCT ü NetVizura - NetFlow Analyzer (formerly ICmynet ü Talaia (Formerly SMARTxAC, now Auvik) ü NTOP/NTOPNG ü Fastnetmon Community / Advanced ü DDPS ü Arbor Networks SP (formerly Peakflow) (+TMS?) (from Netscout)
  • 6. Argus (Audit Record Generation and Usage System) ü https://qosient.com/argus/ ü GPLv3, with other licensing agreements available for commercial, governmental and educational users. No public Git-like repository. ü Status: Last versions argus-3.0.8.2 and argus-clients-3.0.8.2 (from 2016), Mailing list is active, ArgusPro (with commercial hardware and software versions of argus) is under development ü Threat intelligence: No ü Machine learning: No ü Supported protocols/inputs: Netflow (1-8, support for v9 is not clear), Flow-Tools, (Sflow and Jflow, maybe on demand), Port mirroring ü Users: Gloriad
  • 7. Argus (Audit Record Generation and Usage System) ü Argus is a bidirectional network flow generator and aggregator It’s structured as a server and a suite of supporting clients. ü The server (Argus) retrieves packets, it assembles them into binary data (representing flows) and writes this binary data to disk and/or a network socket (argus data stream). ü The argus-clients package provides a set of more than 30 binaries and scripts that read flow data from files of binary flow data and do actions like printing, processing, sorting, aggregating, tallying, collecting, distributing, archiving, and anonymizing data. ü Argus provides reachability, availability, connectivity, duration, rate, load, good-put, loss, jitter, retransmission and delay metrics for all network flows, and captures most attributes that are available from the packet contents, such as L2 addresses, tunnel identifiers (MPLS, GRE, IPsec, etc...), protocol ids, SAP's, hop-count, options, L4 transport identification (RTP detection), host flow control indications, etc...
  • 8. NFDUMP/NFSEN ü https://github.com/phaag/nfdump, http://nfsen.sourceforge.net/ ü BSD ü Status: updated ü Threat intelligence: No ü Machine-learning: No ü Supported protocols/inputs: netflow v1, v5/v7,v9,IPFIX and SFLOW ü Users: Uninett, SURFsara, GARR, SWITCH, BelWü, PIONIER, DeIC
  • 9. NFDUMP/NFSEN ü nfdump is a toolset: • nfcapd collects the data, sent from exporters and stores the flow records into files. Multiple netflow streams can be collected by a single collector. • nfdump reads the netflow data from one or many files stored by nfcapd and displays it and/or creates top N statistics of flows, bytes, packets. All data is stored to disk, before it gets analyzed. • nfanon (for anonymization), • nfexpire (for data expiration), • nfreply (to export the files stores by nfcapd), • sfcapd (for sflow collection), • etc. ü NfSen (NetFlow Sensor) is a graphical web based front end for the nfdump netflow tools. It allows users to display flows, packets and bytes using RRD (Round Robin Database).
  • 10. Nimbus (formerly FlowSonar, (Team Cymru)) ü http://www.team-cymru.com/nimbus.html ü Type: commercial, cloud-based ü Threat intelligence feeds: yes (IP reputation and Botnet controllers) ü “Price”: access to participant's information (NDA required) ü Users: CSUC (FlowSonar)
  • 11. Nimbus (formerly FlowSonar, (Team Cymru)) ü Flowsonar is based on nfdump/NfSen and it works on-premises. ü Flowsonar offers graphs for flows, packets and bits/s, per-protocol graphs, alerts and customized filters. ü Nimbus is a cloud-based netflow collection, analysis, and reporting platform. The partner exports their flows to a private IP and port over an encrypted tunnel. ü Nimbus uses a Kibana-based portal and provides with XML versions of the threat intelligence feeds. It is focused on real-time threat monitoring.
  • 12. SiLK (System for Internet-Level Knowledge) / FlowBAT ü https://tools.netsa.cert.org/silk/, http://www.flowbat.com/ ü Type: GPLv2 & Government Purpose License Rights (GPLR). However, there is no public Git-like repository for the project, all patches should be sent to the CMU team. ü Status: updated. Last version, silk-3.18.1 (March 2019) ü Threat intelligence feeds: No ü Machine learning: No ü Supported protocols/inputs: IPFIX (from yaf software, not from routers), NetFlow (v5, v9) and sFlow v5, or PDUs from a router ü Users: JISC
  • 13. SiLK (System for Internet-Level Knowledge) ü SiLK is a tool suite with two categories of applications: • The SiLK Packing System: daemon applications that collect flow data and convert them into a more space efficient format, storing the packed records into service-specific hourly binary flat files. • The SiLK Analysis Suite is a collection of command-line tools that read binary files containing SiLK Flow records and partition, sort, and count these records. The analysis tools interoperate using pipes, allowing a user to develop relatively sophisticated queries. ü It is suited for analyzing traffic on the backbone or border of a large, distributed enterprise or mid-sized ISP. However, it has not been designed for real-time flow analysis. ü Analysis Pipeline is a separate suite which works along with real-time analysing of flow data records. It can take flow records from SiLK files as they are created or IPFIX data from any application. ü FlowBAT is a graphical flow-based analysis tool designed to work with a SiLK-based NetFlow system as a back-end. Other third-party GUI are SiLKWeb and iSiLK.
  • 14. pmacct ü http://www.pmacct.net/ ü Type: GPLv2 ü Status: Updated, ü Threat intelligence: No ü Machine learning: No ü Supported protocols/inputs: libpcap, Netlink/NFLOG, NetFlow v1/v5/v7/v8/v9, sFlow v2/v4/v5 and IPFIX. -It also Collects Streaming Telemetry data ü Users: PSNC http://uowits.github.io/herbert-gui/index.html
  • 15. pmacct ü pmacct is a set of multi-purpose passive network monitoring tools. It can account, classify, aggregate, replicate and export forwarding-plane data, collect and correlate control-plane data via BGP and BMP; collect infrastructure data via Streaming Telemetry. ü Each component works both as a standalone daemon and as a thread of execution for correlation purposes (ie. enrich NetFlow with BGP data). ü pmacct can save data to many types of backends (relational DB, non- SQL DB, flat files, etc). ü It’s able to tag, filter, redirect, aggregate and split captured data. ü It has a BGP daemon for visibility of BGP multi-path routes. ü It does Packet classification via nDPI . ü You can use tools like Project Herber (http://uowits.github.io/herbert- gui/index.html) to print graphs with the data.
  • 16. NetVizura - NetFlow Analyzer (formerly ICmynet) ü References: https://www.netvizura.com/netflow-analyzer ü Type: Research/commercial, on-premises ü Status: updated ü Threat inteligence feeds: Yes, through in-depth forensics ü Machine learning: No ü Supported protocols/inputs: NetFlow, IPFIX, NSEL, sFlow and compatible netflow-like protocols. ü Users: AMRES
  • 17. NetVizura - NetFlow Analyzer (formerly ICmynet) ü Netvizura NetFlow Analyzer helps net admins with bandwidth monitoring, network traffic investigation, analyses and reporting. It supports the following features: • Device Traffic Analysis - traffic distribution analysis per interface, device or subnet, used network planning • Custom Traffic Analysis - analysis per flow type, subnet, organization unit, etc. • End User Traffic Analysis - analysis per end user, apps and protocols used, throughput, etc. • In-Depth Forensics - through raw data analysis and queries • Traffic Reports - PDF traffic report • Threshold Alarms - throughput and volume threshold and alarms, notifications via email • Dashboard Overview - realtime alarm prioritization and presentation • Powerful Settings - Flow sampling and filtering, Top N analysis, managing data and archives • Flexible Data Collection - multi-vendor support
  • 18. TALAIA (evolution of SMARTxAC, now Auvik) ü https://www.talaia.io/, https://es.slideshare.net/CSUC_info/1127-smar- tx-ac-network-polygraph-catnix-publicable, https://www.auvik.com/ ü Type: commercial, on-premises and Cloud-based ü Status: deprecated as it was (bought by Auvik) ü Threat intelligence feeds: No ü Machine learning: yes ü Supported protocols: Netflow, IPFIX ü Users: CSUC, RedIRIS
  • 19. TALAIA (evolution of SMARTxAC, now Auvik) ü Talaia was a spin-off of Universitat Politècnica de Catalunya (UPC / BarcelonaTech) for their former project SMARTxAC (Traffic Monitoring System for Anella Científica) and it was bought by Auvik. ü Talaia gets Netflow information, it analyzes it using Deep Packet Inspection information taken from capture linecards in the main connection lines and shows this information in a graphical interface. ü It is a multi-tenant solution (each institution only sees the information associated with its IP addresses). ü It has views for applications, protocols, top N, autozoom, geolocation, anomalies, flows and reports. ü The platform is able to authenticate federated users. ü Auvik offers an integrated solution for Managed Service Providers (MSP), offering several tools in a single platform (Configuration Management, Service Monitoring, IPAM, Inventory Management, Password Management...). Flow monitoring is one of the functionalities, although they don't offer the on-premises solution nor the federated access and it's still work-in-progress to integrate Talia with their platform.
  • 20. NTOP/NTOPNG ü https://www.ntop.org/ ü Type: GPLv3 & commercial (but free for Education) ü Status: Updated ü Threat intelligence feeds: No ü Machine learning: No ü Users: TSSG/WIT ü Supported protocols/inputs: sFlow, NetFlow (v5 & v9) and IPFIX support through nProbe
  • 21. NTOP/NTOPNG ü NTOP-NG is a web-based traffic analysis and flow collection software that provides a web GUI to access monitoring data. It provides detailed views on active hosts, flows, IP addresses, Mac addresses, Autonomous systems. ü It can be used to monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics (retransmissions, out of order packets, packet lost), and bytes and packets transmitted. ü It requires to install nProbe as an intermediate flow collector, a probe to install in the middle for detailed L7 application dissection or per- packet realtime analysis. This intermediate step is needed as ntopng does not understand Netflow, so nProbe acts like a translator. ü NTOPNG can listen to a SPAN port directly.
  • 22. Fastnetmon Community / Advanced ü https://github.com/pavel-odintsov/fastnetmon, https://fastnetmon.com/ ü Type: Community edition Open source (GPLv2), Advanced edition commercial (free one-month trial license available) ü Status: Both editions updated, more development on Advanced edition. ü Threat intelligence: No ü Machine-learning: No ü Supported protocols/inputs: NetFlow (v5, v9), IPFIX, sFlow (v4, v5), Port mirror/SPAN capture with PF_RING, SnabbSwitch, NETMAP and PCAP. Commercial version offers support for more protocols ü Users: DeiC (for DDPS) https://fastnetmon.com/screenshoots-fastnetmon-advanced/
  • 23. Fastnetmon Community / Advanced ü FastNetMon is a volumetric DDoS detector able to perform a configurable action when defined thresholds are exceeded (notifying, blackholing, sending BGP Flowspec rules, switching off a server…) . ü The blocked IPs are announced via BGP with ExaBGP. ü It has support for the most popular attack types (syn_flood, udp_flood, icmp flood, ip_fragmentation_flood, DNS amplification, NTP amplification, SSDP amplification, SNMP amplification). ü It includes an API and a JSON based database for configuration/attacks. It can be integrated with Graphite and InfluxDB. ü The advanced FastNetMon includes bundled support for Grafana, using InfluxDB or ClickHouse. It can expose total bandwidth, per host bandwidth, per network bandwidth and arbitrary traffic reports from traffic persistency database (peering reports, per prefix reports). Some pre-created dashboards are available. ü More differences at https://fastnetmon.com/compare-community-and- advanced/
  • 24. DDPS (DeiC DDoS Protection Service) ü https://github.com/deic-dk/DDPS-documentation ü Type: DDPS is copyright 2015-2017 DeiC, Denmark. Licensed under the Apache License, Version 2.0 ü Status: Updated ü Threat intelligence: No ü Machine learning: No ü Users: DeIC https://github.com/deic-dk/DDPS-documentation
  • 25. DDPS (DeiC DDoS Protection Service) ü DDPS relies on FastNetMon Community and it is conceived as an automated system for DDoS mitigation: it detects attacks and automatically triggers mitigation. ü Based on BGP Flowspec, it is intended to be used in a system where detection is placed as close as possible to the target (FastNetMon in the customer’s network) and mitigation is placed as close as possible to the source(s) of the attack (DeiC). ü End-users may add, edit, or cancel mitigation rules as well as view archived rules and statistical information. ü The project is split in sub-projects: • DDPS fastnetmon • DDPS database daemon • DDPS NODE • DDPS web-user interface • DDPS Customer Site Simulation • DDPS DDoS simulator
  • 26. Arbor Networks SP (formerly Peakflow) (+TMS) (Netscout, formerly Arbor) ü https://www.netscout.com/arbor-ddos ü Type: commercial ü Status: on-premises, evolving to a cloud-based mitigation solution ü Threat intelligence feeds: yes ü Supported protocols/inputs: NetFlow, sFlow, J-Flow, IP FIX, ü Users: BelNET, CSUC, JISC ü Arbor offers a solution for monitoring (Peakflow/SP) and a different product for DDoS mitigation (TMS), although the front-end is in the SP. It is based on Netflow, SNMP and BGP information. It compares Netflow data to SNMP data to set the thresholds. It works with pre- defined managed objects and it has four main functions: • Monitoring (SP) • DDoS detection (SP) • DDoS mitigation (TMS) • Reports (SP)
  • 27. Arbor Networks SP (formerly Peakflow) (+TMS) (Netscout, formerly Arbor) ü It offers different views, like: • Traffic (per application, AS, customer, protocol, etc) • Alerts (including Summary, Activity reports, etc) • Mitigations • Reports ü The alerts thresholds are defined by the administrators of the platform. ü There are three different types of detection: • Threshold (fixed), in bps and pps. It applies to the whole object • Profile (with different configurable multiplying factors) in bps and pps. It applies to the whole object. • Host, in bps and pps. It applies to each host inside the object. There are many types of protocols and the administrators must define a threshold for each one of them (NTP, ICMP, etc). ü There are different types of users with different permissions, although it is not exactly a multi-tenant platform. ü It has SOAP and REST APIs.
  • 28. More Network Monitoring Tools ü AlienVault (AT&T Cybersecurity since February 2019) ü Insight2 (based on Argus) ü OSSIM (Open Source Security Information Management) ü Deepfield ü Kentik ü Flowmo ü Scrutinizer (plixer) ü ManageEngine ü SolarWinds NetFlow Traffic Analyzer ü ..
  • 29. What do we have? What do we need? ü Does your current tool cover your needs? The Incubator subtask under the Network Technologies and Services Development in the Géant Project may propose to contribute to the development of an open source alternative to the commercial tools, from scratch or though contributions to existing open source tools. ü Let’s play with Mentimeter.
  • 30. Thanks for your attention! Questions? mariaisabel.gandia@csuc.cat