SlideShare a Scribd company logo
1 of 57
Download to read offline
CNIT 50:
Network Security Monitoring
2. Collecting Network Traffic: Access, Storage, and
Management
Topics
• A Sample Network for a Pilot NSM System
• IP Addresses and Network Address Translation
• Choosing the Best Place to Obtain Network
Visibility
• Getting Physical Access to the Traffic
• Choosing an NSM Platform
• Ten NSM Platform Management Recommendations
A Sample Network for a Pilot
NSM System
Issues
• Company can only monitor traffic up to the
external gateway
• Beyond that point, only the ISP can monitor it
• Wireless traffic is usually encrypted at layer 2
• More difficult to monitor than wired traffic
Issues
• Devices on Wireless and Internal networks
should be clients, not servers
• Should initiate connections, not receive them
• DMZ devices can act as either clients or servers
• May initiate or receive connections
Other Traffic Flows
IP Addresses and Network
Address Translation
Network Address Translation

(NAT)
• Private IP addresses cannot be used on the Internet
• 192.168.0.0 - 192.168.255.255
• 172.16.0.0 - 172.31.255.255
• 10.0.0.0 - 10.255.255.255
• They must be translated to public IP addresses
• Often done at the firewall or gateway to the Internet
One-to-One Mapping
• The diagram in the previous slide shows this
technique
• A public IP is offering a service on port 100
• It's actually forwarded to a machine in the DMZ
with a local address
• This requires a different public IP for each
server (expensive)
Network Port Address
Translation (NPAT or PAT)
• Multiple local addresses share a single public IP
address
• Each connection gets a different public port number
• Works for clients, but not for servers
• Appropriate for Wireless and Internal networks
• Consumes fewer public IPs, but increases load on
firewall and gateway
Choosing the Best Place to
Obtain Network Visibility
WAN Locations
• Locations C, D, and E
• All on the public side of the firewall
• After NAT: local IP addresses have been removed
• Difficult to identify the local device sending or
receiving data
• Easier for DMZ zone because of one-to-one
mapping
Wireless Traffic
Sensor Placement Options
• There is no single place that lets us see true
source IP addresses for all networks
• Unless the firewall is configured to send
copies of all traffic to an NSM platform
• But this links the different segments together,
which is risky
• Better option: deploy three sensors
Deploy Three Sensors
Getting Physical Access to
the Traffic
Using Switches for Traffic
Monitoring
• Configure switches to send a copy of trafffic to
a port for monitoring
• Cisco calls this SPAN (Switched Port
Analyzer)
• Juniper & Dell call it port mirroring
Using a Network Tap
• Recommended
option
• Easier to install and
maintain than SPAN
ports
• Which can be
disabled,
misconfigured or
oversubscribed
Capturing Traffic on a
Firewall or Router
• Might be useful for short-term troubleshooting
• Not a viable long-term solution
• Because filtering and routing platforms lack
robust storage media
Capturing Traffic Directly on
a Server
• May be the only option for CIRTs (Computer
Incident Response Teams)
• Especially when servers are in the cloud
Capturing Traffic Directly on
a Client
• Might work for temporary storage
• But not appropriate for long-term collection of
network data
• Too limited and data is spread across many
devices
Choosing an NSM Platform
NSM Platform
• The server connected to the network tap
• Runs NSM tools to collect and analyze traffic
• Can be a commercial appliance, a self-built
system, or a virtual machine
NSM Platorm Characteristics
• Large RAIDs to store data
• RAM: 4 GB + 1GB per monitored interface
• One CPU per monitored interface
• Multiple network interfaces to connect to SPAN
ports or taps
Estimating Data Storage
Requirements
• Multiply these together to get daily storage needed
• Average network utilization in Mbps
• 1 byte / 8 bits
• 60 seconds per minute
• 60 minutes per hour
• 24 hours per day
Estimating Data Storage
Requirements
• Example:
• 100 Mbps * 1/8 * 60 * 60 * 24 = 1.08 TB per day
• 45 GB per hour
• 32 TB per 30 days
• Add 10% more for databases
• And 5% more for text files
• 38 TB for a month of data
Ten NSM Platform Management
Recommendations
CNIT 50:
Network Security Monitoring
3. Standalone NSM Deployment and Installation
Topics
• Stand-alone or Server Plus Sensors?
• Choosing How to Get SO Code onto Hardware
• Installing a Stand-alone System
Stand-alone or Server Plus
Sensors?
Two Deployment Modes
Stand-alone
• Best for beginners
• All traffic goes to one NSM platform
• Good for networks with simple NSM
requirements
Stand-alone
Server-Plus-Sensors
• Distributes NSM duties across several servers
• For larger, more complex networks
• Such as geographically separate networks
Server-Plus-Sensors
Global Deployment
• In server-plus-sensors mode
• Sensors don't need to be within the local
network
• Can be deployed globally
• Connect back to central server via the network
• Through a VPN or through public mangement
interfaces
Choosing How to Get SO
Code onto Hardware
Hardware
• SO supports two ways to install code
• Download ISO file and install from it
• Flash it to a DVD or thumbdrive
• Ubuntu Personal Package Archives (PPA)
• Can install SO on Ubuntu, or derivatives like
Xubuntu (64-bit)
Installing a Stand-alone
System
Project 1
2. Collecting Network Traffic & 3. Standalone NSM Deployment

More Related Content

What's hot

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Content Delivery Network – CDN
Content Delivery Network – CDNContent Delivery Network – CDN
Content Delivery Network – CDNAhmed Banafa
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthPECB
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network ForensicsSavvius, Inc
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access controlLeo Mark Villar
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewSam Bowne
 
Network load balancing deep dive
Network load balancing deep diveNetwork load balancing deep dive
Network load balancing deep diveJohn Louis Garcia
 
Nmap basics
Nmap basicsNmap basics
Nmap basicsitmind4u
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Vishal Tandel
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationSam Bowne
 

What's hot (20)

Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Content Delivery Network – CDN
Content Delivery Network – CDNContent Delivery Network – CDN
Content Delivery Network – CDN
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
 
Protecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in DepthProtecting the Network From Yourself Using Defense in Depth
Protecting the Network From Yourself Using Defense in Depth
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
Ch 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts ReviewCh 2: TCP/IP Concepts Review
Ch 2: TCP/IP Concepts Review
 
Network load balancing deep dive
Network load balancing deep diveNetwork load balancing deep dive
Network load balancing deep dive
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.Case study on Physical devices used in Computer forensics.
Case study on Physical devices used in Computer forensics.
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
 

Similar to 2. Collecting Network Traffic & 3. Standalone NSM Deployment

Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.comULLPTT
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comULLPTT
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferenceCengage Learning
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security PresentationWajahat Rajab
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2Muhammad Ahad
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure ServicesBizTalk360
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationJisc
 
Network client configuration
Network client configurationNetwork client configuration
Network client configurationEduardo Cambinda
 
Network protocol
Network protocolNetwork protocol
Network protocolOnline
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportHasibul Islam Nirob
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 

Similar to 2. Collecting Network Traffic & 3. Standalone NSM Deployment (20)

Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Ntc 362 effective communication uopstudy.com
Ntc 362 effective communication   uopstudy.comNtc 362 effective communication   uopstudy.com
Ntc 362 effective communication uopstudy.com
 
Ntc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.comNtc 362 forecasting and strategic planning -uopstudy.com
Ntc 362 forecasting and strategic planning -uopstudy.com
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
Securely Publishing Azure Services
Securely Publishing Azure ServicesSecurely Publishing Azure Services
Securely Publishing Azure Services
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
Tech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentationTech 2 tech low latency networking on Janet presentation
Tech 2 tech low latency networking on Janet presentation
 
Network client configuration
Network client configurationNetwork client configuration
Network client configuration
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Chapter11
Chapter11Chapter11
Chapter11
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 

More from Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 

More from Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 

Recently uploaded

31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPCeline George
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 

Recently uploaded (20)

Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
Plagiarism,forms,understand about plagiarism,avoid plagiarism,key significanc...
 
An Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERPAn Overview of the Calendar App in Odoo 17 ERP
An Overview of the Calendar App in Odoo 17 ERP
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 

2. Collecting Network Traffic & 3. Standalone NSM Deployment

  • 1. CNIT 50: Network Security Monitoring 2. Collecting Network Traffic: Access, Storage, and Management
  • 2. Topics • A Sample Network for a Pilot NSM System • IP Addresses and Network Address Translation • Choosing the Best Place to Obtain Network Visibility • Getting Physical Access to the Traffic • Choosing an NSM Platform • Ten NSM Platform Management Recommendations
  • 3. A Sample Network for a Pilot NSM System
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Issues • Company can only monitor traffic up to the external gateway • Beyond that point, only the ISP can monitor it • Wireless traffic is usually encrypted at layer 2 • More difficult to monitor than wired traffic
  • 9.
  • 10.
  • 11. Issues • Devices on Wireless and Internal networks should be clients, not servers • Should initiate connections, not receive them • DMZ devices can act as either clients or servers • May initiate or receive connections
  • 13.
  • 14. IP Addresses and Network Address Translation
  • 15.
  • 16.
  • 17. Network Address Translation
 (NAT) • Private IP addresses cannot be used on the Internet • 192.168.0.0 - 192.168.255.255 • 172.16.0.0 - 172.31.255.255 • 10.0.0.0 - 10.255.255.255 • They must be translated to public IP addresses • Often done at the firewall or gateway to the Internet
  • 18.
  • 19. One-to-One Mapping • The diagram in the previous slide shows this technique • A public IP is offering a service on port 100 • It's actually forwarded to a machine in the DMZ with a local address • This requires a different public IP for each server (expensive)
  • 20. Network Port Address Translation (NPAT or PAT) • Multiple local addresses share a single public IP address • Each connection gets a different public port number • Works for clients, but not for servers • Appropriate for Wireless and Internal networks • Consumes fewer public IPs, but increases load on firewall and gateway
  • 21.
  • 22.
  • 23. Choosing the Best Place to Obtain Network Visibility
  • 24.
  • 25. WAN Locations • Locations C, D, and E • All on the public side of the firewall • After NAT: local IP addresses have been removed • Difficult to identify the local device sending or receiving data • Easier for DMZ zone because of one-to-one mapping
  • 27. Sensor Placement Options • There is no single place that lets us see true source IP addresses for all networks • Unless the firewall is configured to send copies of all traffic to an NSM platform • But this links the different segments together, which is risky • Better option: deploy three sensors
  • 29. Getting Physical Access to the Traffic
  • 30. Using Switches for Traffic Monitoring • Configure switches to send a copy of trafffic to a port for monitoring • Cisco calls this SPAN (Switched Port Analyzer) • Juniper & Dell call it port mirroring
  • 31.
  • 32. Using a Network Tap • Recommended option • Easier to install and maintain than SPAN ports • Which can be disabled, misconfigured or oversubscribed
  • 33. Capturing Traffic on a Firewall or Router • Might be useful for short-term troubleshooting • Not a viable long-term solution • Because filtering and routing platforms lack robust storage media
  • 34. Capturing Traffic Directly on a Server • May be the only option for CIRTs (Computer Incident Response Teams) • Especially when servers are in the cloud
  • 35. Capturing Traffic Directly on a Client • Might work for temporary storage • But not appropriate for long-term collection of network data • Too limited and data is spread across many devices
  • 36. Choosing an NSM Platform
  • 37. NSM Platform • The server connected to the network tap • Runs NSM tools to collect and analyze traffic • Can be a commercial appliance, a self-built system, or a virtual machine
  • 38. NSM Platorm Characteristics • Large RAIDs to store data • RAM: 4 GB + 1GB per monitored interface • One CPU per monitored interface • Multiple network interfaces to connect to SPAN ports or taps
  • 39. Estimating Data Storage Requirements • Multiply these together to get daily storage needed • Average network utilization in Mbps • 1 byte / 8 bits • 60 seconds per minute • 60 minutes per hour • 24 hours per day
  • 40. Estimating Data Storage Requirements • Example: • 100 Mbps * 1/8 * 60 * 60 * 24 = 1.08 TB per day • 45 GB per hour • 32 TB per 30 days • Add 10% more for databases • And 5% more for text files • 38 TB for a month of data
  • 41. Ten NSM Platform Management Recommendations
  • 42.
  • 43.
  • 44. CNIT 50: Network Security Monitoring 3. Standalone NSM Deployment and Installation
  • 45. Topics • Stand-alone or Server Plus Sensors? • Choosing How to Get SO Code onto Hardware • Installing a Stand-alone System
  • 46. Stand-alone or Server Plus Sensors?
  • 48. Stand-alone • Best for beginners • All traffic goes to one NSM platform • Good for networks with simple NSM requirements
  • 50. Server-Plus-Sensors • Distributes NSM duties across several servers • For larger, more complex networks • Such as geographically separate networks
  • 52. Global Deployment • In server-plus-sensors mode • Sensors don't need to be within the local network • Can be deployed globally • Connect back to central server via the network • Through a VPN or through public mangement interfaces
  • 53. Choosing How to Get SO Code onto Hardware
  • 54. Hardware • SO supports two ways to install code • Download ISO file and install from it • Flash it to a DVD or thumbdrive • Ubuntu Personal Package Archives (PPA) • Can install SO on Ubuntu, or derivatives like Xubuntu (64-bit)