Pavel Minařík
FlowMon
Network Traffic & Security Monitoring in Examples
2/18
Key Points
• Network monitoring based on IP flows
 Do you know what's really happening in your network?
 Do you have such information real-time and historically?
• Security – NBA (Network Behavior Analysis)
 Do you easily detect DOS, DDOS and attacks against services?
 Are you able to reveal viruses/malware in your network?
 Do you have a tool for suspicious behavior detection?
• Network infrastructure optimization
 Are you paying too much for peering?
 Would you like to account & bill based on traffic amount?
• Data Retention law fulfillment
 Do you fulfill law requirements?
23.10.2012 FlowMon © INVEA-TECH 2012
3/18
FlowMon – Network Under Control
• Innovative network traffic monitoring & security solution
using IP flows
• Based on NetFlow v5/v9 and IPFIX technology
• Provides information about who communicates with
whom, how long, what protocol, traffic volume and more
• Best price/performance ratio in the industry
• Solution for networks of all dimensions
• Exceptional customer benefits
• Your network under control!
23.10.2012 FlowMon © INVEA-TECH 2012
4/18
FlowMon Architecture
• FlowMon Probes
 passive standalone source of network statistics
(NetFlow / IPFIX data)
• FlowMon Collectors
 visualization and evaluation of network statistics
• FlowMon ADS
 automatic traffic analysis for reveal operational & security issues
23.10.2012 FlowMon © INVEA-TECH 2012
5/18
FlowMon Probe
• High-performance standalone probe - source of IP flow
records in NetFlow v5,9 and IPFIX format
• L2/L3 invisible - transparent for monitored network
• Standard and hardware accelerated models
• Remote configuration via a user-friendly web GUI
• 10/100/1000 Ethernet, 10 GbE, IPv4, IPv6, MPLS, VLAN
• Maintenance-free appliance with simple configuration
• Built-in collector (data storage redundancy)
23.10.2012 FlowMon © INVEA-TECH 2012
6/18
FlowMon Collector
• Standalone appliance for long term storage of flow statistics
from multiple sources (probes, routers, switches)
• Support for NetFlow/IPFIX/sFlow data storage & analysis
• Professional solution for mid-size and large networks
 RAID, redundant power, remote management
 storage capacity from 1TB up to hundreds TBs
 unique performance – more than 200k flows/s processing
23.10.2012 FlowMon © INVEA-TECH 2012
7/18
FlowMon Monitoring Center
• Graphs, tables and form for further data processing
• Top N statistics (users, sites, services)
• Predefined set of profiles/views for standard protocols
• User defined profiles (based on IP address or ports)
• Intelligent reporting (online/offline email/pdf/csv reports)
• Profile support and automatic alerts (e-mail, syslog, SNMP etc.)
23.10.2012 FlowMon © INVEA-TECH 2012
8/18
FlowMon ADS
• Undesirable behavior detection
 Attacks
 Undesirable services
 Operational and configuration problems
• Behavior profiles computing
 Communication partners
 Anomaly detection
 Traffic volume and structure
• Intuitive user interface
 Immediate network problems indication
 Interactive event visualization
 Integration with information from DNS, WHOIS, geolocation services
• Complex filtering, alerting, reporting
23.10.2012 FlowMon © INVEA-TECH 2012
9/18
FlowMon ADS
• Detection of undesirable patterns in communication
 Attacks (port scanning, dictionary attacks, DOS/DDOS, telnet protocol)
 Data traffic anomalies (DNS, multicast, non-standard communications)
 Device behavior anomalies (changes in long-term device behavior
profile)
 Undesirable applications (P2P networks, anonymizer)
 Internal security problems (viruses, spyware, botnets)
 Mail traffic (outgoing spam)
 Operational problem (delays, high traffic, reverse DNS records)
23.10.2012 FlowMon © INVEA-TECH 2012
Network Traffic & Security Monitoring
-
Use Cases
23.10.2012FlowMon © INVEA-TECH
11/18
Use Cases
• “Eyes” into the network
traffic and an overview of
what is going on in the
network and the
infrastructure
• „Drill-down“ to the level
of individual
communications, a
record of everything that
has happened
9.10.2012 FlowMon © INVEA-TECH 2012
12/18
Use Cases
• 10% of users typically
generate 90% of the
traffic – who are they?
• How are individual
services utilized and
when are peaks?
9.10.2012 FlowMon © INVEA-TECH 2012
13/18
Use Cases
• Maleware activities
 84% of PCs has an antivirus
 31% of PCs is infected by
malware
• Rogue DNS servers
9.10.2012 FlowMon © INVEA-TECH 2012
14/18
Use Cases
• Data Theft • Undesired applications
and user activities
9.10.2012 FlowMon © INVEA-TECH 2012
Online demo
23.10.2012FlowMon © INVEA-TECH
16/18
Benefits for ISP
• Long-term statistics storage about traffic
• Network capacity planning
• Connectivity optimization
• Peering agreements optimization
• Attacks, anomalies and suspicious behavior detection
• Data retention law fulfillment
• Accounting and billing based on traffic amount
• Possibility to graphs and tables integration to your IS
23.10.2012 FlowMon © INVEA-TECH 2012
17/18
FlowMon Solution Advantages
• Complete product portfolio for monitoring of all
dimension networks
• Flexible and scalable as you grow
• Best price/performance ratio
 low price of standard models
 high performance of hardware-accelerated models
• Unique customer benefits
23.10.2012 FlowMon © INVEA-TECH 2012
18/18
INVEA-TECH a.s.
U Vodárny 2965/2
616 00 Brno
Czech Republic
www.invea-tech.com
High-Speed Networking Technology Partner
23.10.2012 FlowMon © INVEA-TECH 2012
INVEA-TECH
info@invea-tech.com
+420 511 205 250
Thank you for your attention

More Related Content

PDF
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
PPTX
ThousandEyes at Network Field Day 12
PPTX
IT Security: Eliminating threats with effective network & log analysis
PPTX
Continuum / Channelnomics Webcast
PDF
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
PDF
Enterprise Network Monitoring Software by ServicePilot
PDF
PLNOG 17 - Piotr Jasiniewski, Przemek Papużyński - Ericsson HDS 8000 Server p...
PPTX
Network Security: Protecting SOHO Networks
PLNOG 9: Peter Springl - Next Generation Network Traffic Monitoring and Anoma...
ThousandEyes at Network Field Day 12
IT Security: Eliminating threats with effective network & log analysis
Continuum / Channelnomics Webcast
Deceptive Speed: How to Fix Fast, Unstable Wi-Fi
Enterprise Network Monitoring Software by ServicePilot
PLNOG 17 - Piotr Jasiniewski, Przemek Papużyński - Ericsson HDS 8000 Server p...
Network Security: Protecting SOHO Networks

What's hot (20)

DOC
amir_(1) (1) (1)
PPTX
Honeywell Cybersecurity
PPTX
Case study: Leading legal services firm deploys Applications Manager across m...
PPTX
New microsoft power point presentation (2)
PDF
Panda Security - Gatedefender
PDF
E-Score Data Management system on mobiles to survey the electrical usage
PPT
Extreme & Microsoft Lync
PPTX
AggreGate Network Manager
PPTX
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
PPTX
Secure remote device access
PPTX
AUDITime information Systems (I) Pvt. Ltd.
PPTX
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
PPTX
Network Traffic Analysis at a financial institution with 788 branches for 350...
PPTX
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
PDF
HSB15 - Pavel Minarik - INVEATECH
PPT
Network Controller
PPTX
PCI Virtual Terminals - The Easy Way
PDF
Realise the Value in modern Data Center Infrastructure
PDF
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
amir_(1) (1) (1)
Honeywell Cybersecurity
Case study: Leading legal services firm deploys Applications Manager across m...
New microsoft power point presentation (2)
Panda Security - Gatedefender
E-Score Data Management system on mobiles to survey the electrical usage
Extreme & Microsoft Lync
AggreGate Network Manager
Largest Mobile Operator from Russia uses opmanager to manage 5000 devices
Secure remote device access
AUDITime information Systems (I) Pvt. Ltd.
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
Network Traffic Analysis at a financial institution with 788 branches for 350...
Gulf Chemicals & Metallurgy manages 1700 interfaces with OpManager
HSB15 - Pavel Minarik - INVEATECH
Network Controller
PCI Virtual Terminals - The Easy Way
Realise the Value in modern Data Center Infrastructure
Case study: Leading bank uses NetFlow Analyzer to solve mysteries on their ne...
Ad

Similar to PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples (20)

PDF
Invea - Jiri Tobola
PDF
Co se skrývá v datovém provozu? - Pavel Minařík
PPTX
How ManageEngine NetFlow Analyzer helped Boston Properties Save Bandwidth Costs
PDF
Network Security and Visibility through NetFlow
PDF
Plugging Network Security Holes Using NetFlow
PDF
SFBA Splunk Usergroup Meeting, August 14, 2024
PDF
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
PDF
Flow questions and answers
PDF
BSIT3CD_Continuation of Cyber incident response (1).pdf
PDF
IBM SevOne for network and systems monitoring
PPT
network-management Web base.ppt
PPT
Network management
PPT
Network management aa
PPT
Internet Traffic Monitoring and Analysis
PDF
Network Monitoring Tools
PPT
Ben Rothke - NBA for The Security Professional
PPTX
Network Monitoring Basics
PPTX
An Integrated Approach to Manage IT Network Traffic - An Overview
PPT
this is the slide design for chapter 4 of reource monitoring and mamangemnt
PPTX
NetFlow Analyzer Training Part I: Getting the initial settings right
Invea - Jiri Tobola
Co se skrývá v datovém provozu? - Pavel Minařík
How ManageEngine NetFlow Analyzer helped Boston Properties Save Bandwidth Costs
Network Security and Visibility through NetFlow
Plugging Network Security Holes Using NetFlow
SFBA Splunk Usergroup Meeting, August 14, 2024
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
Flow questions and answers
BSIT3CD_Continuation of Cyber incident response (1).pdf
IBM SevOne for network and systems monitoring
network-management Web base.ppt
Network management
Network management aa
Internet Traffic Monitoring and Analysis
Network Monitoring Tools
Ben Rothke - NBA for The Security Professional
Network Monitoring Basics
An Integrated Approach to Manage IT Network Traffic - An Overview
this is the slide design for chapter 4 of reource monitoring and mamangemnt
NetFlow Analyzer Training Part I: Getting the initial settings right
Ad

Recently uploaded (20)

PPTX
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
PDF
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
PPTX
CAPE CARIBBEAN STUDIES- Integration-1.pptx
PDF
6.-propertise of noble gases, uses and isolation in noble gases
PDF
Module 7 guard mounting of security pers
PDF
IKS PPT.....................................
PPTX
ANICK 6 BIRTHDAY....................................................
PPTX
Copy- of-Lesson-6-Digestive-System.pptx
PDF
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
PPTX
Literatura en Star Wars (Legends y Canon)
PPTX
CASEWORK Power Point Presentation - pointers
PPTX
Rakhi Presentation vbbrfferregergrgerg.pptx
DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
PPTX
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
PPTX
Sustainable Forest Management ..SFM.pptx
PPTX
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
PPTX
Lesson-7-Gas. -Exchange_074636.pptx
PDF
COLEAD A2F approach and Theory of Change
PDF
Yusen Logistics Group Sustainability Report 2024.pdf
DOCX
Action plan to easily understanding okey
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
CAPE CARIBBEAN STUDIES- Integration-1.pptx
6.-propertise of noble gases, uses and isolation in noble gases
Module 7 guard mounting of security pers
IKS PPT.....................................
ANICK 6 BIRTHDAY....................................................
Copy- of-Lesson-6-Digestive-System.pptx
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
Literatura en Star Wars (Legends y Canon)
CASEWORK Power Point Presentation - pointers
Rakhi Presentation vbbrfferregergrgerg.pptx
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
Sustainable Forest Management ..SFM.pptx
FINAL TEST 3C_OCTAVIA RAMADHANI SANTOSO-1.pptx
Lesson-7-Gas. -Exchange_074636.pptx
COLEAD A2F approach and Theory of Change
Yusen Logistics Group Sustainability Report 2024.pdf
Action plan to easily understanding okey

PLNOG 9: Pavel Minarik - Network Traffic & Security Monitoring in Examples

  • 1. Pavel Minařík FlowMon Network Traffic & Security Monitoring in Examples
  • 2. 2/18 Key Points • Network monitoring based on IP flows  Do you know what's really happening in your network?  Do you have such information real-time and historically? • Security – NBA (Network Behavior Analysis)  Do you easily detect DOS, DDOS and attacks against services?  Are you able to reveal viruses/malware in your network?  Do you have a tool for suspicious behavior detection? • Network infrastructure optimization  Are you paying too much for peering?  Would you like to account & bill based on traffic amount? • Data Retention law fulfillment  Do you fulfill law requirements? 23.10.2012 FlowMon © INVEA-TECH 2012
  • 3. 3/18 FlowMon – Network Under Control • Innovative network traffic monitoring & security solution using IP flows • Based on NetFlow v5/v9 and IPFIX technology • Provides information about who communicates with whom, how long, what protocol, traffic volume and more • Best price/performance ratio in the industry • Solution for networks of all dimensions • Exceptional customer benefits • Your network under control! 23.10.2012 FlowMon © INVEA-TECH 2012
  • 4. 4/18 FlowMon Architecture • FlowMon Probes  passive standalone source of network statistics (NetFlow / IPFIX data) • FlowMon Collectors  visualization and evaluation of network statistics • FlowMon ADS  automatic traffic analysis for reveal operational & security issues 23.10.2012 FlowMon © INVEA-TECH 2012
  • 5. 5/18 FlowMon Probe • High-performance standalone probe - source of IP flow records in NetFlow v5,9 and IPFIX format • L2/L3 invisible - transparent for monitored network • Standard and hardware accelerated models • Remote configuration via a user-friendly web GUI • 10/100/1000 Ethernet, 10 GbE, IPv4, IPv6, MPLS, VLAN • Maintenance-free appliance with simple configuration • Built-in collector (data storage redundancy) 23.10.2012 FlowMon © INVEA-TECH 2012
  • 6. 6/18 FlowMon Collector • Standalone appliance for long term storage of flow statistics from multiple sources (probes, routers, switches) • Support for NetFlow/IPFIX/sFlow data storage & analysis • Professional solution for mid-size and large networks  RAID, redundant power, remote management  storage capacity from 1TB up to hundreds TBs  unique performance – more than 200k flows/s processing 23.10.2012 FlowMon © INVEA-TECH 2012
  • 7. 7/18 FlowMon Monitoring Center • Graphs, tables and form for further data processing • Top N statistics (users, sites, services) • Predefined set of profiles/views for standard protocols • User defined profiles (based on IP address or ports) • Intelligent reporting (online/offline email/pdf/csv reports) • Profile support and automatic alerts (e-mail, syslog, SNMP etc.) 23.10.2012 FlowMon © INVEA-TECH 2012
  • 8. 8/18 FlowMon ADS • Undesirable behavior detection  Attacks  Undesirable services  Operational and configuration problems • Behavior profiles computing  Communication partners  Anomaly detection  Traffic volume and structure • Intuitive user interface  Immediate network problems indication  Interactive event visualization  Integration with information from DNS, WHOIS, geolocation services • Complex filtering, alerting, reporting 23.10.2012 FlowMon © INVEA-TECH 2012
  • 9. 9/18 FlowMon ADS • Detection of undesirable patterns in communication  Attacks (port scanning, dictionary attacks, DOS/DDOS, telnet protocol)  Data traffic anomalies (DNS, multicast, non-standard communications)  Device behavior anomalies (changes in long-term device behavior profile)  Undesirable applications (P2P networks, anonymizer)  Internal security problems (viruses, spyware, botnets)  Mail traffic (outgoing spam)  Operational problem (delays, high traffic, reverse DNS records) 23.10.2012 FlowMon © INVEA-TECH 2012
  • 10. Network Traffic & Security Monitoring - Use Cases 23.10.2012FlowMon © INVEA-TECH
  • 11. 11/18 Use Cases • “Eyes” into the network traffic and an overview of what is going on in the network and the infrastructure • „Drill-down“ to the level of individual communications, a record of everything that has happened 9.10.2012 FlowMon © INVEA-TECH 2012
  • 12. 12/18 Use Cases • 10% of users typically generate 90% of the traffic – who are they? • How are individual services utilized and when are peaks? 9.10.2012 FlowMon © INVEA-TECH 2012
  • 13. 13/18 Use Cases • Maleware activities  84% of PCs has an antivirus  31% of PCs is infected by malware • Rogue DNS servers 9.10.2012 FlowMon © INVEA-TECH 2012
  • 14. 14/18 Use Cases • Data Theft • Undesired applications and user activities 9.10.2012 FlowMon © INVEA-TECH 2012
  • 16. 16/18 Benefits for ISP • Long-term statistics storage about traffic • Network capacity planning • Connectivity optimization • Peering agreements optimization • Attacks, anomalies and suspicious behavior detection • Data retention law fulfillment • Accounting and billing based on traffic amount • Possibility to graphs and tables integration to your IS 23.10.2012 FlowMon © INVEA-TECH 2012
  • 17. 17/18 FlowMon Solution Advantages • Complete product portfolio for monitoring of all dimension networks • Flexible and scalable as you grow • Best price/performance ratio  low price of standard models  high performance of hardware-accelerated models • Unique customer benefits 23.10.2012 FlowMon © INVEA-TECH 2012
  • 18. 18/18 INVEA-TECH a.s. U Vodárny 2965/2 616 00 Brno Czech Republic www.invea-tech.com High-Speed Networking Technology Partner 23.10.2012 FlowMon © INVEA-TECH 2012 INVEA-TECH info@invea-tech.com +420 511 205 250 Thank you for your attention