SlideShare a Scribd company logo
Pavel Minařík
What is hidden in network traffic?
Security Session 2015, 11th April 2015, Brno, FIT VUT
minarik@invea.com
• Traditional monitoring
 Availability of services and network components
 SNMP polling (interfaces, resources)
 100+ tools and solutions on commercial and open
sources basis (Cacti, Zabbix, Nagios, …)
• Next-generation monitoring
 Traffic visibility on various network layers
 Detection of security and operational issues
 Network/Application performance monitoring
 Full packet capture for troubleshooting
Monitoring Tools
Monitoring Tools
SNMP
polling
Flow
monitoring
Packet capture
and analysis
Flow Monitoring Principle
Performance Monitoring
Syn
Syn,
Ack
Ack
RTT
TCP handshake
Req
Ack Data
Client request
SRT
Server response
Data Data Data
Delay
Round Trip Time – delay introduced by network
Server Response Time – delay introduced by server/application
Delay (min, max, avg, deviation) – delays between packets
Jitter (min, max, avg, deviation) – variance of delays between packets
Flow Standards
Cisco standard NetFlow v5
NetFlow v9
(Flexible NetFlow)
fixed format
only basic items available
no IPv6, MAC, VLANs, …
flexible format using templates
mandatory for current needs
provides IPv6, VLANs, MAC, …
Independent
IETF standard
IPFIX
(„NetFlow v10“)
the future of flow monitoring
more flexibility than NetFlow v9
Huawei NetStream same as original Cisco standard
NetFlow v9
Juniper jFlow similar to NetFlow v9
different timestamps
Flow Sources
• Enterprise-class network equipment
 Routers, switches, firewalls
• Mikrotik routers
 Popular and cost efficient hardware
• Flow Probes
 Dedicated appliances for flow export
• Trends
 Number of flow-enabled devices is growing
 L7 visibility, performance monitoring, …
Flow Gathering Schemes
Probe on a SPAN port Probe on a TAP Flows from switch/router
Pros • Accuracy
• Performance
• L2/L3/L4/L7 visibility
• Same as „on a SPAN“
• All packets captured
• Separates RX and TX
• Already available
• No additional HW
• Traffic on interfaces
Cons • May reach capacity limit
• No interface number
• Additional HW • Usually inaccurate
• Visibility L3/L4
• Performance impact
Facts • Fits most customers
• Limited SPANs number
• 2 monitoring ports • Always test before use
Use • Enterprise networks • ISP uplinks, DCs • Branch offices (MPLS, …)
Traffic Analysis (using flow)
• Bridges the gap left by endpoint and perimeter
security solutions
• Behavior based Anomaly Detection (NBA)
• Detection of security and operational issues
 Attacks on network services, network reconnaissance
 Infected devices and botnet C&C communication
 Anomalies of network protocols (DNS, DHCP, …)
 P2P traffic, TOR, on-line messengers, …
 DDoS attacks and vulnerable services
 Configuration issues
Full Packet Capture
• On-demand troubleshooting and forensic analysis
• How to get packet traces?
 Tcpdump – Linux/Unix environment
 Winpcap – Windows environment
 Probes – appliances with packet capture capability
 FPGA-based HW adapters – high speed networks
Packet Analysis
• Analysis of packet traces (PCAP files)
• Software tools (commercial + open source)
• Wireshark as de facto standards with large
community support
 Support of hundreds of protocols
 Powerful filters, statistics, reconstruction, etc.
Examples From the Real Life
Security issue
Troubleshooting
Security Issue
FlowMon © INVEA-TECH 2013
78 port scans?
DNS anomalies?
• Malware infected device in the internal network
Security Issue
Let’s see the scans first
Ok, users cannot access web
Are the DNS anomalies related?
Security Issue
Ok, which DNS is being used?
192.168.0.53? This is notebook!
How did this happen?
Security Issue
Let’s look for the details…
Laptop 192.168.0.53 is doing
DHCP server in the network
Security Issue
Malware infected device
Trying to redirect and bridge traffic
Probably to get sensitive data
• Gmail e-mail delivery issue
FlowMon Troubleshooting
We are not receiving e-mails from Gmail
And can’t figure it out
Can you try to help us and fix it?
FlowMon Troubleshooting
Using AS numbers it is possible to easily identify
corresponding network traffic and do the analysis
FlowMon Troubleshooting
All flows are 640B?
TCP flags are normal
This is not a network issue
We need to see the packets
Detailed visibility and drill down to flow level
helps to understand traffic characteristics
FlowMon Troubleshooting
Built-in packet capture capability enables to get full
packet traces when needed
FlowMon Troubleshooting
Ok, Gmail requests TLS 1.0
FlowMon Troubleshooting
And mail server does
not support that
Life Demo
Attack detection and analysis is real-time
Life Demo
• Use-case: directory traversal attack
 Flow-level visibility
 Automatic detection
 Packet capture and analysis
INVEA-TECH a.s.
U Vodárny 2965/2
616 00 Brno
Czech Republic
www.invea-tech.com
High-Speed Networking Technology Partner
Questions?
Pavel Minařík
minarik@invea.com
+420 733 713 703

More Related Content

PPTX
Network monitoring system
PDF
Network Situational Awareness with d00gle
PDF
HSB15 - Pavel Minarik - INVEATECH
PPTX
Network traffic analysis with cyber security
PDF
Network Forensics: Packet Analysis Using Wireshark
PPTX
network monitoring system ppt
PDF
Network Analysis Using Wireshark 1
PPTX
Network scanner
Network monitoring system
Network Situational Awareness with d00gle
HSB15 - Pavel Minarik - INVEATECH
Network traffic analysis with cyber security
Network Forensics: Packet Analysis Using Wireshark
network monitoring system ppt
Network Analysis Using Wireshark 1
Network scanner

What's hot (20)

PPTX
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
PPTX
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
PPTX
Network monitoring tools
PDF
Network Analysis Using Wireshark Jan 18- seminar
PPT
Wireshark Inroduction Li In
PPTX
Wireshark
PDF
Wireshark
PPT
Network management
PPTX
Network Monitoring Basics
PPTX
Network packet analysis -capture and Analysis
PDF
Snort alert signatures
PPT
Wireshark
PPTX
Wireshark network analysing software
PPT
Wireshark Basics
PPT
I ptable
PDF
Wireshark Traffic Analysis
PPT
Wireshark - presentation
PDF
1. Network Security Monitoring Rationale
PPTX
Network based file carving
PPT
Performance test
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Packet analyzing with wireshark-basic of packet analyzing - Episode_02
Network monitoring tools
Network Analysis Using Wireshark Jan 18- seminar
Wireshark Inroduction Li In
Wireshark
Wireshark
Network management
Network Monitoring Basics
Network packet analysis -capture and Analysis
Snort alert signatures
Wireshark
Wireshark network analysing software
Wireshark Basics
I ptable
Wireshark Traffic Analysis
Wireshark - presentation
1. Network Security Monitoring Rationale
Network based file carving
Performance test
Ad

Similar to Co se skrývá v datovém provozu? - Pavel Minařík (20)

PDF
Network State Awareness & Troubleshooting
PPT
network-management Web base.ppt
PPTX
Open source network forensics and advanced pcap analysis
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PPTX
I2O Solutions - HDN Network Security Solution
PDF
Network Analysis Mini Project 2.pdf
PPTX
Network Analysis Mini Project 2.pptx
PDF
Kentik Network@Scale (Dan Ellis)
PPTX
Packet Analysis - Course Technology Computing Conference
PPTX
Tune Up Your Network for the New Year
PPTX
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
PDF
Tutorial: Network State Awareness Troubleshooting
PPTX
How to Hack a Telecom and Stay Alive
PDF
Sergey Gordeychik - How to hack a telecom and stay alive
PDF
How to hack a telecom and stay alive
PDF
Security Delivery Platform: Best practices
PPTX
How to hack a telecommunication company and stay alive. Sergey Gordeychik
PPTX
SDN_and_NFV_technologies_in_IoT_Networks
PPTX
IP Signal Distribution
PPTX
OSI Model.pptx
Network State Awareness & Troubleshooting
network-management Web base.ppt
Open source network forensics and advanced pcap analysis
cyber forensics-enum,sniffing,malware threat.ppt
I2O Solutions - HDN Network Security Solution
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pptx
Kentik Network@Scale (Dan Ellis)
Packet Analysis - Course Technology Computing Conference
Tune Up Your Network for the New Year
The Network Knows—Avi Freedman, CEO & Co-Founder of Kentik
Tutorial: Network State Awareness Troubleshooting
How to Hack a Telecom and Stay Alive
Sergey Gordeychik - How to hack a telecom and stay alive
How to hack a telecom and stay alive
Security Delivery Platform: Best practices
How to hack a telecommunication company and stay alive. Sergey Gordeychik
SDN_and_NFV_technologies_in_IoT_Networks
IP Signal Distribution
OSI Model.pptx
Ad

More from Security Session (20)

PDF
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
PDF
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
PDF
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
PDF
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
PDF
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
PDF
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
PDF
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
PPTX
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
PDF
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
PDF
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
ODP
Prezentace brno
PDF
OSINT and beyond
PDF
Exploitace – od minulosti po současnost - Jan Kopecký
PDF
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
PDF
Research in Liveness Detection - Martin Drahanský
PPT
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
ODP
Turris - Robert Šefr
PPTX
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
PDF
Two Years with botnet Asprox - Michal Ambrož
PPTX
Falsifikace biometricke charakteristiky a detekce zivosti
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Prezentace brno
OSINT and beyond
Exploitace – od minulosti po současnost - Jan Kopecký
Kontrola uživatelských účtů ve Windows a jak ji obejít - Martin Dráb
Research in Liveness Detection - Martin Drahanský
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Turris - Robert Šefr
Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský
Two Years with botnet Asprox - Michal Ambrož
Falsifikace biometricke charakteristiky a detekce zivosti

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing

Co se skrývá v datovém provozu? - Pavel Minařík

  • 1. Pavel Minařík What is hidden in network traffic? Security Session 2015, 11th April 2015, Brno, FIT VUT minarik@invea.com
  • 2. • Traditional monitoring  Availability of services and network components  SNMP polling (interfaces, resources)  100+ tools and solutions on commercial and open sources basis (Cacti, Zabbix, Nagios, …) • Next-generation monitoring  Traffic visibility on various network layers  Detection of security and operational issues  Network/Application performance monitoring  Full packet capture for troubleshooting Monitoring Tools
  • 5. Performance Monitoring Syn Syn, Ack Ack RTT TCP handshake Req Ack Data Client request SRT Server response Data Data Data Delay Round Trip Time – delay introduced by network Server Response Time – delay introduced by server/application Delay (min, max, avg, deviation) – delays between packets Jitter (min, max, avg, deviation) – variance of delays between packets
  • 6. Flow Standards Cisco standard NetFlow v5 NetFlow v9 (Flexible NetFlow) fixed format only basic items available no IPv6, MAC, VLANs, … flexible format using templates mandatory for current needs provides IPv6, VLANs, MAC, … Independent IETF standard IPFIX („NetFlow v10“) the future of flow monitoring more flexibility than NetFlow v9 Huawei NetStream same as original Cisco standard NetFlow v9 Juniper jFlow similar to NetFlow v9 different timestamps
  • 7. Flow Sources • Enterprise-class network equipment  Routers, switches, firewalls • Mikrotik routers  Popular and cost efficient hardware • Flow Probes  Dedicated appliances for flow export • Trends  Number of flow-enabled devices is growing  L7 visibility, performance monitoring, …
  • 8. Flow Gathering Schemes Probe on a SPAN port Probe on a TAP Flows from switch/router Pros • Accuracy • Performance • L2/L3/L4/L7 visibility • Same as „on a SPAN“ • All packets captured • Separates RX and TX • Already available • No additional HW • Traffic on interfaces Cons • May reach capacity limit • No interface number • Additional HW • Usually inaccurate • Visibility L3/L4 • Performance impact Facts • Fits most customers • Limited SPANs number • 2 monitoring ports • Always test before use Use • Enterprise networks • ISP uplinks, DCs • Branch offices (MPLS, …)
  • 9. Traffic Analysis (using flow) • Bridges the gap left by endpoint and perimeter security solutions • Behavior based Anomaly Detection (NBA) • Detection of security and operational issues  Attacks on network services, network reconnaissance  Infected devices and botnet C&C communication  Anomalies of network protocols (DNS, DHCP, …)  P2P traffic, TOR, on-line messengers, …  DDoS attacks and vulnerable services  Configuration issues
  • 10. Full Packet Capture • On-demand troubleshooting and forensic analysis • How to get packet traces?  Tcpdump – Linux/Unix environment  Winpcap – Windows environment  Probes – appliances with packet capture capability  FPGA-based HW adapters – high speed networks
  • 11. Packet Analysis • Analysis of packet traces (PCAP files) • Software tools (commercial + open source) • Wireshark as de facto standards with large community support  Support of hundreds of protocols  Powerful filters, statistics, reconstruction, etc.
  • 12. Examples From the Real Life Security issue Troubleshooting
  • 13. Security Issue FlowMon © INVEA-TECH 2013 78 port scans? DNS anomalies? • Malware infected device in the internal network
  • 14. Security Issue Let’s see the scans first Ok, users cannot access web Are the DNS anomalies related?
  • 15. Security Issue Ok, which DNS is being used? 192.168.0.53? This is notebook! How did this happen?
  • 16. Security Issue Let’s look for the details… Laptop 192.168.0.53 is doing DHCP server in the network
  • 17. Security Issue Malware infected device Trying to redirect and bridge traffic Probably to get sensitive data
  • 18. • Gmail e-mail delivery issue FlowMon Troubleshooting We are not receiving e-mails from Gmail And can’t figure it out Can you try to help us and fix it?
  • 19. FlowMon Troubleshooting Using AS numbers it is possible to easily identify corresponding network traffic and do the analysis
  • 20. FlowMon Troubleshooting All flows are 640B? TCP flags are normal This is not a network issue We need to see the packets Detailed visibility and drill down to flow level helps to understand traffic characteristics
  • 21. FlowMon Troubleshooting Built-in packet capture capability enables to get full packet traces when needed
  • 23. FlowMon Troubleshooting And mail server does not support that
  • 24. Life Demo Attack detection and analysis is real-time
  • 25. Life Demo • Use-case: directory traversal attack  Flow-level visibility  Automatic detection  Packet capture and analysis
  • 26. INVEA-TECH a.s. U Vodárny 2965/2 616 00 Brno Czech Republic www.invea-tech.com High-Speed Networking Technology Partner Questions? Pavel Minařík minarik@invea.com +420 733 713 703