Chapter 6 Analyzing Symptoms for Incident Response Flashcards
Tool developed to monitor LANs and operates at layers 1- 4 of the network stack
Operates a client-server model and uses monitoring devices (probes) to gather data
RMON
Gathers data about availability, routes, packets delay or loss, and bandwidth
Active monitoring
A tool that measures the maximum bandwidth that an IP network can handle
iPerf
- Relies on capturing information about the network as traffic passes a location on a network link
- ie network monitoring device connects to a span port on a switch meaning a copy of all traffic on the network is sent to this network monitoring device
Passive monitoring
Tool that combines four types of monitoring to provide a more accurate picture of bandwidth utilization
PRTG
What types of monitoring is utilized by PRTG ?
- Packet Sniffing
- Flows
- SNMP
- WMI
- Only monitors the headers of packets this is to determine what type of traffic is being sent
- An encrypted session may not reveal much
Packet Sniffing
Data that is sent with information about all connections or sample dataset
Flows
A protocol that allows network devices to send information about important events
SNMP
Provides an interface that allows script and application access for automation of administrative tasks, as well as a means of assessing management data for the operating system, and can provide reports to tools like system center operations manager for window systems
WMI
An open source tool that uses SNMP polling to poll network devices for status information and provides graphical views of network and device status
Cacti
- Activity sent to a control and command system as part of a botnet or malware remote control system and is typically sent as either HTTP or HTTPS
- Can request commands, provide status, download additional malware, or perform other actions.
Beaconing activity
Attacks that come from many systems or networks at the same time
Distributed denial-of-service (DDOS)
- Program doesn’t release memory after it no longer needs it
- Over time the application will consume more and more memory until the application fails or the OS runs out of available memory
Memory leaks
Provides an easy visibility into the CPU, memory, disc, and network utilization for a system
Resource monitor