Section 23.225 Network and Flow Analysis Flashcards

Objective 4.4 Explain security alerting and monitoring concepts and tools

1
Q

Full Packet Capture (FPC)

A

Captures entire packets, including headers and payloads

Takes up lots of storage space so you need to be selective at times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Flow Analysis

A

Focuses on recording metadata and statistics about network traffic, saving storage space

■ Doesn’t include the actual content, just the metadata

■ Rapidly generates visualisations to map network connections, traffic types and session volumes

Flow analysis rapidly generates visualisations to map network connections, traffic types and session volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Flow Collector

A

Records metadata and statistics about network traffic

■ Collects information about the following…
● Type of traffic
● Protocol used
● Data volume

■ Allows for efficient data storage and reduces processing overhead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Metadata vs. Contents

A

Flow analysis provides metadata about data, not the actual content

■ Metadata includes details about traffic types and volumes

■ No information about the content of conversations or messages sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Storage and Querying

A

Flow analysis information is stored in a database

■ Data can be queried and used to generate reports and graphs

■ Flow analysis identifies trends, patterns, and anomalies in network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NetFlow

A

Cisco-developed protocol for reporting network flow information

■ Also known as IPFIX (IP Flow Information Export)

■ Defines traffic flows based on shared characteristics (e.g., source and destination IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data collected by NetFlow

A

● Network protocol interface
● IP version and type
● Source and destination
● IP addresses
● Source and destination ports
● Type of service used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use of NetFlow Data

A

● NetFlow data is analyzed visually using various tools

● Tools like SolarWinds display NetFlow data, highlighting flows

● Data can be used to identify traffic patterns and anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zeek

A

Hybrid tool for network monitoring

■ Monitors traffic like NetFlow but logs full packet captures based on interest

■ Filters or signatures trigger full packet capture to analyze specific data

■ Normalises data for easy import into other tools for visualization and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MRTG (Multi Router Traffic Grapher)

A

Creates graphs displaying network traffic flows through routers and switches

■ Uses SNMP (Simple Network Management Protocol) to gather data

■ Helps identify traffic patterns and anomalies by visualizing data transfer volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analysing Traffic Spikes

A

Traffic spikes can indicate anomalies

■ Investigate the cause of traffic spikes

■ Spike analysis may reveal issues like malware infection or unauthorised data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Incident Investigation

A

Suspicious spikes may require setting up network sniffers

■ Analyze packet capture data and flow analysis to identify indicators of
compromise

■ Investigate further to understand the nature of anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly