Network Traffic Analysis
Last updated
Last updated
Network Traffic Analysis (NTA) is the process of examining network traffic to characterize common ports and protocols utilized.
Doing so we establish a baseline for our environment and can respond to threats, and insure the greatest possible insight for our network.
Collecting real-time traffic within the network to analyze upcoming threats.
Setting a baseline for day-to-day network communications.
Identifying and analyzing traffic from non-standard ports, suspicious hosts, and issues with network protocols. (HTTP, SMB, TCP, etc.)
Detecting malware on the wire. (ransomware, exploits, non-standard interactions)
Berkely Packet Filters is a technology that enables a raw interface to read and write from the Data-Link layer. More on this later.
Here is a side by side of the Open Systems Interconnect (OSI) model and the Transmission Control Protocol - Internet Protocol (TCP-IP) model side by side.
Protocol Data Units (PDU) is a data packet made up of control information and data encapsulated from each layer of the OSI model.
Common Traffic Analysis Tools
Tool
Description
tcpdump
Tshark
Wireshark
NGrep
tcpick
Network Taps
Networking Span Ports
Elastic Stack
SIEMS
is a command-line utility that, with the aid of LibPcap, captures and interprets network traffic from a network interface or capture file.
is a network packet analyzer much like TCPDump. It will capture packets from a live network or read and decode from a file. It is the command-line variant of Wireshark.
is a graphical network traffic analyzer. It captures and decodes frames off the wire and allows for an in-depth look into the environment. It can run many different dissectors against the traffic to characterize the protocols and applications and provide insight into what is happening.
is a pattern-matching tool built to serve a similar function as grep for Linux distributions. The big difference is that it works with network traffic packets. NGrep understands how to read live traffic or traffic from a PCAP file and utilize regex expressions and BPF syntax. This tool shines best when used to debug traffic from protocols like HTTP and FTP.
is a command-line packet sniffer that specializes in tracking and reassembling TCP streams. The functionality to read a stream and reassemble it back to a file with tcpick is excellent.
Taps (, ) are devices capable of taking copies of network traffic and sending them to another place for analysis. These can be in-line or out of band. They can actively capture and analyze the traffic directly or passively by putting the original packet back on the wire as if nothing had changed.
are a way to copy frames from layer two or three networking devices during egress or ingress processing and send them to a collection point. Often a port is mirrored to send those copies to a log server.
The is a culmination of tools that can take data from many sources, ingest the data, and visualize it, to enable searching and analysis of it.
SIEMS
(such as ) are a central point in which data is analyzed and visualized. Alerting, forensic analysis, and day-to-day checks against the traffic are all use cases for a SIEM.