I was working with an evaluator the other day who needed an example of how to use the Scrutinizer API to generate data and export it to a CSV file. Honestly, I knew how the API functioned, but didn’t have much experience using it. With that in mind and being the daredevil that I am, I figured this evaluator’s request would be the perfect opportunity to roll up my sleeves and get my hands dirty.
I was attending the 12th annual NC InfoSeCon conference back in October and in one of the presentations, the speaker mentioned Dark DDoS attacks. I found this part of the talk unbelievably interesting. Combine that with the recent fuel shortage here in NC and my mind started wandering with concerns over global digital terrorism and its part in the upcoming zombie apocalypse! Ok, maybe not to that degree, but I did decide to dig deeper into the methodologies behind these types of attacks.
I was having a conversation with a customer the other day about Amazon AWS monitoring. He had some interesting insight on his company’s overall migration to Amazon Web Service (AWS). He started with, “Here’s the core of it, cloud based deployment isn’t going away for us. Though there are no directives, by this time next year I’m expecting all but two of our public-facing applications to be sitting outside of our buildings.” He even went on to say, “There’s a very real possibility that within 2-3 years we decommission half of our computer rooms”. Needless to say, any application that they use for network visibility and incident response needs to support Amazon AWS monitoring. I loved his input and because of it I decided to dig deeper. Read more
Today I’m going to write about a company named Ecessa. If you haven’t heard of them before, they have a long history of building networking hardware for businesses. Since the inception of the company, one of their primary goals has been to ensure reliable and resilient Internet connectivity.
Malware Detection and determining the cause of an incident is a requirement in todays connected world. The post U.K. Parliament’s computers tried to access porn 247,000 times in 2015 is a great example. From first glance you get the impression that people at the Parliament have way too much time on their hands. When you dig a bit deeper we start to see that this the problem isn’t an HR issues but network security issue. The good news is that with the adoption of NetFlow collection and Flow Pro Defender Scrutinizer can monitor for malware. Read more
Face it—the information technology arena is an ever-changing monster and recent news about the increase with IoT vulnerabilities is no exception. A new technology can come around all of a sudden and change how we think and do things. Don’t get me wrong; it’s exciting and it’s what our world has been built on, but it’s also a little nerve-wracking. This becomes a bigger issue in the world of security, since newer technology tends not to be completely vetted. Read more
A good number of evaluators have been asking me what’s the best way to evaluate our free virtual Netflow collector. There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such a network. Windows has Hyper-V, which is part of the Windows Server OS, VMware has ESXi to, and KVM meet these virtualization needs. Plixer supports all three of these virtual environments with our Free virtual NetFlow collector, Scrutinizer. Installation of our solution is as simple as deploying the appropriate package to the specific hypervisor.
A little while ago we posted an article on F5 IPFIX Support. I wanted to follow up on that and dig a little deeper on how to configure your F5 to send IPFIX and IEs to a collector. Remember, IEs are individual fields in an IPFIX template. Under the F5 an IPFIX template describes a single Advanced Firewall Manager (AFM) event.
On top of that, it looks like F5 has also extend their IPFIX support and have added quite a few of new information elements or IEs. Make sure to check them out.
Are you building an incident response system? Does it include tools that allow for attack investigation and recovery? Earlier this year I wrote a three part series on constructing a Cyber Incident Response Plan and outlined two ways Scrutinizer can be an important part of this endeavor. After reading the latest BBC article on how Website-crippling cyber-attacks are to rise in 2016 , I figured that I would talk a bit more on how our Flow Analytic intelligence can assist with attack investigation and recovery. Read more
Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is a requirement. With Scrutinizer and the intelligence behind Flow Analytics it is easy to detect reconnaissance-style traffic patterns like UDP scans. UDP scanning is common both on the Internet and internally. A common use on the Internet is to ID servers that can be used for DrDoS (distributed reflection denial of service) attacks, as DoS works much better on UDP. Internally, it can be used to ID open ports on machines. Read more