menu
FlowTraq > Resources > Whitepapers and Tip Sheets > You Have the Data You Need to Tighten Up Enterprise Security – But Are You Making the Most of it?

You Have the Data You Need to Tighten Up Enterprise Security – But Are You Making the Most of it?

Gurdev Sethi
By | March 19, 2015


Facebooktwitterlinkedin

Think of flow data as the “blood” that runs through your network. Like high white blood cell counts, high cholesterol and low platelet counts, flow data has its own set of criteria that indicate potential risks to your network health. These include traffic surges, unrecognizable IP addresses and other network anomalies. Whether you are using NetFlow, jFlow, sFlow or cFlow, you have valuable information that could provide you with visibility to shore up your network security. However, without the right tools to analyze your flow data, there’s no way of quickly knowing when your network is at risk and what it’s at risk from.

What information does flow data provide?

Flow data provides granular insight into your network that can help you diagnose a potential problem. With the right tools, a network administrator can determine the source and destination of network traffic, prominent peering relationships, and common bottlenecks. Specifically, flow records contain information about:

  • Source IP address: who is originating the traffic
  • Destination IP address: who is receiving the traffic
  • Ports: the application utilizing the traffic
  • Class of service: the priority of the traffic
  • Device interface: how the traffic is being used by the network device
  • Tallied packets and bytes: the amount of traffic
  • And more: including packet timestamps

Most network operators use the data for performance monitoring and to understand who is using your network resources, what they’re using it for, where they’re using it, when they’re using it, and how they’re using it.

How does flow data improve security?

By analyzing flow data, network and security operations personnel can flag unfamiliar IP addresses (or IP addresses known to host malware), analyze distributed denial of service (DDoS) attacks, identify potential worms and botnets, track unusual data traffic patterns, find non-compliant users, and give you a detailed audit trail of all network activity. Flow analysis can also help you pinpoint unwanted data exfiltrations, identify causes of slowdowns, and spot where attacks or information leaks are coming from.

Botnet protection

Once you learn your organization’s typical network patterns, you can use your flow data to help detect network anomalies that often indicate botnets, rogue servers, unauthorized clients, or other network threats.

DDoS and brute force attack defense

A significant traffic surge can indicate a potential DDoS or brute force attack, two of the most common network threats around. DDoS attacks can make your websites, email, or other applications unavailable to your customers or employees, while a successful brute force attack allows a perpetrator, virus, or worm to penetrate your network with compromised credentials. By regularly analyzing your flow traffic you can recognize these types of malicious threats in real-time so you can immediately react to them and select the appropriate defense.

Worms, scans, and network reconnaissance prevention

Worms propagate through your network by rapidly looking for hosts with common vulnerabilities and exploiting those weaknesses to spread throughout your network. By using flow data, this scanning behavior can be easily identified when several internal systems show the same bad pattern in rapid succession. This is a very common reconnaissance technique used by attackers, and can serve as an early warning for other more malicious attacks to come. Flow data can help you catch and control these incidents before they become a real problem.

Data exfiltration recognition

You may already spend time and resources searching for viruses on computers, blocking spam, and tracking down abuse. But it’s not only worms and viruses that may be exfiltrating your most sensitive data, it could be anyone within your own walls. However, by monitoring flow data to detect anomalies, you can immediately recognize undesired uploads and data breaches from your network. This allows you to stop a leak before you face millions of dollars of cyber theft damages, lawsuits and public embarrassment, or before your CEO, CSO or CIO lose their jobs due to failed data security practices.

Data breach defense

To spot potential data leaks or information security breaches, you can analyze network flow records to quickly recognize hosts initiating a connection, receiving data outside of normal thresholds, or exhibiting unexpected network behavior patterns. With the proper tools, flow data analysis can help you keep sensitive information safe from outside intruders and unauthorized insiders.

Finding the right flow analysis tool

There are two different types of software tools that collect flow data: aggregators and full-fidelity collectors. Aggregators periodically generate a pre-configured set of reports on the records they’ve collected and store them temporarily, giving you general insight into network traffic patterns and a sense of how busy your network is. But full-fidelity flow collectors store every flow record in a database, which allows you to filter and view the traffic after the fact and in much more detail than aggregators. If you want to analyze unique traffic patterns, investigate never-before-seen attacks, and prepare your organization for sophisticated network attacks, you will need a full-fidelity flow collector. Full-fidelity collectors allow the skilled analyst to become truly effective at keeping the network safe and secure.

Download this tip sheet as a PDF

FlowTraq can help you make the most of your flow data. Try it for yourself – request a free 14-day trial.