Flowmon Ads Business Userguide en 2
Flowmon Ads Business Userguide en 2
Flowmon Ads Business Userguide en 2
00
User Guide
October 25, 2016
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Contents
1 Introduction 6
1.1 Features and capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Selected detection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Basics of application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4 Distributed architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.4.1 Architecture description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.4.2 Node types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3 Detection methods 33
3.1 Introduction to detection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.1.1 Common configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.1.2 Common features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
www.flowmon.com 2 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
www.flowmon.com 3 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
4 User interface 85
4.1 Basic controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.1.1 Main application menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.1.2 Status and information bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.1.3 Context menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.1.4 Search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
4.2 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4.2.2 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
www.flowmon.com 4 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
4.3 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.3.1 Aggregated view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
4.3.2 Simple list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
4.3.3 By hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
4.3.4 Event details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
4.3.5 Interactive event visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
4.3.6 Event evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
4.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.4.1 Chapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.4.2 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
4.4.3 Default report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
4.4.4 Scheduling reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
www.flowmon.com 5 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
1 Introduction
Flowmon ADS is a modern system for detection of anomalies and patterns of undesirable net-
work behavior, which is based on an analysis of data flows in the network (Flow). The main goal
of the solution is to increase external and internal security of a computer network. The main ad-
vantage over standard IDS systems lies in orientation on the overall behavior of the device on
a network, which enables to respond to yet unknown or specific threats for which the signature
is not available. Integrated dashboard displays a quick overview of the latest events and overall
statistics of events. This allows for immediate identification of problems or problematic devices in
the network.
• Introduction –the first chapter, which aims to familiarize users with the features and capa-
bilities of the Flowmon ADS plug-in
• Installation and configuration – the second chapter designed for system administrators is
dedicated to the installation and detailed configuration of the plug-in
• Detection methods – the third chapter exactly specifies the features of the application, part
of the chapter describes the best practices and interpretation of results
• User interface – the fourth chapter is intended for ordinary user working with the application
• Contact information – a summary of contacts for the vendor and distributor of the plug-in
• Support for NetFlow v5/v9, for IPFIX and for IPv4 and IPv6
• Building long-term behavioral profiles of devices on the network in terms of provided and
used services, traffic volumes and communication partners
• Predefined set of rules for detection of undesirable behavior patterns – operational issues,
attacks, unwanted services
www.flowmon.com 6 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• Predefined set of rules for detecting network anomalies such as behavior change of devices
on the network, discovering new network services, etc.
• Interactive visualization of events and relevant context in the form of directed graphs
• Complex filtering options and event prioritization linked to reporting and alerts
• Support for adding custom information about IP addresses (name, role, username. . . )
• Central user interface to use and manage more Flowmon ADS instances from single point
Detection of attacks:
www.flowmon.com 7 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• Internet Explorer
• Opera
• Google Chrome
www.flowmon.com 8 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• Safari
User interface is divided into three main parts. In the upper part of the application is the status
and information bar, on the left shows the application main menu, which you can hide if neces-
sary. The remaining area of the user interface is the user’s desktop, where you see the information
and functionality combined under the currently selected item in the main application menu.
Another means of controlling the application is a context menu available by right clicking on
relevant object.
www.flowmon.com 9 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Distributed architecture can be used for load balancing of the processing to more devices. The
processing nodes are working separately and using only flows on the given node. It is necessary to
have whole context for given network segment on single node to provide the maximal precision.
Distributed architecture allows the central management and configuration. The same configuration
is applied on each node. The node is separate hardware or virtual Flowmon instance with Flowmon
ADS application. The encrypted communication between nodes uses the SSH protocol. There has
to be same Flowmon ADS license on each processing node.
Master The node to manage the whole architecture. It provides user interface, collect and
store the events from all Slave nodes and allows to configure all nodes. The Master node generates
and sends the PDF reports, reports the events via e-mail, triggers the custom scripts and traffic
captures. Master node has to have a network access to the IP addresses of all Slave nodes, or to the
IP address of Proxy node, if present. There has to be just one Master node in the architecture.
Proxy The node to transmiss the information between Slave and Master nodes. Proxy node
does not provide the web user interface neither process the data. The Proxy node has to have
network access to the IP addresses of the Master node and all the Slave nodes. There can be more
Proxy nodes in the architecture, but this type of node is not required.
Slave The node to process the data. It requires the license for the processing database. This
node does not provide the web user interface. The Slave node is used to report the events using
syslog and SNMP as well. The Slave node has to have network access to the IP address of the Proxy
node (to the Master node if there is none Proxy node in the architecture).
www.flowmon.com 10 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Installation process will automatically apply Common company configuration template con-
figuration template to the application. Common used detection methods and parameters will be
activated by this process. There is also prepared one Flow data source for the first monitoring
port on the probe. This Flow source must be activated manually. Information about Flow source
configuration is described in chapter 2.3.10 Configuration of Flow data sources.
The Flowmon ADS application can be installed only on Flowmon probe/collector (please see
release notes for proper version numbers). The license is part of united Flowmon license. The
license has to be loaded using Flowmon Configuration Center.
1. Log into the plug-in –use the credentials used to log into Flowmon Configuration Center to
login. You can change your password and define other users through Flowmon Configura-
tion Center under System tab. More information on the management of user accounts can
be found in the Flowmon probe/collector documentation. The currently logged-in user can be
edited using the button with username in right upper corner.
2. Going through the configuration wizard – the welcome window with the link to configura-
tion wizard is shown after the first login into application (the wizard can be started using the
question mark icon from the Processing agenda as well).
The first step of the configuration wizard is applying the configuration template. The template
creates the basic IP range filters ans sets default values to the detection method parameters.
www.flowmon.com 11 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
It is possible to extend the LAN filtr based on private IP ranges of the public IP addresses of
the monitored network segment, define specific devices in the network (e.g. DNS servers), set
the size of the monitored network and allow the use of external services (blacklist downloads)
in next steps. All set values are used for relevant detection method parameters.
3. Configuring the Flow data sources – in subsection Processing\Flow sources set up partic-
ular sources of Flow data that will be processed by the application. From the aspect of data
collection the applications works like a collector capable to receive data in the NetFlow v5/v9
format. For each source:
Parameter Delete data after is used to set deleting old data. It is useful for archiving events
for later analysis. The value Never sets data lifetime to infinity while After default period sets the
default values (event – 183 days).
Number of days for which the data for the overview graph are being stored can be set by Days
to keep overview chart data parameter.
The Flowmon ADS allows to raise the performance using the SuperFast ™ mode. Using this op-
tion is recommended only for huge networks that generates more than 1000 flows per second. The
activation of the SuperFast ™ mode on smaller networks could cause the slowdown of the applica-
tion. It is necessary to limit the maximal amount of memory that can be used by the SuperFast ™
mode, too.
The Filter booster parameter is appropriate to activate if and only if there are some filters with
many IP ranges defined in the Flowmon ADS application (e.g. using wildcards). The activation can
cause lack of performance otherwise.
www.flowmon.com 12 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The Attach flows and Flow template parameters allows to activate saving the flow sample to
single events and the selection of fields to be saved. These samples can be attached to some types
of e-mail reports.
The admin user can lock some configurations (Reports, Settings\User preferences and Pro-
cessing\Event reporting) for non-admin users using the Lock configuration for non-admin
users option.
Access to external services (Internet services) might be allowed or denied using External ser-
vices option. If internet access is denied then geolocation services, whois service or detection
methods depending on external sources are unavailable. For details, see information on the vari-
ous detection methods.
The application uses all available CPUs. Parameter Maximal count of computational threads
allows limiting the number of CPU cores, which application can utilize.
The application allows resolving event source IP address immediately after event detection. This
function enables to determine the identity of the event source associated with a short IP address
using DHCP. IP addresses which should be resolved are defined by Capture source hostname.
In the configuration section, functions for the management of device configuration are available.
All user data can be deleted anytime (Clean-up all data) or you can bring a device into the
factory setting (Reset to factory defaults), which also includes deleting all user data. User data
include all events. More information on managing the plug-in can be found in the Flowmon probe/-
collector documentation.
The application stores resolved DNS names for a short time period. It can be deleted using the
www.flowmon.com 13 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
To simplify the configuration of devices there are pre-defined templates for plug-in settings
available (Apply configuration template). Templates include configuration of Flow data filters,
individual detection techniques and perspectives setting. Application of template can be enforced
(Force), which means that the current setting which is in conflict with the selected template is
overwritten. There are currently following templates:
• Common company configuration template – template designed for small and medium-
sized organizations. Filter settings include commonly used private addresses (10.0.0.0/8,
172.16.0.0/12, 192.168.0.0/16). Activated detection methods and their settings correspond to
the typical security needs of small and medium sized organizations. Automatic anomaly de-
tection system is not activated network-wide; it must be activated afterwards on selected
portion of the network. Within the perspective settings the highest priority is given to events
that might indicate an attack or a serious breach of network security.
• Large company configuration template – template designed for large enterprises. Filter
settings include commonly used private addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Ac-
tivated detection methods and their settings correspond to the typical security needs of large
sized organizations. Automatic anomaly detection system is not activated network-wide; it
must be activated afterwards on selected portion of the network. Within the perspective set-
tings the highest priority is given to events that might indicate an attack or a serious breach
of network security.
• Internet service provider trunk template – template designed for large backbone net-
works. Filters are not part of the template. Activated detection methods and their settings
correspond to the typical security needs of ISP networks focused on massive attacks and
anomalies in the network.
It is possible to save current application configuration and restore if needed. Application con-
figuration is not portable between application versions. Configuration can be downloaded or up-
loaded back to the system using the Flowmon Configuration Center\System\Maintenance.
www.flowmon.com 14 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Flowmon ADS allows to display configuration changes, that were done by individual users.
Changes are shown in a tree form and sorted by username and date when the change was made.
The changes could be searched using the search criteria filter.
Flowmon ADS application allows admins to limit the data, that can be viewed by some non-
admin users. To limit the events, that can be shown to the given non-admin user, it is possible to
assign the perspective to each of these users. The user can view only the events, that are defined
in the perspective, and the method instance configuration appropriate to these events.
The perspectives can be defined using the simplified interface. It is enough to select the Flow
source, the IP address filter and to assign the priorities to the event types. The selected source and
filter is then assigned to each defined priority (the filter is assigned twice to each priority – once as
source filter and once as target filter).
www.flowmon.com 15 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
– Assigned filters
* User can see only filters assigned to him. He cannot edit them.
* Filter assigned to the user limits the content of displayed report chapters.
– Assigned perspectives
* User can see only perspectives assigned to him. He cannot edit them.
* User can see only the methods (and relevant events) that are defined by the perspec-
tives assigned to him.
* User can see only these e-mail reports, that are connected to perspectives assigned
to him.
* User can see only Flow sources connected to priorities in perspectives assigned to
him.
* Perspective assigned to the user limits the content of displayed report chapters.
* User without assigned perspective can see all Flow sources (including relevant events
and overview charts).
* User with assigned perspective with some priority defined as independent on Flow
source can see all Flow sources (including relevant overview charts, but events are
limited by the perspective).
www.flowmon.com 16 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
– Processing \Event reporting: E-mail reports (adding new reports for some perspective
assigned to him, viewing and editing reports owned by him)
– Processing \Event reporting: Custom scripts (adding new reports for some perspective
assigned to him, viewing and editing reports owned by him)
– Processing \Event reporting: Traffic recording (adding new captures for some per-
spective assigned to him, viewing and editing captures owned by him)
– Settings \User preferences
– User can see the report if he is the owner of the report, or the report is public and he can
see at least one of its chapters (the report is generated only with the allowed chapters).
– User can see the chapter (the chapter is allowed to him), if:
Events by priority The filter and perspective that are set have to have the non-empty
intersubsection with the filters and perspectives assigned to the user
Event matrix The filter and perspective that are set have to have the non-empty inter-
subsection with the filters and perspectives assigned to the user
Overall status The perspective that is set has to have the non-empty intersubsection
with the perspectives assigned to the user.
Events count by type The perspective that is set has to have the non-empty intersub-
section with the perspectives assigned to the user.
– User can create new reports from allowed chapters. He become the owner of the report.
– User can edit and delete the reports owned by him.
– User can define scheduled reporting on reports he can see.
– User can edit and delete the scheduled reports owned by him.
• Viewing the threats (since Flowmon ADS version 6.06) by non-admin users
www.flowmon.com 17 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
– User can see the threats, that consist only from particular events, which can be seen by
the user according to the perspectives assigned to him.
– User can see only the threat methods configuration that are based on at least one de-
tection method, which can be seen by the user according to the perspectives assigned to
him.
• Universal facts
In case, that there are services provided on unconventional ports in the monitored network, it
is appropriate to add this assignment (port number-service name) to the Named services list. This
assignment is used in event details of DOS and SRVNA detection method. If the assignment is
relevant only for some subnet, it is appropriate to use the IP address field or the Filter field to make
the assignment more specific.
Flowmon ADS can be connected to the LDAP/Active Directory database. This connection could
be used to get additional information to IP addresses from monitored network. This information
can be get using IP tools from context menu over the given IP address.
It is necessary to properly configure the address of the LDAP/AD server, username and pass-
word used for authentication (it is necessary to upload the .pem certificate file of the certificate
authority that signs the servers certificate), search base, name of the field, that contains the IP
address and the specification if the server is Active Directory server or not.
www.flowmon.com 18 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
It is possible to get additional info about IP addresses using any available web services. Defined
services can be invoked using context menu over an IP address. New tab on the current page is
opened after querying. The query is an URL address. In this URL should be used an $IP variable
that is replaced by the given IP address.
It is possible to use an $MAC instead of $IP variable. That web service can be applied on the MAC
address in the Event evidence view.
User can set own parameters of user interface. It is possible to turn on/off the showing the
welcome screen window and disabling the automatic load of the dashboard tables. Next, it is pos-
sible to hide the inactive methods from the search criteria filters. Each user can set the default scale
(logarithmic/linear) for the Dashboard:Overview view and the default Flow source and perspective
that will be used in search criteria.
Flow data sources represent individual monitored points of the network and are one of the
licensing restrictions (number of simultaneously active Flow data sources). For each monitored
point of the network a Flow data source must be created in the plug-in. Configuration of data
source includes:
Location Node of the distributed architecture to run the flow source. It should be set to localhost,
if the distributed architecture is turned off.
www.flowmon.com 19 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Channels Channel selection which are used as input data for application.
Deduplicate If active, the uniqueness of the Flow received by one Flow source is guaranteed.
Check timestamps If active, the Flow with timestamp that differs more than 30 minutes from
system clock are deleted.
SIP processing The switch between the Flow data processing and processing of Flow data en-
hanced with the SIP entries. It is impossible to process both (Flow data with SIP entries and
Flow data without SIP entries) on the single Flow source together. Only the detection methods
with "SIP" prefix are used if the SIP processing is active.
Proxy active performs the replacement of two flows client-proxy and proxy-server by one flow
client-server. This correlation allows the functioning of some methods that would not be able
to detect events correctly in the network with proxy to work properly. Within the method
configuration it is possible to set up the tolerated data amount difference between the two
particular flows that have to be correlated (Tolerance) and the counts of milliseconds that
could take the flows outer the proxy longer (Request Overload, Response Overload). The
correlation has got high accuracy and coverage but it is not absolute.
The correlation of flows before and behind the proxy is possible only if the network is moni-
tored at two points – inside the network behind the proxy server and outside the proxy server.
It is necessary to set up the IP addresses of outer (External IP) and inner (Internal IP) inter-
faces and the proxy server’s listening port (Internal Port). For reducing false positives, the
proxy clients (Clients Filter) can be specified. It is possible to define more proxy servers for
each Flow source. The maximum count is limited by license.
Channels as virtual sources It is possible to activate so called Virtual sources for Flow sources.
These virtual sources are dedicated to isolate Flow data from individual channels of the input
profile. These virtual sources allows the channels to be assigned to the instances of detection
methods and to the priorities. Data from different channels are processed separately from
each other if active.
For example: An ISP can create virtual sources per ASN groups and analyse traffic anomalies
for every group separatelly. Just create new profile with channels for every ASN group, assign
the profile to ADS flow source, select all channels and activate virtual sources.
The Flow sources use (since the 6.04 version) directly the profiles on the collector (or on the built-in
collector of the probe), so it is not necessary to forward the data to next target. The Flow sources
www.flowmon.com 20 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
can be used on any real profile, so the input data can be filtered on collector level. This leads to
decrease the load of the Flowmon ADS application. The Flowmon ADS Flow sources support the
NetFlow v5, v9 and the IPFIX protocol.
Details on configuring the exporters can be found in Flowmon probe documentation. The gran-
ularity of flows impacts the accuracy of detection methods. To reduce the number of flows that are
generated by the probe following values are appropriate:
• inactive timeout – 30 s
Correct settings of Flow data sources and the logical network topology affects the results of the
detection methods and the overall plug-in predicative capability. The basic distinguishable entity in
the plug-in is the IP address. When the occurrence of an event is detected, the event is bound to
an IP address that caused it and to Flow data source on which the event has been detected. That
implies a number of limitations when IP addresses are dynamically allocated and stable allocation
of identical IP addresses to each network device is not guaranteed. In such case it is not possible
to derive a direct responsibility of particular user for the event detected in the network.
Filters are named logical groupings of arbitrary IP addresses. Each filter has a unique name,
can be linked to the defined Flow data sources and includes any number of IP address ranges.
Filters are also used by detection methods for limiting the range of the addresses relevant for each
detection method. Binding to Flow data sources can further reduce the processing of Flow data in
the detection method (see example later in this subsection).
The filters can be of two types – atomic (the Atomic tab) and relational (the Relations tab).
Atomic filters are such filters, that are defined and stored directly as an IP address ranges (see
below for possible formats). The relational filters are defined as relations over other filters (the
relation can be union/difference of more filters or inversion of the single filter and combinations).
Relational filters are stored just as a relation definition, in case the partial filter is changed, the
relevant relational filter is changed as well. See 2.3.11 for more details.
www.flowmon.com 21 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• Single IP address for IP version 4 and 6 (e.g. 192.168.2.1, 2001:db8::beef) or comma separated
list of single IP addresses
• Wildcards notation of IPv4 addresses (enumeration, range, all), only single wildcard can be
used in one IP address. Examples:
It is possible to use Import button and the Import filters tab for import filter definitions from
the text file. Format of the file is one filter definition per line where IP address definition is in the
first column, Name of the filter is in the second column. Columns are separated by semicolon. IP
address can be specified in the same ways as manual filter defining. If the name of the filter already
exists in the application, you will be noticed and the import fails.
If the checkbox Overwrite and skip problematic is checked then the IP ranges of the filters
with same name as in the uploaded file are overwritten by new ones that are given in the file. The
filter will be skipped if the relational filter would be overwritten.
192.168.1.0/24;LAN
192.168.10.0-192.168.10.25;LAN
192.168.1.1;SMTP
Figure 3: Example of filter definition file
It is possible to add own information from CSV text file by using Import IP information tab.
This additional information can be viewed using the IP detail containing data from whois and so
on. Remember, the import deletes all previous information! Following fields are supported:
www.flowmon.com 22 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
ip;host;role;username;os;hwconfig
192.168.1.1;stone.foo.com;LAN gateway;;CentOS 5.5;
192.168.1.33;pc33.foo.com;client-station;Johny;WindowsXP;VM
Figure 4: Example of the content of the file to import information about IP addresses
The text file consists of a header and records. The header contains of list of fields separated by
a semicolon. It must include required field ip and at least one optional (host, username, os, hw-
config, role, notes). Each record is on a single line. The fields are separated by a semicolon. Empty
lines are ignored. More records can be added to one IP address.
The Relations tab can be used to define the relational filters. Adding new relation can be done
by Add new filter relation. The dialog window allows to define the relations as a filter union
(operation Add) or filter subtraction (operation Subtract). The operation can be combined with
inversion of the given filter. Using the Atomize option can be the created filter stored as the atomic
one (the IP address ranges are stored instead of the relation definition).
www.flowmon.com 23 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The relation filters can be edited, atomized or deleted using the relevant buttons. It is possible
to show the dependencies on given filter.
Detection methods are predefined by the manufacturer and used to detect various potentially
undesirable activities on the network. Thus they build the core of Flowmon ADS plug-in. The
various methods are described in detail in the third chapter.
• activation/deactivation of a method
• specific configuration (methods may have specific configuration parameters that can be set
or actions that can be performed)
Depending on the method nature some of the above options can be inactive. For example system
methods (e.g. event reporting) cannot be turned off nor assigned with filters. All configuration
changes will take effect immediately upon next batch of Flow data processing by given method.
Aggregation of events merges some events into groups and allows to define patterns of larger
attacks which consist of several sub-events. Individual aggregations of events can be activated or
deactivate. Parameter Window sets maximum time in seconds between two separate events.
In the Flowmon ADS plug-in you can create your own event perspectives that will assign events
with priorities according to their type, the network segment where they occurred (based on the
www.flowmon.com 24 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
filter) and to the Flow source, that provides Flow data used for event detection. Priority can be
assigned to all sources by keeping default value NONE in the selection of the source. These per-
spectives can then be used when reporting events, alerting or searching in the application UI. Each
perspective is a uniquely named group of assigned priorities to events of given type (i.e. to events
generated by given detection method), and thus either network-wide or depending on the filter.
• CRITICAL
• HIGH
• MEDIUM
• LOW
• INFORMATION
The predefined perspectives can be generated using the Create default perspectives button
(the icon with the star).
In subsection Event categories you can define your own event categories into which you
can then assign events through Manage event categories context menu item. In this way you
can mark interesting events that should be further explored; marks can be used in subsequent
searches.
Detected events can be marked as false positives through Mark as false positive context menu
item. This mark means that the event of given type caused by given IP address will no longer be
www.flowmon.com 25 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
reported. Validity of marking an event as false positive can be limited to individual days of the
week, time intervals and the Flow source. The validity of marking an event can be limited only to
the targets of the current event as well. If there is a limitation by the targets of the events, it is
possible to ignore the event source. The event source or event targets relevant to the rule can be
defined by filter as well. It is recommended to use these filters to define the restrictions based on
event source and event target IP addresses because of the limitations on the false positive number.
It is possible to send an e-mail about the false positive event to the Flowmon Networks com-
pany. The e-mail will consist from event details data, Flow entries that are related to the event,
application model and version and from the customer’s name. That data will be used to enhance
the performance of the application. The data will be processed in accordance with the law on
personal data protection.
The false positive rule can be defined by weekday choice. The events can be ignored during
the whole day or within the interval specified by the event time and by the radius of the interval in
minutes. The rule has to be connected to event source or to some (or all) event targets. It can be
set the validity and the comment to the rule.
It is possible to define the false positive rule without respect to the event on which was was this
dialog window opened. It is possible to manually choose the detection methods, enter the source
and target IP addresses and enter the time range. The rule is always created for each combination
of detection methods and source IP address, the targets are all assigned to each rule.
IP addresses can be entered as comma separated list. When entering the IPv4 address, one
of its fields can be written using wildcard. This wildcard can represent the numbers enumeration
(comma separated list enclosed in curly braces), range of two numbers (2 numbers separated by
dash enclosed in square brackets) or the asterisk that represents the 0-255 range.
Examples:
It is possible to delete all events corresponding to the false positive rule using the Delete false
positive events choice. This option is disabled if there is chosen some Flow source, some specific
targets (no matter what way), more event types or the event sources are defined by some filter.
www.flowmon.com 26 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Removal of rules for false positives marking is done in the Processing\False positives subsec-
tion. Removal of selected rules can be done through Delete selected.
It is possible to edit the comments of the false positives in this subsection, too.
E-mail reports
Flowmon ADS plug-in allows you to define regular reports which will be sent via e-mail by the
application.
Each e-mail report must be uniquely named and bound to just one perspective. A report has
active/inactive state. The inactive report is defined in the system but not sent regularly. The report
can be assigned with any number of recipient addresses by Add new mail. There is also an option
to suppress sending of an empty report (Prevent empty report – only daily and weekly reports can
be sent empty, if disabled) and option to set minimum priority of events to be reported (Minimal
priority to report). Reports are sent according to the following rules:
• CRITICAL – reporting immediately after the batch processing of Flow data, approximately
every 5 minutes, a blank report is never sent.
You can use the Same events gap parameter to suppress repetitive sending the same event in
the given report for the chosen time period. The events with same event type and event source are
considered as a same. Only one same event is reported in the long-term report (reports for priority
HIGH or lower) if set to non-zero value.
The Flowmon ADS application allows to sending e-mail reports in few formats.
1
Batch of e-mails in case the Mail per event format is used.
www.flowmon.com 27 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Summary reports The Full format sends the reports as a table formatted by HTML, the Com-
pact format sends the reports in plain text, the Extra compact format is also in plain text, but there
are some omitted information (e.g. event detail, event targets etc.) and the report is aggregated
with respect to the event code. All three types are summary reports. It reports all events for specific
time period and priority at once. The time period corresponds to priority rules above).
Separate event reports The Mail per event format sends in one e-mail only information
about single event and it is dedicated especially for automatic processing. It can generate a huge
number of e-mail reports (equal to count of evens). The number can be reduced using Same events
gap feature for filtering same events during the given time period. As other formats, the e-mail
event reports are sent according to priority rules above.
The RT e-mail format It is possible to send reports as a tickets to the ticketing systems. Nowa-
days, the RT ticketing system is supported. The format has to be set to RT value. This format
is adding three attributes into the e-mail header: X-RT-Tool-Name, X-RT-Incident-IP and X-RT-
Incident-Time. The first attribute is always set to the “Flowmon ADS - ” string concatenated with
the name of the event, the others have assigned their values with respect to the reported events.
There are all events with given type related to the one IP in the single e-mail/ticket for given time
period. The time period corresponds to priority rules above. The first event from the row is used
as a leader event. All corresponding events are listed in the Incident details.
If the Attach flows parameter in Storage settings section is activated, the Flow samples used
for event detection are attached to RT and Mail per event formatted reports.
It is possible to send reports using your own SMS gateway. Please contact the vendor, company
Flowmon Networks, a.s., in case you want to use this possibility.
www.flowmon.com 28 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Syslog
Application also supports event export in the Common Event Format (CEF) to the remote syslog
which can be configured in Event reporting subsection. The target syslog has to be configured
in the Flowmon Configuration Center. All events are exported according to selected perspective,
according to this perspective they may be assigned with a specific level (CRITICAL priority fits to the
alert severity). It is possible to extend the syslog message with the field that contains the unique
identifier of the event by setting the parameter EventId to the value “yes”. It is possible to activate
sending one syslog message for each event target (Divide by targets parameter). The count of
messages for single event is limited by the value of Max messages for one event parameter. The
last message for the given event contains the list of the remaining targets. Syslog messages are
sent using the daemon facility. If the Machine readable syslog parameter is active, the list of
tuples parameter:value is used as a format of the event detail for better parsing.
SNMP
Application supports exporting events using SNMP too. Events are generated as a SNMP traps
that are generated based on MIB file FLOWMON-ADS-MIB.txt (this file can be downloaded from the
authenticated subsection of www.flowmon.com pages). Except for the SNMP traps that report the
events there are also generated the SNMP traps of the number of processed flows per a batch and
of the time necessary for processing of the batch. It is necessary to configure the IP address and
the port number of the device, that is dedicated to receive the traps. Then it is required to choose
the perspective.
Custom scripts
The Flowmon ADS application allows to use own custom scripts for exporting the events (actually,
it can be any executable – e.g. in bash/sh, perl, python C, C++, . . . ). The script functions are lim-
ited only by the permissions given to the flowmon system user (this user is used for running the
executables). It is recommended to validate the executables by an administrator because of this.
www.flowmon.com 29 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The user scripts can affect the duration of the Flow data processing, therefore it is recommended
to make these scripts fast enough.
Launching of the custom scripts is driven by chosen perspective and minimal priority. The
scripts are launched immediately regardless the priority of the given event. Launching the scripts
for the same event can be suppressed for given time period.
The executables can be uploaded by the admin user using the Settings\Custom scripts view. Two
types of the scripts are defined – the script can process only single event (and is launched for each
event, the Call per event option, the count of launches per priority and flow source is limited by
the Limit) or the script can process all events with the same priority at once (launched up to five
times, the Call per priority option). The events are passed to standard input of the script (one
event per line).
• ID
• event timestamp
• event type
• type description
• perspective
• priority
• event detail
• port numbers
• protocol
• event source
• event targets
• Flow source
• user identity
www.flowmon.com 30 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
These fields are separated by a tab character. The empty field is replaced by a space character.
Additional parameters It is possible to define additional command line parameters for cus-
tom scripts. These parameters are used for passing suplementary information. The values of the
parameters can be set separately for single usages of the custom scripts. The parameters are op-
tional and have to be supported by the script. Parameters are passed as follows: ./script_name.sh
PARAM_1 ’VAL_1’ PARAM_2 ’VAL_2’ ... PARAM_n ’VAL_n’
The name of the parametru has to be nonempty, it can consist of alphanumerich characters,
dash or underscore. The parameters are passed every time in the same order, it is possible to
reference them by a position number.
Demo script The demo script is created after installation or after apply of the configuration
template. This script is used for sending event reports by e-mails. The script can be generated
on the page Settings\Custom scripts manually as well. It can be downloaded to read the code. It is
written as a Bash script. It can be used for Call per event even for Call per priority. The script is
using three parameters for passing e-mail address, e-mail body and e-mail subject. The parameters
are parsed using standard getopt function. E-mail reports are sent by Flowmon PHP CLI, the SMTP
configuration is get from the application configuration.
Traffic recording
It is possible to start automatic packet capture using the Flowmon Traffic Recorder (FTR, version
4.09.0 or higher is required) as a reaction to the generated events. The capture can be started on
remote device as well. Launching the capture is driven by the chosen perspective. The captures
are launched immediately for all events that are at least of the minimal priority. The number of
launched captures per priority and flow source is limited by the Limit parameter. PCAP files con-
taining captured traffic will be available using the detail view of relevant events. The capture is
stored for the time window defined by the Interception duration parameter.
www.flowmon.com 31 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The access to Flowmon device terminal is necessary to configure the distributed architecture.
The configuration requires advanced knowledge of UNIX-like systems. We recommend to contact
the Flowmon Networks support for configuration of the distributed architecture.
It is needed to set the SSH encryption keys on single nodes of the distributed architecture. The
key pair can be generated using ssh-keygen.
The generated private key has to be added to each node (e.g. using scp application). The files
has to have set permissions correctly:
The generated public key has to be added on each node to authorized keys of flowmon user:
Each node has to be configured separately using the /data/ads/KADS.cfg configuration file. If the
file is not present in the system or if each line in the file is commented, the distributed architecture
www.flowmon.com 32 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
is turned off. Documentation of the config file is given in the file itself using the comment strings.
3 Detection methods
Detection methods are the core of Flowmon ADS . They serve for detecting various potentially
undesirable activities on the network or to cumulate appropriate information (behavior profiles).
Detection methods are predefined by the manufacturer who guarantees their development and
expansion according to the current trends in the area of network services and security of computer
networks in particular. Detection methods can be imagined like signatures for IDS systems (e.g.
SNORT). Unlike signatures which represent particular strings to be searched in individual packets,
detection methods contain specific behavior patterns of network devices. Flowmon ADS uses the
principle of detection methods also for other tasks (e.g. event reporting etc).
• Common network behavior patterns – common network behavior patterns that generate
events always when processing the current batch of Flow data (typically every 5 minutes).
• Common behavior patterns for SIP traffic – common behavior patterns that are based on
SIP extensions. These methods works only with Flow sources with activated SIP processing.
• Advanced network behavior patterns – advanced network behavior patterns that detect
long term trends in network behavior based on continuous processing of Flow data.
• Derived behavior patterns – derived behavior patterns that generate characteristics of indi-
vidual devices. They do not directly depend on processing of the Flow data. Typically they use
the outputs of the above two detection method groups and are run periodically (every hour).
A typical duty cycle of the Flowmon ADS application includes performing of following steps:
1. Receiving and storage of Flow data – receiving of Flow data batch representing the actual
network traffic, typically every 5 minutes.
www.flowmon.com 33 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
2. Processing of Flow data batch – application of all active detection methods on given Flow
data batch which results in events generation and event reporting. Applications leverages
multi-threading to increase overall processing throughput.
Independently of the Flow data processing the application performs regularly every hour active
detection methods from General system procedures and Derived behavior patterns groups.
It is possible to create so called instances of the detection methods. Each instance represents
specific settings of the detection method and it should be connected to some Flow sources. The
count of instances is limited by the maximal number of Flow sources for each detection method.
Two types of actions are available for method settings – actions performed collectively on whole
group of instances and actions performed on single method instances.
www.flowmon.com 34 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• Adding new method instance – it creates new method instance with configuration along the
method configuration template. It is necessary to assign the method instance to some Flow
sources (New instance).
• Setting the time to store outputs – it sets the time period within which are the outputs of
the detection method stored in the system (Set Delete after parameter).
Actions for single method instances These actions are available in addition to events corre-
sponding to actions available for templates:
• Delete method instance – it removes the given method instance (Delete method instance).
• Perform action – some methods allows to call actions that are related with the given method.
This action could be for example deleting the learned classifier. The action is performed after
clicking the Perform action button.
• Assigning filters to the method instance – most methods may be restricted in terms of pro-
cessed traffic by assigning filters to them (Assign filters). This setting is reflected immediately,
precisely when processing the next batch of Flow data.
• Periodic deletion of events – all detection methods which generate events offer their peri-
odic deletion through a configuration option DeleteEventsAfter indicating the number of
days for which the events remain in application memory. Older events are automatically
deleted. When the option is set to value “0” events are never deleted.
www.flowmon.com 35 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• The method instance is always processing only the data from assigned Flow sources.
• Data from single Flow source are processed isolated, the classifiers based on these data are
also kept separately for each Flow source and each method instance.
• The assigned IP address filter restricts the data according the source or destination IP ad-
dresses (details follow).
• There is no need to use the IP filter, if all data from the current Flow source satisfies this filter.
• It is better not to use any filter instead of using the filter with all IP addresses.
www.flowmon.com 36 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network. Appropriate place for monitoring the traffic is the central switch.
Method parameters
LANFilter Name of the filter that defines the IP addresses used for devices inside the moni-
tored network.
ClosedSeason Count of days dedicated only for training the classifier based on IP addresses
of the devices. No events are generated during this time. If the value of the parameter is
equal to 0, the detection using the automatic classifier is disabled.
TimeToDeath Count of days during which is the inactive IP address stored in the list of the
classifier.
KnownSegment Name of the filter that defines just the IP addresses of the active devices in
the monitored network.
ClosedSeasonMAC Count of days dedicated only for training the classifier based on MAC
addresses of the devices. No events are generated during this time. If the value of the
parameter is equal to 0, the detection using the automatic classifier is disabled.
TimeToDeathMAC Count of days during which is the inactive MAC address stored in the list
of the classifier.
Interpretation of results This method is able to detect unknown (or forgotten) devices that are
connected to the monitored network.
www.flowmon.com 37 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
incidents detected by individual methods are compared. The event is generated in case of de-
tecting Bittorrent traffic by multiple methods. The option MinimalProbability allows you to
set the minimum number of methods, that have to detect the incident, in the form of percent-
ages. In this way, it is possible to detect almost any Bittorrent clients. Parameter LANFilter
enables the reduction of possible false positive by excluding internal network communication
from detection. Next parameters are MinSeeds and MinHighPorts allowing to set minimal
count of remote peer sources, where data are downloaded from, and minimal count of con-
nections on ports higher than 10240.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses excluded from communications on the LAN by the option
LANFilter. Appropriate place for monitoring the traffic is the Internet connection line.
Method parameters
LANFilter Name of the filter that defines the IP addresses in the monitored network. The
communication among these devices is ignored within this detection method for the
improvement of false positive ratio.
MinSeeds Minimal count of devices used as a source for the file download.
MinHighPorts Minimal count of connections on the ports greater than 10240.
MinimalProbability The probability of downloading using the BitTorrent service is evaluated
during the detection. The evaluation is based on the results of partial methods. The
parameter expresses the minimal probability to report the event.
Interpretation of results This method achieves very reliable results in detection of notorious P2P
downloaders. On the other hand, incidental and occasional use of P2P network may not be
detected, especially when strict mode is set on. Furthermore, this method may alert to spy-
ware infected devices, whose symptoms are often similar to the symptoms of P2P networks.
www.flowmon.com 38 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Inter-
net connection line. To update the list of IP addresses correctly it is necessary not to block
the communication of the device (probe/collector) to port 443 (HTTPS, standard secured web
traffic) on services.invea.com server.
Parametry metody
www.flowmon.com 39 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
P2PBotnetActivities Activate the premium blacklist to detect communication to the P2P bot-
net supernodes.
PhishingDomains Activate the premium blacklist to detect HTTP requests to phishing web-
domains.
BotnetDomains Activate the premium blacklist to detect HTTP requests to domains used for
botnet communication.
IgnorePorts List of ports, that will be ignored in the detection.
Interpretation of results This method uses the Flowmon Network blacklist service. If some of the
blacklisted IP addresses are marked as the event originator it’s probably a network attack on
the organization. If some of the organization IP addresses is the event originator it’s likely to
be part of botnet or infected with some form of malware.
Method parameters The parameters of this detection method are relevant to particular behavior
patterns which are downloaded from the services.invea.com. These parameters can vary in
time.
Assigned filter Filter is used for restricting source or destination IP addresses (this can differ based
on given behavior pattern).
www.flowmon.com 40 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Interpretation of results This method uses the behavior pattern database, interpretation of each
pattern can differ.
Method parameters
MinimalTransferDataU The threshold for minimal data amount sent by single IP address to
one country (in MiB).
MinimalTransferDataD The threshold for minimal data amount received by single IP ad-
dress from one country (in MiB).
MinQuota Minimal ratio between the received or sent data by single IP address and the
relevant average value of the whole monitored network.
RatioQuota The threshold for the ratio between the sent to received rate of the single IP IP
address and the average value of the whole monitored network.
www.flowmon.com 41 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
ExcludeCountries The communication with chosen countries is ignored within this detection
method.
Interpretation of results The results of this method can be used to identify IP addresses commu-
nicating with the potentially dangerous country destinations.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses and additionaly set a filter defining DHCP servers. Appro-
priate place for monitoring the traffic is the central switch.
Method parameters
DHCPServers The name of the filter that defines IP addresses of the DHCP servers used in
the monitored network.
FakeDHCPDetEnabled The activation of the fake DHCP servers occurence detection.
TimeWindow Count of hours (the length of the sliding time window) for which are stored the
statistics of the DHCP traffic.
DhcpThreshold The threshold for increase of the DHCP traffic (in percents). It is used for
comparing to previous statistics of the given IP address and to the network average.
www.flowmon.com 42 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Interpretation of results The method is able to detect flooding attacks in DHCP traffic and suspi-
cious increase of the volume of communication. The typical example is DHCP discover flood-
ing which is used to exhaust resources of DHCP server. Detection of fake DHCP server can
indicate attempted man-in-the-middle attack or incorrect configuration of a network device.
Method configuration It is appropriate to activate this method for IP addresses from own net-
work, that shouldn’t be able to communicate directly into the Internet (e.g. due to security
guidelines). Appropriate place for monitoring the Internet is the connection line.
Method parameters
LANSegment The name of the filter that defines IP addresses which are allowed to commu-
nicate only with IP addresses from this filter and with the proxy server.
ReportTries The choice to report unsuccessful attempts to communicate with IP addresses
outside the network defined by the LANSegment parameter.
ReportCommunication The choice to report successful communication with IP addresses
outside the network defined by the LANSegment parameter.
MinimalTransfer The minimal amount of transferred data between IP addresses inside and
outside the network defined by the LANSegment parameter.
Interpretation of results This method is capable to detect devices that communicate directly into
the Internet even if they are expected not to do this (they should use proxy server or they
should communicate only with other devices inside the local segment).
www.flowmon.com 43 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method for IP addresses from own net-
work or for all addresses when monitoring publicly available server farms. Appropriate place
for monitoring the traffic is the central switch as well as the Internet connection line.
Method parameters
Interpretation of results This method is capable of detecting devices that scan ports, spyware of
infected devices or misconfiguration of the devices. Typical false positives include detection
of devices implementing SNMP Monitoring such as Zabbix.
www.flowmon.com 44 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Next extension is based on simple model of used DNS servers. The parameter LearnCycles
defines how long should be the model trained. The parameter MinimalRatio defines the
minimal ratio (in percents) of count of connections that should the DNS server satisfy to be
considered as usually used DNS server. It is possible to exclude the DNS servers in monitored
network from the detection by setting the ServersToExclude parameter.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line.
Method parameters
Assigned filter Filter is used for restricting source IP addresses (classifier and illegal DNS servers
detection), source or destination IP addresses (large UDP packets and DNS TCP transfer de-
tection).
Interpretation of results This method is capable of detecting DNS service abuse for other unde-
sirable activities, which typically include tunneled traffic. The sudden change of usage of DNS
servers could indicate the malware infection.
www.flowmon.com 45 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the central
switch.
Method parameters
www.flowmon.com 46 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Interpretace metody This method alerts to the misuse of the provided service. The solution of
this situation can be the change of the service configuration.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (for large organizations with the vast network).
Method parameters
www.flowmon.com 47 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
F2WThreshold The minimal count of connections finished by FIN flag only by one of the com-
munication partners. It is used to detect Fin2Wait DoS attacks, this detection is inactive if
the parameter equals 0.
Assigned filter Filter is used for restricting source IP addresses (victim of the attack).
Interpretation of results This method reliably alerts to the DoS/DDoS attacks of the specified
minimum range.
Method configuration It is appropriate to activate this method only for IP addresses from own
network. The appropriate place for monitoring the traffic is the Internet connection line.
Method parameters
TransferThreshold The threshold for the transferred data amount (in MiB).
ExcludeServer The name of the filter that defines the IP addresses of the devices, which are
allowed to transfer big amounts of data (especially the servers in the monitored network).
TargetPercentile The value of the parameter defines the minimal percentage of the total
data amount should be transferred with single communication peer to indicate it as an
event target.
LegalServers The name of the filter that defines the IP addresses of the devices that are
allowed to be used for big data transfers by the devices in the monitored segment.
Interpretation of results This method reliably alerts to the IP addresses which transferred more
data then it is allowed.
www.flowmon.com 48 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network except for the IP addresses from which we except the access to the honeypots (e.g.
because of configuration). It is necessary to set up the name of the filter defining honeypots
for proper functioning. Appropriate place for monitoring the traffic is the Internet connection
line or the central switch.
Method parameters
IgnoreAccessFrom The name of the filter that defines the IP addresses that are allowed to
communicate with the honeypots (e.g. because of the management).
HoneypotFilter The name of the filter that defines the IP addresses of the network traps that
shouldn’t be requested by any device (besides the IP addresses defined by the IgnoreAc-
cessFrom parameter).
Interpretation of results This method alerts to the unauthorized access on the chosen comput-
ers in the network. It could mean horizontal scanning or the attempt to network-wide ssh
attack.
Method configuration It is appropriate to activate only for the webservers in the monitored net-
work, possibly for all traffic on the network (to detect attacks from clients in the monitored
network). Appropriate place for monitoring the traffic is the Internet connection line or the
central switch.
www.flowmon.com 49 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method parameters
MinimalPerClient The threshold for minimal count of unsuccessful attempts to login from
single IP address.
MinimalPageSize The minimal size of the webserver response sent after unsuccessful login
attempt.
Interpretation of results The method highlights the increased count of sending the same-sized
file from the webserver to single client. That probably means the dictionary attack on the web
login form.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch.
Method parameters
www.flowmon.com 50 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
TotalGuard The threshold for total utilization of the connection line to be reported as an
event (in percents).
PerHostGuard The threshold for utilization of the connection line by single IP address to be
reported as an event (in percents).
TotalPPS The threshold for minimal count of packets per second.
Interpretation of results This method shows clearly the excessive usage of internet connection.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
www.flowmon.com 51 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method parameters
TimeWindow Count of hours (the length of the sliding time window) to store the statistics of
the ICMP traffic. If the value of the parameter equals to 0, the detection of the volumetric
anomalies in ICMP traffic is inactive.
ICMPThreshold The threshold for increase of the ICMP type 3 messages count (in percents).
It is used for comparison to the previous statistics and to the network average.
Type3MsgThreshold Threshold for minimal count of ICMP type 3 messages.
ICMPSmurf Choice to activate the ICMP Smurf attacks detection (the amplification DoS at-
tacks using ICMP messages).
ICMPScan Choice to activate the horizontal ICMP scans detection.
ScannedDevices The threshold for minimal count of scanned devices.
PingFloodThreshold The threshold for ICMP echo request messages count. If the value of
the parameter equals to 0, the ICMP echo request flood detection is inactive.
MinimalPackets The threshold for minimal count of given ICMP type packets used for the
detection of high transferres over the ICMP protocol.
MinimalPayload The threshold for minimal bytes per packet used for the detection of high
transferres over the ICMP protocol. If the value of the parameter equals to 0, this part of
detection is inactive.
Interpretation of results The method is able to detect increase of ICMP type 3 messages (Un-
reachable). This could happen during spread of worm, especially in case when UDP protocol
is used and hosts with closed ports send back ICMP Port Unreachable messages. ICMP scans
are used to determine live hosts in the network and it could be used by malware. The goal
of ICMP smurf attack is to flood the network and especially connection link to the victim with
a large number of ICMP Echo replies.
www.flowmon.com 52 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
Method parameters
ConnectionsThreshold The threshold for minimal count of connections over the IPv6 tun-
nels.
UploadDataThreshold The threshold for minimal amount of data sent by the device over
the IPv6 tunnels.
DownloadDataThreshold The threshold for minimal amount of data received by the device
over the IPv6 tunnels.
IgnoreFailedConnections Choice to ignore the connections without response.
IgnoreTeredo Choice to deactivate the detection of the Teredo tunneling protocol.
Ignore6in4 Choice to deactivate the detection of the 6in4 tunneling protocol.
Interpretation of results The method detects devices communicating over IPv6 protocol thah is
tunneled through IPv4.
www.flowmon.com 53 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (with option LANFilter set).
Method parameters
LANFilter The name of the filter that defines the IP addresses with which is the communica-
tion ignored within the detection.
IgnoreOSCAR The choice to deactivate the detection of the OSCAR instant messaging proto-
col (used e.g. by the ICQ service).
IgnoreXMPP The choice to deactivate the detection of the XMPP instant messaging protocol
(used e.g. by the Jabber service).
IgnorePorts The choice to ignore the TCP ports 443 and 993 within the XMPP protocol detec-
tion.
IgnoreSkype The choice to deactivate the detection of the Skype communication application.
IgnoreOnlineMSG The choice to deactivate the detection of chosen instant messaging web
applications.
IgnoreSNGL The choice to ignore the attempts to connect to the instant messaging web ap-
plication without response.
Interpretation of results Although this is a heuristic the method achieves very reliable results
in the real traffic. In some cases the confusion of roles of the event originator/event target
occurs, i.e. IP address from a local network that runs the client’s instant messaging is marked
as the event target and the server of the service as the event originator.
www.flowmon.com 54 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
disable each part of the detection using parameters IPSpoof, SourceIPAnom and SameSr-
cDestAnom. Enabling the parameter IgnoreBroadMulticast you can inhibit the detection of
IP spoofing for the flows with multicast or broadcast destination IP address. The flows with
link-local IP addresses and zero network broadcasts are by default excluded from detection
of IP spoofing.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (with option InternalNetworks) set).
Method parameters
InternalNetworks The name of the filter that defines all IP addresses of the monitored net-
work.
SourceIPAnom The choice to activate the detection of connections with broadcast or multi-
cast IP address as a source.
SameSrcDestAnom The choice to activate the detection of connections with same source
and destination IP addresses.
IPSpoof The choice to activate the detection of connections with source and destination IP
adresses which are both outside the network defined by InternalNetworks parameter.
IgnoreBroadMulticast The choice to ignore the connections with broadcast or multicast des-
tination IP address during the IPSpoof detection.
Interpretation of results The communication of IP addresses outside the scope of local networks
may indicate IP spoofing or an attempt to modify IP headers. In case of flows with incorrect
IP addresses (broadcast or multicast source IP address or the same source and destination
IP address) it could be an attack on some implementation issue of TCP/IP stack of a network
equipment.
www.flowmon.com 55 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
determines the maximum tolerated value of the delay between the request and the response.
Another option is StrictMode which determines whether the delay will be measured for ad-
dresses matching the filter assigned to the detection method (value “normal” of the option)
or exclusively between these addresses (value “strict” of the option). It is possible to affect
the behavior of this method using option TCPFlags which enables to detect the latency only
during connection establishment.
Method parameters
LatencyThreshold The threshold for minimal difference between the timestamps of the re-
quest and response (in miliseconds).
StrictMode The choice to detect the latency just among the IP addresses defined by the as-
signed filter.
TCPFlags The choice to limit the detection just on the flows containing packets with TCP SYN
flag.
Interpretation of results This method shows a particular value of delay between recording of the
first request packet and the first response packet. This value thus indicates the delay at the
network layer and can help in analyzing the problem of latency in selected application or data
link. The method can also be used to check the SLA on the selected data link.
www.flowmon.com 56 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
thresholds is equal to zero, the other one has to be satisfied. If both od these thresholds are
equal to zero, they are ignored.
Method configuration In the case of network problems or suspicion to problems associated with
multicast traffic, it is appropriate to activate this method network-wide for all communication
in the network regardless of IP addresses. Appropriate place for monitoring the traffic is the
Internet connection line or the central switch.
Method parameters
IgnoreBroadcast The choice to ignore the broadcast and IPv6 all-host multicast within the
detection.
MinimalAttempts The threshold for minimal count of multicast (or broadcast) connections.
MaxBPP Maximal average value of bytes per packet (this metric is not used, if the parameter
is set to 0).
MinPPS Minimal average value of packets per second (this metric is used only together with
the MaxBPP parameter).
MinTransferred Minimal amount of data transferred to Multicast or Broadcast IP addresses
(in MiB).
Interpretation of results This method reliably alerts to the IP addresses on the network that gen-
erate multicast traffic.
Method configuration It is appropriate to activate this method only for the IP addresses of the
monitored network segment. Appropriate place for monitoring the traffic is the central switch.
The detection method requires proprietary IPFIX fields by Flowmon Networks. It is necessary
to activate the User Agent fields from HTTP OS & Application info extension and the whole L3/L4
extended fields extension.
Method parameters
www.flowmon.com 57 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
DistinctSYNSize Minimal count of TCP SYN packets with distinct size for single IP address.
DistinctTTL Minimal count of TCP SYN packets with distinct TTL set for single IP address.
DistinctTCPWindow Minimal count of TCP SYN packets with distinct TCP window set for sin-
gle IP address.
DistinctOS Minimal count of distinct operating systems (from HTTP user agent) for single IP
address.
MinimalProbability Minimal probability, that the given IP address corresponds to more dif-
ferent devices (there is a NAT).
MaxHop Maximal count of hops expected in given network (i.e. maximal count of the routers,
which can be passed by the single packet). It is used for NAT detection based on nonstan-
dard TTL values.
www.flowmon.com 58 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
option IgnoreScans set to value “ignore” allows ignoring too small transmission, that can’t be
e-mail traffic. The option IgnoreTCP587 allows to ignore Message Submission service (port
TCP 587).
Method configuration It is appropriate to activate this method for IP addresses of the organi-
zation. Appropriate place for monitoring the traffic is the central switch and the Internet
connection line.
Method parameters
ServersFilter The name of the filter that defines the IP addresses of the e-mail servers which
are allowed to be used in the monitored network.
StrictMode The choice to ignore the e-mail traffic comming from outside of the network
defined by the assigned filter.
ExcludeMailServers The choice to ignore the outgoing traffic from IP addresses defined by
the ServersFilter parameter within the detection.
IgnoreSecuredSMTP The choice to ignore the traffic of the Secured SMTP service (TCP/993)
within the detection.
IgnoreTCP587 The choice to ignore the traffic of the Message Submission service (TCP/587)
within the detection.
IgnoreScans The choice to ignore the traffic recognized as a port scanning within the detec-
tion.
SPAMCounter The choice to activate the detection of increased sent e-mails count.
MinimalMailLimit The threshold for minimal count of e-mails sent by single device.
Multiplicator The coefficient used for computing the dynamic threshold for e-mail sent by
single devices. The threshold is computed simply as a multiplication of the coefficient
and the network average.
IgnoreSYNflows The choice to ignore the flows with only TCP SYN flag. It is apropriate to
activate this choice if and only if there are flow data with correctly assigned TCP flags.
Assigned filter Filter is used for restricting source IP addresses (according the StrictMode param-
eter and in the profiler part of detection).
Interpretation of results This method not only detects attempts to spam, but also may help to
identify spyware infected devices. Further it may help detecting employees that use other
than corporate mail servers, which may indicate misconfiguration as well as an intention.
www.flowmon.com 59 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method only for IP addresses from moni-
tored network.
Method parameters
WindowLength Count of hours (the length of the sliding time window) to store the statistics
of the communication peers for single IP addresses in the monitored network.
Threshold Threshold for minimal increase of the communication peers count compared to
the sliding window average.
ExcludeServers The name of the filter that defines IP addresses theirs statistics of the peers
are not evaluated.
PartnersMinCount The threshold for minimal communication peers count for single device.
PacketsMinCount The threshold for minimal packet count per flow.
IgnoreSNGL The choice to ignore the requests without responses within the detection.
Interpretation of results This method alerts increased number of communication partners for
certain IP address.
www.flowmon.com 60 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method parameters
ScansThreshold The threshold for minimal count of attempts to port scanning by a single
device.
IgnoreChaotic The choice to ignore the chaotic port scans (it is not possible to determine, if
the scan is vertical or horizontal).
IgnoreUnsucc The choice to ignore the attempts to port scanning without response.
DetectOnlyKnown The choice to detect just the port scanning on ports lesser than 1024 or
on ports defined by the list.
DetectThesePorts The comma separated list of the port numbers to limit the port scans
detection.
PortBasedDetection The choice to use the detection based on given port numbers. This
www.flowmon.com 61 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
type of detection is suitable when there are the TCP flags incorrectly recognized in the
monitored traffic (caused by some types of data sources).
If the PortBasedDetection parameter is active, it is appropriate to activate this method
only for IP addresses from monitored network. The event is then reported only if some
IP address from this definition is scanned.
UDPThreshold The threshold for minimal count of unsuccessful attempts to scan UDP ports
by single device. The detection is based on monitoring the ICMP traffic. If the value of
the parameter equals to 0, the UDP ports scanning detection is inactive.
ARPScan The threshold for minimal count of ARP requested to be considered as an ARP
scanning. If the value of the parameter equals 0, the ARP scans detection is inactive.
MinTargets The minimal count of IP addresses scanned using the ARP requests.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
Assigned filter Filter is used for restricting source or destination IP addresses, for destination IP
addresses only in case of portbased detection.
Interpretation of results Apart from detecting attempts to deliberate port scanning this method
may detect misconfigured devices which are unsuccessfully trying to establish a connection
or devices infected with malware that is trying to replicate itself to other devices.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line. It is
www.flowmon.com 62 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method parameters
ServiceProviders The name of the filter that defines the IP addresses of servers theirs fail-
ures should be detected.
AttemptsThreshold The threshold for minimal count of attempts to single service (defined
as IP address, protocol, port tuple).
RelativeUnsuccessful The threshold for ratio of the unsuccessful attempts to service to total
count of attempts (in percents).
OnlyRejected The choice to evaluate only the rejected attempts to the service (attempts with
response with TCP RESET flag).
UDPThreshold The threshold for minimal count of attempts to the service on UDP protocol.
If the value of the parameter equals to 0, the detection of the unavailable service on UDP
protocol is inactive.
Interpretation of results Apart from detecting successful Denial of Service attack this method
may also detect an erroneous configuration – either on server, which does not provide the
service that should be provided, or on the clients, which demands services that are not pro-
vided.
Method configuration It is appropriate to activate this method only for IP addresses from the
monitored network. Appropriate place for monitoring the traffic is the central switch.
Interpretace This method detects devices that are sharing their desktop using TeamViewer.
www.flowmon.com 63 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line. By
setting the option IgnoreScans to value “yes” it is possible to detect devices that are infected
with some form of malware (e. g. botnet Chuck Norris) invading other network devices such
as routers, IP cameras, etc.
Method parameters
TelnetThreshold The threshold for minimal count of the connections using the Telnet service
(TCP/23).
IgnoreScans The choice to ignore the traffic recognized as a scanning the TCP port 23.
AllowedTelnet The name of the filter that defines the IP addresses that are allowed to be
accessed using the Telnet service.
UploadThreshold Minimal amount of data uploaded by a single device.
DownloadThreshold Minimal amount of data downloaded by a single device.
Interpretation of results This method detects devices using or attempting to use the Telnet ser-
vice (depending on configuration). The method can also detect specialized devices that are
infected with some form of malware oriented to misuse specialized network devices.
www.flowmon.com 64 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
started connections (parameter ConcurrentStart) and the minimal duration of the long-
standing connection (parameter LongConnection). It is possible to limit the false positives
by setting the filter that defines local network segment (parameter LANFilter) and minimal
probability of the event to be reported (parameter MinimalProbability).
Method configuration It is appropriate to activate this method for client stations of the monitor-
ing network. Appropriate place for monitoring the traffic is the Internet connection line.
Method parameters
LANFilter The name of the filter that defines the IP addresses of the devices in the monitored
network.
ConcurrentStart The threshold for minimal count of concurrently established connections.
LongConnection The minimal duration of continuous long connections (in seconds).
MinimalProbability The threshold for minimal probability evaluated by the detection
method.
Interpretation of results This method detects client’s stations that are using the anonymity Tor
protocol while they are browsing the Internet.
Method configuration It is appropriate to activate this method for client’s stations of monitoring
network. Appropriate place for monitoring the traffic is the Internet connection line.
www.flowmon.com 65 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method parameters
ExcludeIPs The name of the filter that defines the IP addresses which are allowed to upload
the data to them.
AbsoluteThreshold The threshold for minimal amount of sent data by a single device. If the
value of the parameter equals to 0, the detection based on the absolute threshold is
inactive.
RelativeThreshold The threshold for minimal ratio between sent and received data for a sin-
gle device in the network.
MinimalThreshold The minimal amount of sent data to check the sent to received data ratio.
ExcludeServers The name of the filter that defines the IP addresses of the devices which are
allowed to sent data.
Pairwise The choice to use the detection based on request-response pairs besides the total
statistics of sent and received data.
Interpretation of results This method reports the stations from which a file was uploaded, so it
may be an attempt to sensitive data leakage.
Method configuration It is appropriate to activate this method for explicitly selected IP addresses
of organization whose traffic structure is known or expected. Appropriate place for monitor-
ing the traffic is the Internet connection line.
Method parameters There are no additional parameters for this detection method.
Interpretation of results This method focuses solely on pairs of port/protocol therefore it can
produce large number of false positives in case that it is misconfigured.
www.flowmon.com 66 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method for explicitly selected IP addresses
of an organization whose traffic structure is known or expected. Appropriate place for moni-
toring the traffic is the Internet connection line.
Method parameters
Advanced The choice to use the VPN traffic detection based on the behavioral analysis.
MinimalData The threshold for minimal amount of transferred data (in MiB).
MinimalTime The threshold for minimal duration of the VPN connection.
LANFilter The name of the filter that defines the IP addresses in the local network. The
communication among the devices in the local network is ignored within the detection.
Standard The choice to use the port-based detection.
ConnectionLength The threshold for minimal duration of the MSPPTP VPN connection (in
seconds).
Transferred Minimal amount of transferred data using the MSPPTP protocol (in bytes).
MSPPTP The choice to detect the use of MSPPTP protocol.
Interpretation of results This method allows determining the devices on your network using VP-
N/tunnels. Basic detection is focused solely on pairs of port/protocol therefore it can produce
large number of false positives in case that it is misconfigured. Advanced detection success-
fully detects general VPN traffic where all station communication with external network is
going through.
www.flowmon.com 67 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
Method parameters
IgnoreSNGL The choice to ignore the attempts to a fileshare webserver without response
within the detection.
LANFilter The name of the filter that defines the IP addresses of the devices in local network.
It is used for identification of uploading/downloading devices.
MinimalDown The threshold for minimal amount of data downloaded probably from the
fileshare webserver (in MiB). Applies only if the LANFilter parameter is set.
MinimalUp The threshold for minimal amount of data uploaded probably to the fileshare
webserver (in MiB). Applies only if the LANFilter parameter is set. It is enough to exceed
one of the MinimalDown and MinimalUp thresholds to report an event.
Interpretation of results Accuracy of detection depends on the database of known web sharing
services. There is also statistical distortion in the Event evidence. This distortion is caused
by webshare server IP address used during transmission, which is often different from known
gateway address. Therefore the amount of transferred data is less than the amount shown in
the Detail field.
www.flowmon.com 68 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
Internet connection line. It is necessary to activate this detection method combined with the
Flow source with activated SIP processing.
Method parameters
RegisterFlood The choice to activate the detection of flood of SIP packets with Register flag
set.
InviteFlood The choice to activate the detection of flood of SIP packets with Invite flag set.
Threshold The threshold for minimal ratio of count of packets with Invite (or Register) flag
set to the count of relevant responses.
PerCalledParty The threshold for minimal count of packets with Invite (or Register) flag set
per called party.
MessageLimit The threshold for minimal total count of attempts.
Assigned filter Filter is used for restricting source IP addresses (attack victims).
Interpretation of results The victim of the attack is shown as a event source. Event targets (at-
tackers or devices trying to attempt actual SIP connection during the attack) have generated
large amount of Register or Invite requests and the victim cannot handle this amount of re-
quests. The flooded victim cannot handle the real phone calls, too.
www.flowmon.com 69 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
Internet connection line. It is necessary to activate this detection method combined with the
Flow source with activated SIP processing.
Method parameters
RegisterScan The choice to detect SIP devices scans which are using the Register flag.
OptionsScan The choice to detect SIP devices scans which are using the Options flag.
InviteScan The choice to detect SIP devices scans which are using the Invite flag-
Threshold The threshold for minimal attempts count.
Interpretation of results The scanning attacker is trying to detect SIP PBX’s and gateways (hori-
zontal, especially Register and Options scans; the information can be misused e.g. for eaves-
dropping) or active SIP addresses (vertical, especially Invite scans; the information can be mis-
used for telephonical SPAM).
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
www.flowmon.com 70 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Internet connection line. It is necessary to activate this detection method combined with the
Flow source with activated SIP processing.
Method parameters
ClosedSeason Count of days intended for training the classifier on the monitored network.
No events are reported during this time.
TimeToDeath Count of days to store inactive SIP gateway (or proxy) in the classifier before
removing.
Interpretation of results The device indicated as SIP proxy (the event source) transmits the SIP
traffic for callers with distinct SIP URIs. This device can be dedicated for wiretrapping the
forwarded communication (Man-in-the-middle attack).
Method configuration It is appropriate to activate this method only for IP addresses that belongs
to sensors. All non-sensors IP addresses in the controlled range would cause high amount of
false positives. Appropriate place for monitoring the traffic is the central switch.
Method parameters
IgnoreShorterPeriods The choice to ignore the events caused by sensor transmission after
shorter than trained period.
PeriodTolerance The tolerated deviation from trained classifier for the time period (in per-
cents).
www.flowmon.com 71 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
TrafficTolerance The tolerated deviation from trained classifier for rhe transferred data (in
percents). It the value of the parameter equals to 0, the detection of the transferred data
deviation is inactive.
ConceptDriftThr The count of consequent events to delete the classifier for the given device
and train a new one. If the value of the parameter equals to 0, the detection of the
concept drift is inactive.
MinimalCoverage The threshold for minimal amount of samples that are covered by the
classifier for given device to switch the classifier to the detection mode (in percents).
PerHourEnough The choice to enable the classifier to switch to the detection mode even if
the transmission count per hour is the only one successfuly trained metric.
LearnCycles The count of training cycles to collect the data for given device.
ReportImmediately The choice to report the anomalies immediately or in hourly summary.
Interpretation of results this method alerts to the wrong behavior of sensor (based on transmis-
sion period, bytes per packet or transmissions per hour). It is necessary to consider how large
and often deviation from standard behavior can be caused by defective sensor.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the central
switch.
Method parameters
MinimalQueryLimit The threshold for minimal count of DNS queries sent by single device.
Multiplicator The coefficient intended for computing the dynamic threshold. The threshold
is evaluated as a multiplication of this coefficient and the network average.
www.flowmon.com 72 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
ExcludeDNS The name of the filter that defines the IP addresses which are allowed to send
increased count of DNS queries.
Interpretation of results This method reliably alerts to the increased number of DNS queries,
which can indicate the viral infection of the station identified as the event source.
Method configuration It is appropriate to activate this method for all IP addresses and monitor
not only attacks against own servers, but also the attacks from own network to the Internet.
Appropriate place for monitoring the traffic is the central switch and the Internet connection
line.
Method parameters
AttackAttempts Minimal count of attempts to login from one attacker on the RDP service.
AttackHole If there isn’t any attempt to login for this time, the attack is marked as finished.
MinTargets Minimal count of targets of the attack to generate the event.
www.flowmon.com 73 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
ObscurePorts Comma separated list of the port numbers different from 3389, on which is
the RDP service provided in the monitored network.
PartOfAttack If the given address is already a target of some detected attack, the attack from
different attacker is detected after less attempts to login (given by this ratio).
TimeWindow The attempts statistics are saved for given time (unless the attack is detected).
ResetFlag The choice to evaluate only the flows with TCP RESET flag set within the detection.
Interpretation of results The results of this method are relatively straightforward, the method
detects an attack against the RDP service.
Method configuration It is appropriate to activate this method for all IP addresses and monitor
not only attacks against own servers, but also the attacks from own network to the Internet.
Appropriate place for monitoring the traffic is the central switch and the Internet connection
line.
Method parameters
AttackAttempts Minimal count of attempts to login from one attacker on the SSH service.
AttackHole If there isn’t any attempt to login for this time, the attack is marked as finished.
MinTargets Minimal count of targets of the attack to generate the event.
ObscurePorts Comma separated list of the port numbers different from 22, on which is the
SSH service provided in the monitored network.
www.flowmon.com 74 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
MaxPackets Maximal count of packets per login attempt that are taken into account during
the detection. It doesn’t apply if 0. Ignoring of the flows with higher count of packets
lowers the false positive rate but it makes the success determination more inaccurate.
ExcludeUnsuccessful Unsuccessful attacks are not reported.
PartOfAttack If the given address is already a target of some detected attack, the attack from
different attacker is detected after less attempts to login (given by this ratio).
SuccAttack Minimal count of unsuccessful attempts before the successful attempts to con-
sider them as an attack, as well.
TimeWindow The attempts statistics are saved for given time (unless the attack is detected).
Interpretation of results The results of this method are relatively straightforward, the method
detects an attack against the SSH service. The method may produce false positives when
evaluating activities of some surveillance systems using the SSH protocol.
Method configuration It is appropriate to activate the method for all the IP addresses depending
on the DNS configuration policy of the organization. Appropriate place for monitoring the
traffic is the central switch and the Internet connection line.
Method parameters
MinimalTransfer The threshold for minimal amount of transferred data by single device for
last 24 hours (in MiB).
Interpretation of results This method can detect configuration problems, and also alert to new
or unauthorized devices on the network.
www.flowmon.com 75 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Automatic anomaly detection system provided by Flowmon ADS application works on the prin-
ciples of prediction based on short-time historical data. The statistics describing the network be-
havior are predicted for the whole network. In case the outlier between the predicted and the
current value occurs, the possible responsible device is identified and the event is generated.
The detail of the event always contains the predicted value of the relevant statistic, its current
value, its current value computed only for the responsible device and the procentual increase for
this device since the last batch of Flow data.
• Transferred data
• Transferred packets
• Established connections
• Communication peers
www.flowmon.com 76 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The ANOMALY method that is used for automatic anomaly detection has to have assigned the
filter defining the monitored segment to work properly. Two parameters defining the sensitivity of
the classifier can be set.
The first parameter is the length of the sliding window (WindowLengthNet), that defines the
maximal age of data used for the current value prediction. It applies that the longer period is used,
the less adaptable is the classifier in general (therefore more sensitive).
The second parametr is the threshold value for the event detection (NetworkThreshold). This
value defines how much bigger has to be the current value than the predicted value to generate
the event. E.g. if the predicted value is 100, the value of this parameter is 2, then the current value
has to be bigger than 300 (= 100 + (2 × 100)) to generate the event. This parameter can be set to
two decimal places. The lower is the given value, the higher is the sensitivity of the classifier.
The MinimalPart parameter can be used for improving the event source identification. This
parameter defines minimal part of whole traffic relevant to single device and to the exceeded mea-
sure. If the device exceeds this threshold, it gets bigger weight (the devices under the threshold get
the weight equal to 1).
NetworkThreshold The coefficient intended for computing the dynamic threshold. The threshold
is evaluated as a sum of predicted value and the multiplication of predicted value and the
coefficient. The computation of the predicted value is based on stored statistics.
MinimalPart The threshold for the minimal ratio of one device to the total traffic to be identified
as an event source.
StrictMode The strict filtering during the reverse tracing of the flows to be attached to the e-mail
reports. In case there are some e-mail reports with empty flow list, this option should be
turned off.
IgnoreInternal If the parameter is set to yes, the statistics for detection method are based only on
the communication with just one IP address in the assigned filter (source, or destination).
www.flowmon.com 77 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration It is possible to configure the threshold ratio for each individual metric (e.g.
amount of unpaired flows) and set on or off the detection of wrong active timeout settings on
the Flow exporter or the detection of duplicit packets in the monitored network.
Method parameters
MinSingle The amount of unpaired flows in the processed sample of traffic to raise the warn-
ing (the control is not performed, if 0).
MinBroadcast The amount of broadcast and multicast traffic in the processed sample to
raise the warning (the control is not performed, if 0).
MaxDecrease The maximal value, to which can decrease current amount of transferred data
relative to the minimal of the foregoing 4 hours (the control is not performed, if 0).
DetectTimeout Activating the control of the active timeout different from the standard 300
seconds (5 second tolerance).
Duplicates Activating the control of the duplicit packets in flows (it is recommended to turn
this control off, if there is active sampling on the collector.
CoreCount Activating the control of the ineffective settings of CPU core count allowed to be
used by Flowmon ADS application.
MaxPerBatch The amount of the events generated by single detection method instance per
one processed batch to raise the warning (the control is not performed, if 0).
MaxPerHour The amount of the events generated by single detection method instance per
one hour to raise the warning (the control is not performed, if 0).
DeactivateOnFlood The multiple of the MaxPerBatch parameter – if exceeded, the instance
of the detection method is deactivated. The detection method is not deactivated, if 0.
MinDelta Minimal difference of timestamps. The detection is performed on the timestamps
of the first and the last flow of the batch and on the timestamp of the last flow and the
timestamp of the batch itself. The timestamp check is not performed, if 0.
Interpretation of results The method is generating simple warnings. These warning can be inter-
preted as some problems with Flow exporters (e.g. wrong configuration, incomplete data).
www.flowmon.com 78 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Threat detections can be activated, deactivated and configured using the relevant parameters.
The individual threat detections always depends on the set of the simple event detetections. If
there is no active dependency, the threat detection cannot be activated.
The detected threats are displayed in the own tab in the Dashboard:Overview view. The
source, start time, current end time, completion (there will be no further update to the threat,
if closed), aggregated details and the list of particular simple events (dependencies, that are aggre-
gated into the threat) are shown for each threat.
In the moment, the particular event is deleted, the threat is deleted too.
Each aggregation threat detection can be configured using the Window parameter, which de-
fines the maximal time window between two consecutive simple events (in seconds; if there is no
other desired simple event in the time window, the threat is closed).
www.flowmon.com 79 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Dependencies SSH attack, RDP attack, Web form attack, Communication with blacklisted
hosts (Known botnet command & control center)
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threats has to be interpreted according to the number of particular events. In
case of very high number, it can be sign of an malware infection.
Dependencies Data upload anomaly, Country reputation, Web sharing traffic (only uploads).
Method configuration It is possible to set the minimal threshold for data sent out of the network
for particular event (Threshold parameter) except the Window parameter.
Interpretation The threats can be interpreted as a potential data leaks or as an use of the moni-
tored network to private purposes (e.g. uploading some vacation photos – but there could be
watermarked data in these).
Dependencies Denial of service attack, Amplificated DoS attack, ICMP anomaly (ICMP smurf
attack, ping flood), Behavior anomaly (increased packet ratio)
www.flowmon.com 80 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The source of the threat is a victim of some kind of denial of service attack.
Dependencies DNS traffic anomaly (large TCP DNS traffic, use of unusual/unauthorized DNS
server), DNS query volume anomaly
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat can be interpreted as a presence of the malware infection on the device
(the DNS is used as a communication channel to the C&C center) or as a wrong configuration
of the device.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat can highlight the longlasting or frequently recurring high data transfer-
res.
www.flowmon.com 81 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Dependencies Port scanning (scanning the 22, 23, 135, 137, 139, 389, 445, 1433 or 3389 ports),
SMTP anomaly, Telnet anomaly, Honeypot traffic, Target hosts/ports anomaly (only after
some of the other dependencies), Communication with blacklisted hosts (Known botnet
command & control center)
Method configuration It is possible to set the minimal count of targets for particular events
(MinTargets parameter) except the Window parameter.
Interpretation According the increasing number of the particular events is increasing also the
probability of the malware infection on the threat source.
Dependencies SMTP anomaly (low number of e-mails using low number of mailservers), DNS
traffic anomaly (attempt to use unexpected/unauthorized DNS server), IPv6 tunneled traf-
fic
Method configuration It is possible to set the maximal number of mailservers and maximal
number of e-mails (MaxTargets and MaxEmails parameters) for particular SMTPANOMALY
events except the Window parameter.
Interpretation The source of the threat is probably wrong configured – it is trying to use the unex-
pected/unauthorized DNS server, or it is using the unauthorized SMTP server (but still sending
adequate number of e-mails).
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat is highlighting significant changes in the monitored network traffic.
www.flowmon.com 82 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat source is discovering the monitored network and trying to find some
exploitable weaknesses.
3.9.10 PROXYBYPASS
Method description The method is aggregating simple events informing about the devices that
are bypassing (or trying to bypass) the specified proxy server.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Dependencies SMTP anomaly, Communication with blacklisted hosts (Known SPAM sources)
Method configuration It is possible to set the minimal count of mailservers (MailServers param-
eter) for particular SMTPANOMALY events except the Window parameter.
Interpretation The probability of the threat source sending the unwanted e-mails is increasing
according the number of particular events.
www.flowmon.com 83 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Dependencies BitTorrent traffic, Instant messaging traffic, Online messaging traffic, TOR
traffic, TeamViewer traffic, Target hosts/ports anomaly, Web sharing traffic, Telnet
anomaly, Country reputation.
Method configuration It is possible to set the maximal count of targets for particular TELNET
events (Telnet parameter) except the Window parameter.
Interpretation The threat highlights using the services/application, that can be undesired in the
given environment – either with respect to theirs nature (BitTorrent), or with respect to the
security (Telnet).
www.flowmon.com 84 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
4 User interface
The Flowmon ADS plug-in offers a complete Web user interface based on JavaScript and A JAX
technology. For basic control and accessing various parts of the application there is the main menu
on the left side. The upper part displays the status and information bar, the rest of the window
area serves as the user workspace. Another means of controlling application is a context menu
available by right clicking on relevant object.
Tips of the day are part of the application displayed after successful user login. After login to the
application a welcome screen is displayed. You can find there some important information about
what should be done before you start using the application.
The main application menu is a basic guidepost to all perspectives and features available in the
application. Related functions and views are brought together in joint groups. The main application
menu contains the following items:
Aggregated view Aggregated view brings together neighbor events of the same type of indi-
vidual device into continuous blocks, which are then graphically displayed on the time-
line.
Simple list A simple list of events, advanced searching and filtering of events.
By hosts A view of events grouped by IP addresses, which relate to the events.
Reports A set of HTML/PDF reports (reports on request) that summarize all information about
individual IP addresses available in the plug-in.
www.flowmon.com 85 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Generate report Generate report based on given template and time window.
Reports Configuring the templates used for generating reports.
Chapters Configuring the chapters of reports.
Scheduled reports Scheduling of automatic generating and sending reports via e-mail.
About Displaying a brief information about the application and its version, information about the
number of processed flows, license information, access to user documentation, information
about skipped methods and batches during the data processing.
The currently selected menu item is always highlighted. The main application menu can be
hidden and thus increase the available workspace of the user. For hiding/displaying the main menu
of the application there is a panel separating the main menu from the workspace of the user with
the arrow icon (left – to hide, right – to display). Moving between the individual subsubsections can
be done using the tabs in the user workspace.
Status and information bar indicates selected basic information concerning the application and
its user interface to the user (items are listed from left to right):
Drop-down menu Switching between individual plug-ins that are available on the Flowmon
probe/collector.
Flow sources problem indicator Status icon which has a green color when everything is working
correctly. If there are some warnings or errors, it changes color to orange or red. The most
recent error is displayed on the left of the icon. The number inside the status icon indicates
the number of unread messages. Click on the icon to open a window listing all messages,
time and severity. Users in the admin group can delete these messages.
Language switch An immediate switch of the user interface of the application to the language
selected by positioning the language switch (available English and Czech).
www.flowmon.com 86 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Context menu is a means for fast control of the application. Context menu brings together all
the actions that can be performed with element that is selected in the user interface. Context menu
appears after clicking the right mouse button.
The most frequently used context menu is a menu of IP address/events which includes the
following items:
General information The translation of IP address on the DNS name, obtaining WHOIS informa-
tion and displaying custom information about IP address (if specified – see Configuring filters).
The data are displayed in a floating window.
Related events A view of events associated with the IP address, transition to the perspective of
Events\By hosts view.
External IP services Allows to display additional information about IP addresses using user de-
fined external internet services.
Aggregated events A view of aggregated events on timeline associated with the IP address, tran-
sition to the Events\Aggregated view.
www.flowmon.com 87 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Locate in map Traces the physical location of IP address and displays it on the map. This
function communicates with an external service (Yahoo Maps) and for its functionality it
is necessary not to block the communication of the device (probe/collector) to port 80
(standard web traffic) and the External services has to be allowed.
Ping Check availability of selected IP addresses.
Traceroute Is a computer network tool for measuring the route path and transit times of
packets across an Internet Protocol (IP) network.
Display events of this type A view of all events of the same type, transition to the Simple list
view.
Mark as false positive Marks the event as a false alarm, it will be no longer reported. It is possi-
ble to send an e-mail about the false positive event to the Flowmon Networks company. The
e-mail will consist from event details data, Flow entries that are related to the event, applica-
tion model and version and from the customer’s name. That data will be used to enhance
the performance of the application. The data will be processed in accordance with the law
on personal data protection. It is possible to add an explanation as a comment during the
marking procedure.
Event details Transition to event details, displaying of related information (categorization, notes).
Event evidence A detailed view of events including all data flows from which the event has been
generated. The view is primarily intended for exporting the evidence from the application;
displayed Web page is adapted to copy its contents in plain text to the clipboard.
The menu item is only available if the given address of your Flow collector data is tied to the
event.
Visualize event A view of the events through an interactive chart based on Flow data caused by
the event.
The menu item is only available if the given address of your Flow collector data is tied to the
event.
Latency Graphical view of the latency of the packets between monitored devices.
www.flowmon.com 88 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Export as image This function opens focused dashboard or events table in new window as image.
It can be saved or copied into clipboard.
This function is available for Firefox browser only.
Export events to .csv This function exports the events from the displayed table into the CSV file.
Send feedback Allows to send the bugreport or feedback to Flowmon Networks company. The
form is placed on external web page.
Other specific context menu is given under the relevant parts of the user interface description,
namely the context menu available at some dashboard tables. Above the context menu there is
also a tooltip for IP addresses available. Tooltip contains information about the country where the
IP address is located.
It is possible to filter data in all views according to corresping search criteria. For greater clarity
are the search criteria devided to basic search criteria, that are displayed always, and to advanced,
that are available only in the complete form (the complete form can be open by clicking on the
bottom edge of the reduced form).
From, To The relevant period for displaying the information on the dashboard, the period
can be specified directly or chosen from associated calendar.
www.flowmon.com 89 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
IPs, IP address, Targets IP addresses, which are to be given information on the Dashboard,
individual IP addresses can be separated by a comma. It is also possible to enter the
network address/mask, instead of IP addresses you can enter the DNS name.
In case of IP address field it is allowed to write only single IP address.
4.2 Dashboard
Dashboard is a basic interface element that is displayed to the user right after logging on to the
application. Dashboard is used to obtain an overall picture of what is happening on the network
via a set of top 10 statistics. The default view shows events for the last 24 hours with the possibility
of adjusting the view by changing the corresponding search criteria (From, To, IPs, Event types,
Filters, FlowSources).
According to dashboard part (Overview, Events only relevant search criteria are available.
4.2.1 Overview
The Overview chart allows to view the comparison of transferred data (packet count, flow
count) with respect to the priority of the events that are detected using this data. If the data were
used to detection of more events with different priorities, the data are displayed according the
highest priority, that was achieved. The color assignment to priorities follows: Critical and High
priorities – red, Medium priority – orange, Low and Information priorities – yellow.
www.flowmon.com 90 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Data can be filtered by start and end time, the perspective and the Flow source.
It is possible to mark the shorter time period. The available information are displayed for the
marked interval. You can use the context menu over the marked interval to display this data in
other views (Aggregated view, Simple list, By hosts and Dashboard events) or to zoom in or out.
You can shift the marked interval using arrows in right lower corner of the chart and switch the
scale of the vertical axis (linear, logarithmic, left upper corner of the chart).
4.2.2 Events
Top 10 events by priority The table shows the 10 most important events from the chosen per-
spective.
Within the table, you can:
www.flowmon.com 91 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Top 10 events by event type The table shows the top 10 event types along with the number of
occurrences of the events of that type.
Within the table, you can:
Top 10 IPs by event count The table shows the 10 IP addresses, which produce the greatest num-
ber of events.
Within the table, you can:
Events in last batch The table shows maximum 10 event types, which was detected during the
last processed batch of data.
Within the table, you can:
www.flowmon.com 92 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
• View a complete table of all events in last batch, transition to the Events\Simple list view,
view the chart including the legend
• Display the context menu above the type of an event, which allows you to search all
events of the type (Display events of this type), transition to the Events\Simple list
view
4.3 Events
Aggregated view presents events of particular device in an intuitive graphical way considering
the aspect of time.
Events are filtered by the following search criteria: From, To, IPs, Event types, Filters, Flow-
Sources, Categories, Perspective.
Each event type the device takes place in a given time period is represented by one line called
a swimline.Event occurrences are represented by a colored rectangle in a particular swimline.
Event occurrences are represented by a colored rectangle in a particular swimline. According to
the selected scale the neighbor events are aggregated into one rectangle. Lenght of the rectangle
corresponds to the time length of the event. Time goes prom from left to right at the x axis. For
clarity the night and the day alternation is displayed.
Visualization interaction
Zoom User can zoom in visualization (showing in a larger scale) by using left mouse button to
select the requested time interval. There are “Undo” and “Redo” icons on the right side above the
visualization to navigate through changes of the scale. Using the icons “Plus” and “Minus” you can
change the size of colored rectangles in a swimline.
Event details By right clicking on the event (green rectangle) it is possible to display context
menu allowing displaying event details (IP address, start time, end time, summary) or transition
www.flowmon.com 93 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
to Events\Simple list with the corresponding events. The detail summary can be shown only for
events detected after installation of application Flowmon ADS version 2.08.00 because of migration
to new technologies, which allow us to aggregate the events into the high level events better.
Computing aggregated event details, which consists of more than 25 events is accelerated by
sampling. When sampling is used there is information about lower accuracy of data in event detail.
View of events in the form of a simple list (events table). It is primarily sorted by the time of the
event creation.
Events are filtered by the following search criteria: From, To, Source IP, Targets, Filter, Method,
Categories and Perspective.
User can show directly the Event details view of the event with known event ID using the search
dialog available after clicking the magnifier glass icon in upper right corner of the search criteria
box.
The results of query are divided into pages where one page contains a maximum of 500 items
of the result. The result is a table that includes the following items:
www.flowmon.com 94 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Type Type of event, in fact a reference to the detection method, which recognized the event.
Flow source Flow data source on which the event has been generated
Targets Event targets (a list of IP addresses). At most 10 items is shown in the table. If more targets
are associated with the event they are available on request in a dialog window.
It is possible to export the output into the CSV file by clicking Export events to .csv in context
menu.
4.3.3 By hosts
A table view of the events grouped according to the sources and targets of events.
Events are filtered by the following search criteria: From, To, Source IP, Filter, Method, Cate-
gories, Perspective, IP’s role and Number of events.
The result table is sorted according to the IP addresses, for each IP address the number of
events where the IP address is the source or the target of the event is displayed. Consequently,
it is possible to view a list of event types related to the IP address. For each event type can be
displayed specific events in the form of a separate table, which includes the same data as in event
table Events\Simple list.
www.flowmon.com 95 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
The Event detailsview is unlike other event views available only through the context menu.
Event details include all available information about the event, event comments and classification
of events into categories.
Type Type of event, in fact a reference to the detection method, which recognized the event
First Flow Timestamp of the first Flow on which was based the event detection
Captured source hostname DNS name assigned to the IP address at the time of event detection
Flow source Flow data source on which the event has been generated
False positive Indicates whether it is a false positive (according to rules for marking events as
false positives currently in effect). Event can be marked as a false positive by Mark as false
positive context menu item. When marking an event it is necessary to enter time relevance of
marking (individual days of the week, time tolerance). Marking of an event as a false positive
means that event of the same type and originator will not be generated if there is a rule for
marking the events as the false positive in effect.
Targets Event targets (a list of IP address). The targets can be shown grouped by the appropriate
countries or address prefixes.
User Identity User ID from domain controller (for more information see Flowmon collector docu-
mentation)
Further for each event there are chronologically listed related comments. The comment always
includes the author (Author) and a timestamp of comment insertion (Timestamp). Comments
may be changed (Change) or deleted (Delete)depending on the author and currently logged on
user. It is always possible to add a new comment (Add new comment).
www.flowmon.com 96 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Event details also include event categories. The category always includes the author (Author)
and the timestamp (Timestamp). Individual categorization can be removed (Remove) or added
(Add to category). Note that the management of event categories is also available through Man-
age event categories context menu item.
The Interactive event visualization view enables to view the network traffic data, based on
which the event was detected. The view is available for each event detected on the basis of network
traffic through the Visualize event context menu item. Similarly as in the Event details view the
event details are displayed first in the table to make clear what the event is visualized.
Interactive visualization displays individual IP addresses as nodes and data transmission be-
tween the IP addresses as edges. Size of nodes and edges is proportional to the volume of trans-
mitted data and their colors ranged from green to red are corresponding to the number of flows.
Event visualization can be interactively traversed; each node has a context menu marked by sym-
bol “+”. The item More data of this menu ensures downloading of all relevant IP address com-
munication. The item Info obtains and displays the details of the network traffic in the form of
a floating table. For nodes it displays table of aggregated communication with other IP addresses.
For inbound traffic the communication is aggregated on source IP address, destination port and
protocol. For the outbound traffic it is aggregated on the destination IP address, source port and
protocol. For edges it displays a table of individual data flows that constitute the edge including
details such as the duration of the connection, flags and the type of service (TOS).
www.flowmon.com 97 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
Special type of node is called aggregation. Aggregation represents a larger number of IP ad-
dresses and is visualized as a circle shaped node. Clicking on such a node displays a list of IP
addresses that constitute the aggregation. Selecting any of the displayed IP address will tear it
from the aggregation. Furthermore it is possible to work with the IP address and details of its
communication by a standard means that are described above.
The Event evidence view provides the means to export the evidence (network data flows on
the basis of which the event was detected) from the application. Displayed web page is adjusted to
be able to copy its content to the clipboard in a plain text. For each event there is the event type,
timestamp of event creation, event originator, event details and targets.
It is followed by the histogram, which could display relations between various pairs of vari-
ables. Below is displayed the list of data flows (raw Flow data from the collector). The displayed
www.flowmon.com 98 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
information includes the source and the target IP address, time stamp of the data flow, its dura-
tion, protocol, source and destination port, the volume of transferred data, number of transmitted
packets and the type of service.
The listed flows can be filtered along one of the columns. The filter can be defined by chosing
the column and the relation from the lists and by writing the constant into the text box.
The listed flows with the same (or reversed) tuple source IP address, destination IP address,
source port, destination port and protocol can be highlighted using the context menu over the
single flows (Flows coloring\Follow flow). The flows without corresponding opposite flow can be
highlighted using the Flows coloring\Single flow item.
The list in the user interface is limited to 10000 flows. The exported text file includes all appro-
priate flow records.
www.flowmon.com 99 / 102
Flowmon ADS Business 8.02.00
User Guide, October 25, 2016
4.4 Reports
The reports are a means to obtain complete information about the IP address/IP addresses
registered in the application. Reports save the information on events into an assembly, which can
be directly exported to the PDF.
4.4.1 Chapters
Overall status report It displays the network traffic overview chart and the traffic statistics table.
Event matrix Table of the most important events in the network. It is displayed by single days and
devices.
Event list List of the most important events in the network displayed as in Events\Simple list
view.
Events count by type List (and the piechart) of the counts of the most important events in the
network.
The given chapter consists from the given type and parameter settings. It is possible to create
more chapters of same type but different settings.
Only admin user can create, edit and delete the chapters. The user is warned if the deleted
chapter belongs to some report. If the deleted chapter is the last one in the report, the user will be
warned and the report will be deleted, too.
4.4.2 Reports
The report is defined as the sequence of chosen chapters. Each user can create and edit his
own reports. The user can mark the report as public (it could be seen by other users). The common
user can edit or delete only his own reports, the administrator can see, edit or delete all reports.
To generate the report it needed to choose one of the defined report templates and specify the
time window, which will be included into the report. The generated report can be directly exported
to the PDF. Generating the report can consume much time and system resources with respect to
the chapter parameters settings and the chosen time window. The generating of the report can be
interrupted anytime.
It could be used also the default report template beyond the user defined report templates. The
default report consists from following chapters:
Overall status for Security Issues Based on the Security Issues perspective, the chart is gener-
ated along the flow count in the logarithmic scale for each Flow source separately.
Overall status for Operational Issues Based on the Operational Issues perspective, the chart is
generated along the flow count in the logarithmic scale for each Flow source separately.
Event matrix for Security Issues For the priority HIGH or higher.
Event matrix for Operational Issues For the priority HIGH or higher.
The Flowmon ADS application allows to set up the automatic report generating and sending
in the PDF format. It is necessary to choose the report to generate (Report), activate/deactivate
the generating and sending (Active), select the period used for the generating (Interval). When
is the daily or weekly reporting selected, it is necessary to choose which weekdays are the reports
generated. Using the monthly generated report, the report is generated at the first day of the next
week. Using the Custom interval (it is needed to choose the first and last day of the report), the
report is generated at the end of the given period.
It is possible to set the e-mail addresses of the sender (Sender email) and of the recipients
(Recipient emails).
Contacts
Web: www.flowmon.com
Email:info@flowmon.com
Tel.: +420 511 205 251
Feedback
We would be pleased if you tell us your comments to this text (typing errors, incomplete or unclear
information). Please, contact us via email support@flowmon.com.
Copyright
This document is intended for informational purposes only. Any information herein is believed to be reliable. However,
Flowmon Networks assumes no responsibility for the accuracy of the information. Flowmon Networks reserves the right
to change the document and the products described without notice. Flowmon Networks and the authors disclaim any
and all liabilities.
Except as stated herein, none of the document may be copied, reproduced, distributed, republished, downloaded, dis-
played, posted, or transmitted in any form or by any means including, but not limited to, electronic, mechanical, pho-
tocopying, recording, or otherwise, without the prior written consent of Flowmon Networks. Any unauthorized use of
this specification may violate copyright laws, trademark laws, the laws of privacy and publicity, and communications
regulations and statutes.
Flowmon logo is a trademark registered to Flowmon Networks, a.s. Other brands and product names are trademarks of
their respective owners.
This product contains NfSen and Nfdump software Copyright © 2004, SWITCH - Teleinformatikdienste fuer Lehre und
Forschung.
All other trademarks are the property of their respective owners. Copyright © 2007 – 2016 Flowmon Networks, a.s. All
rights reserved.