Flowmon Ads Enterprise Userguide en
Flowmon Ads Enterprise Userguide en
00
User Guide
April 30, 2015
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Contents
1 Introduction 6
1.1 Features and capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3 Selected detection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Basics of application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3 Detection methods 28
3.1 Introduction to detection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.1.1 Common configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.1.2 Common features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.1.3 NetFlow sources and assigned filters . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2 Common network behavior patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2.1 ALIENDEV – New or alien device . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2.2 BITTORRENT – BitTorrent traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.2.3 BLACKLIST – Communication with blacklisted hosts . . . . . . . . . . . . . . . . . 33
www.invea.com 2 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
www.invea.com 3 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
4 User interface 64
4.1 Basic controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.1.1 Main application menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.1.2 Status and information bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
4.1.3 Context menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.1.4 Search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
4.2 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.2.2 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4.3 Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.3.1 Aggregated view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
4.3.2 Simple list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.3.3 By hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.3.4 Event details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
4.3.5 Interactive event visualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.3.6 Event evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
4.4 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
www.invea.com 4 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
4.4.1 Chapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.4.2 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.4.3 Default report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
4.4.4 Scheduling reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
www.invea.com 5 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
1 Introduction
FlowMon ADS is a modern system for detection of anomalies and patterns of undesirable net-
work behavior, which is based on an analysis of data flows in the network (NetFlow). The main
goal of the solution is to increase external and internal security of a computer network. The main
advantage over standard IDS systems lies in orientation on the overall behavior of the device on
a network, which enables to respond to yet unknown or specific threats for which the signature
is not available. Integrated dashboard displays a quick overview of the latest events and overall
statistics of events. This allows for immediate identification of problems or problematic devices in
the network.
• Introduction –the first chapter, which aims to familiarize users with the features and capa-
bilities of the FlowMon ADS plug-in
• Installation and configuration – the second chapter designed for system administrators is
dedicated to the installation and detailed configuration of the plug-in
• Detection methods – the third chapter exactly specifies the features of the application, part
of the chapter describes the best practices and interpretation of results
• User interface – the fourth chapter is intended for ordinary user working with the application
• Contact information – a summary of contacts for the vendor and distributor of the plug-in
• Building long-term behavioral profiles of devices on the network in terms of provided and
used services, traffic volumes and communication partners
• Predefined set of rules for detection of undesirable behavior patterns – operational issues,
attacks, unwanted services
www.invea.com 6 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• Predefined set of rules for detecting network anomalies such as behavior change of devices
on the network, discovering new network services, etc.
• Interactive visualization of events and relevant context in the form of directed graphs
• Complex filtering options and event prioritization linked to reporting and alerts
• Support for adding custom information about IP addresses (name, role, username. . . )
1.2 Limitations
Application is designed for following environment:
• General anomaly detection system based on change of behavior for 2500 unique IP addresses
• In case of deploying the application in an environment which does not fulfill the requirements
please contact the application vendor
www.invea.com 7 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Detection of attacks:
www.invea.com 8 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• Internet Explorer
• Opera
• Google Chrome
• Safari
User interface is divided into three main parts. In the upper part of the application is the status
and information bar, on the left shows the application main menu, which you can hide if neces-
sary. The remaining area of the user interface is the user’s desktop, where you see the information
and functionality combined under the currently selected item in the main application menu.
Another means of controlling the application is a context menu available by right clicking on
relevant object.
www.invea.com 9 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
www.invea.com 10 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Installation process will automatically apply Common company configuration template con-
figuration template to the application. Common used detection methods and parameters will be
activated by this process. There is also prepared one NetFlow data source for the first monitoring
port on the probe. This NetFlow source must be activated manually. Information about NetFlow
source configuration is described in chapter 2.3.10 Configuration of NetFlow data sources.
The FlowMon ADS application in version 7.0 or higher can be installed only on FlowMon probe/-
collector version 7.01 or higher. The license is since application version 6.0 part of united FlowMon
license. The license has to be loaded using FlowMon Configuration Center. It is recommended to
use the new license type for properly working application. If the application is upgraded from an
older version than 6.0, please ask the INVEA-TECH company for the new license file.
1. Log into the plug-in –use the credentials used to log into FlowMon Configuration Center to
login. You can change your password and define other users through FlowMon Configura-
tion Center under System tab. More information on the management of user accounts can
be found in the FlowMon probe/collector documentation. The currently logged-in user can be
edited using the button with username in right upper corner.
2. Going through the configuration wizard – the welcome window with the link to configura-
tion wizard is shown after the first login into application (the wizard can be started using the
question mark icon from the Traffic processing agenda as well).
www.invea.com 11 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The first step of the configuration wizard is applying the configuration template. The template
creates the basic IP range filters ans sets default values to the detection method parameters.
It is possible to extend the LAN filtr based on private IP ranges of the public IP addresses of
the monitored network segment, define specific devices in the network (e.g. DNS servers), set
the size of the monitored network and allow the use of external services (blacklist downloads)
in next steps. All set values are used for relevant detection method parameters.
Parameter Delete data after is used to set deleting old data. It is useful for archiving events
for later analysis. The value Never sets data lifetime to infinity while After default period sets the
default values (event – 183 days).
Number of days for which the data for the overview graph are being stored can be set by Days
to keep overview chart data parameter.
The FlowMon ADS allows to raise the performance using the SuperFast ™ mode. Using this op-
tion is recommended only for huge networks that generates more than 1000 flows per second. The
activation of the SuperFast ™ mode on smaller networks could cause the slowdown of the applica-
tion. It is necessary to limit the maximal amount of memory that can be used by the SuperFast ™
mode, too.
The Filter booster parameter is appropriate to activate if and only if there are some filters with
www.invea.com 12 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
many IP ranges defined in the FlowMon ADS application (e.g. using wildcards). The activation can
cause lack of performance otherwise.
The admin user can lock the traffic processing configuration (e.g. detection methods configu-
ration, filter configuration, . . . ) for non-admin users using the Lock configuration for non-admin
users option.
Access to external services (Internet services) might be allowed or denied using External ser-
vices option. If internet access is denied then geolocation services, whois service or detection
methods depending on external sources are unavailable. For details, see information on the vari-
ous detection methods.
The application uses all available CPUs. Parameter Maximal count of computational threads
allows limiting the number of CPU cores, which application can utilize.
The application allows resolving event source IP address immediately after event detection. This
function enables to determine the identity of the event source associated with a short IP address
using DHCP. IP addresses which should be resolved are defined by Capture source hostname.
Service mail is used for sending notifications in case of exceeding disk quota for ADS plug-in.
In the configuration section, functions for the management of device configuration are available.
All user data can be deleted anytime (Clean-up all data) or you can bring a device into the
factory setting (Reset to factory defaults), which also includes deleting all user data. User data
include all events. Deletion of data or resetting the device to factory defaults requires restarting
the device or restarting the plug-in through FlowMon Configuration Center under the Version
tab. If reset is not performed before midnight, clean-up data settings and reset to factory defaults
www.invea.com 13 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
settings are deleted. More information on managing the plug-in can be found in the FlowMon
probe/collector documentation.
The application stores resolved DNS names for a short time period. It can be deleted using the
Clear DNS cache button.
To simplify the configuration of devices there are pre-defined templates for plug-in settings
available (Apply configuration template). Templates include configuration of NetFlow data filters,
individual detection techniques and perspectives setting. Application of template can be enforced
(Force), which means that the current setting which is in conflict with the selected template is
overwritten. There are currently following templates:
• Common company configuration template – template designed for small and medium-
sized organizations. Filter settings include commonly used private addresses (10.0.0.0/8,
172.16.0.0/12, 192.168.0.0/16). Activated detection methods and their settings correspond to
the typical security needs of small and medium sized organizations. Automatic anomaly de-
tection system is not activated network-wide; it must be activated afterwards on selected
portion of the network. Within the perspective settings the highest priority is given to events
that might indicate an attack or a serious breach of network security.
• Large company configuration template – template designed for large enterprises. Filter
settings include commonly used private addresses (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). Ac-
tivated detection methods and their settings correspond to the typical security needs of large
sized organizations. Automatic anomaly detection system is not activated network-wide; it
must be activated afterwards on selected portion of the network. Within the perspective set-
tings the highest priority is given to events that might indicate an attack or a serious breach
of network security.
• Internet service provider trunk template – template designed for large backbone net-
works. Filters are not part of the template. Activated detection methods and their settings
correspond to the typical security needs of ISP networks focused on massive attacks and
anomalies in the network.
It is possible to save current application configuration and restore if needed. Application con-
figuration is not portable between application versions. Configuration backup can be done auto-
matically every midnight, too. The automatically created backup files are deleted except the 14
newest.
www.invea.com 14 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
FlowMon ADS allows to display configuration changes, that were done by individual users.
Changes are shown in a tree form and sorted by username and date when the change was made.
The changes could be searched using the search criteria filter.
FlowMon ADS application allows admins to limit the data, that can be viewed by some non-
admin users. To limit the events, that can be shown to the given non-admin user, it is possible to
assign the perspective to each of these users. The user can view only the events, that are defined
in the perspective, and the method instance configuration appropriate to these events.
The perspectives can be defined using the simplified interface. It is enough to select the NetFlow
source, the IP address filter and to assign the priorities to the event types. The selected source and
filter is then assigned to each defined priority (the filter is assigned twice to each priority – once as
source filter and once as target filter).
www.invea.com 15 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
– Assigned filters
* User can see only filters assigned to him. He cannot edit them.
* Filter assigned to the user limits the content of displayed report chapters.
– Assigned perspectives
* User can see only perspectives assigned to him. He cannot edit them.
* User can see only the methods (and relevant events) that are defined by the perspec-
tives assigned to him.
* User can see only these e-mail reports, that are connected to perspectives assigned
to him.
* User can see only NetFlow sources connected to priorities in perspectives assigned
to him.
* Perspective assigned to the user limits the content of displayed report chapters.
* User without assigned perspective can see all NetFlow sources (including relevant
events and overview charts).
* User with assigned perspective with some priority defined as independent on Net-
Flow source can see all NetFlow sources (including relevant overview charts, but
events are limited by the perspective).
www.invea.com 16 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
– User can see the report if he can see all of its chapters.
– User can see the chapter, if:
Events by priority The filter and perspective that are set have to have the non-empty
intersubsection with the filters and perspectives assigned to the user
Event matrix The filter and perspective that are set have to have the non-empty inter-
subsection with the filters and perspectives assigned to the user
Overall status The perspective that is set has to have the non-empty intersubsection
with the perspectives assigned to the user.
• Viewing the threats (since FlowMon ADS version 6.06) by non-admin users
– User can see the threats, that consist only from particular events, which can be seen by
the user according to the perspectives assigned to him.
– User can see only the threat methods configuration that are based on at least one de-
tection method, which can be seen by the user according to the perspectives assigned to
him.
• Universal facts
In case, that there are services provided on unconventional ports in the monitored network, it
is appropriate to add this assignment (port number-service name) to the Named services list. This
assignment is used in event details of DOS and SRVNA detection method.
www.invea.com 17 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
It is possible to get additional info about IP addresses using any available web services. Defined
services can be invoked using context menu over an IP address. New tab on the current page is
opened after querying. The query is an URL address. In this URL should be used an $IP variable
that is replaced by the given IP address.
It is possible to use an $MAC instead of $IP variable. That web service can be applied on the MAC
address in the Event evidence view.
User can set own parameters of user interface. It is possible to enable logout confirmation dia-
log box, select default language for user interface, set the session timeout, enable displaying of the
application tips, enable automatic domain names resolving, showing the welcome screen window
and disabling the automatic load of the dashboard tables. Next, it is possible to hide the inactive
methods from the search criteria filters. Each user can set the default scale (logarithmic/linear) for
the Dashboard:Overview view.
NetFlow data sources represent individual monitored points of the network and are one of the
licensing restrictions (number of simultaneously active NetFlow data sources). The second licensing
restriction is the number of concurrent users working with plug-in user interface. For each moni-
tored point of the network a NetFlow data source must be created in the plug-in. Configuration of
data source includes:
www.invea.com 18 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Channels Channel selection which are used as input data for application.
Deduplicate If active, the uniqueness of the NetFlow received by one NetFlow source is guaran-
teed.
Check timestamps If active, the NetFlow with timestamp that differs more than 30 minutes from
system clock are deleted.
SIP processing The switch between the NetFlow data processing and processing of NetFlow data
enhanced with the SIP entries. It is impossible to process both (NetFlow data with SIP en-
tries and NetFlow data without SIP entries) on the single NetFlow source together. Only the
detection methods with "SIP" prefix are used if the SIP processing is active.
Proxy active performs the replacement of two flows client-proxy and proxy-server by one flow
client-server. This correlation allows the functioning of some methods that would not be able
to detect events correctly in the network with proxy to work properly. Within the method con-
figuration it is possible to set up the tolerated data amount difference between the two par-
ticular flows that have to be correlated (Tolerance) and the counts of milliseconds that could
take the flows outer the proxy longer (ReqDurationOverload – request, RepDurationOver-
load – reply). The correlation has got high accuracy and coverage but it is not absolute.
The correlation of flows before and behind the proxy is possible only if the network is moni-
tored at two points – inside the network behind the proxy server and outside the proxy server.
It is necessary to set up the IP addresses of outer (External IP) and inner (Internal IP) inter-
faces and the proxy server’s listening port (Internal Port). For reducing false positives, the
proxy clients (Clients Filter) can be specified. It is possible to define more proxy servers for
each NetFlow source. The maximum count is limited by license.
Channels as virtual sources It is possible to activate so called Virtual sources for NetFlow sources.
These virtual sources are dedicated to isolate NetFlow data from individual channels of the
input profile. These virtual sources allows the channels to be assigned to the instances of de-
tection methods and to the priorities. Data from different channels are processed separately
from each other if active.
The NetFlow sources use (since the 6.04 version) directly the profiles on the collector (or on the
built-in collector of the probe), so it is not necessary to forward the data to next target. The NetFlow
sources can be used on any real profile, so the input data can be filtered on collector level. This
www.invea.com 19 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
leads to decrease the load of the FlowMon ADS application. The FlowMon ADS NetFlow sources
support the NetFlow v5, v9 and the IPFIX protocol.
After configuring NetFlow data sources (hence configuring the profiles) you should configure
theDetails on configuring the exporters can be found in FlowMon probe documentation. The gran-
ularity of flows impacts the accuracy of detection methods. To reduce the number of flows that are
generated by the probe following values are appropriate:
• inactive timeout – 30 s
Correct settings of NetFlow data sources and the logical network topology affects the results
of the detection methods and the overall plug-in predicative capability. The basic distinguishable
entity in the plug-in is the IP address. When the occurrence of an event is detected, the event is
bound to an IP address that caused it and to NetFlow data source on which the event has been
detected. That implies a number of limitations when IP addresses are dynamically allocated and
stable allocation of identical IP addresses to each network device is not guaranteed. In such case
it is not possible to derive a direct responsibility of particular user for the event detected in the
network.
Filters are named logical groupings of arbitrary IP addresses. Each filter has a unique name,
can be linked to the defined NetFlow data sources and includes any number of IP address ranges.
Filters are also used by detection methods for limiting the range of the addresses relevant for each
detection method. Binding to NetFlow data sources can further reduce the processing of NetFlow
data in the detection method (see example later in this subsection). IP addresses for filters can be
specified in the following ways:
• Single IP address for IP version 4 and 6 (e.g. 192.168.2.1) or comma separated list of single IP
addresses
www.invea.com 20 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
192.168.1.0/24;LAN
192.168.10.0-192.168.10.25;LAN
192.168.1.1;SMTP
Figure 3: Example of filter definition file
• Wildcards notation of IPv4 addresses (enumeration, range, all), only single wildcard can be
used in one IP address. Examples:
It is strongly recommended to activate the Filter booster parameter in the General configura-
tion\Storage if there is a lot of IP ranges defined in some filter.
New filter can be created also as a subtract of two another filters. This can be performed by
the Subtract filters button. Similarly, Invert the filter button creates a new inverted filter from
already existing one.
It is possible to use Import filters button for import filter definitions from the text file. Format
of the file is one filter definition per line where IP address definition is in the first column, Name of
the filter is in the second column. Columns are separated by semicolon. IP address can be specified
in the same ways as manual filter defining. If the name of the filter already exists in the application,
you will be noticed and the import fails.
If the checkbox Overwrite existing filters is checked then the IP ranges of the filters with same
name as in the uploaded file are overwritten by new ones that are given in the file
www.invea.com 21 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
IP;Host;Role;Username;OS;HWconfig
192.168.1.1;stone.foo.com;LAN gateway;;CentOS 5.5;
192.168.1.33;pc33.foo.com;client-station;Johny;WindowsXP;VM
Figure 4: Example of the content of the file to import information about IP addresses
didn’t bind filters with NetFlow data sources, there would be duplication in the detection of Instant
Messaging (identical data would be processed twice independently).
It is possible to add own information from CSV text file by using Import IP information button.
Information can be downloaded back by Export IP information button. Remember, the import
deletes all previous information! Following fields are supported:
The text file consists of a header and records. The header contains of list of fields separated by
a semicolon. It must include required field IP and at least one optional (Host, Username, OS,
HWconfig, Role, Notes). Each record is on a single line. The fields are separated by a semicolon.
Empty lines are ignored. More records can be added to one IP address.
Detection methods are predefined by the manufacturer and used to detect various potentially
undesirable activities on the network. Thus they build the core of FlowMon ADS plug-in. The
various methods are described in detail in the third chapter.
www.invea.com 22 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• activation/deactivation of a method
• specific configuration (methods may have specific configuration parameters that can be set
or actions that can be performed)
Depending on the method nature some of the above options can be inactive. For example system
methods (e.g. event reporting) cannot be turned off nor assigned with filters. All configuration
changes will take effect immediately upon next batch of NetFlow data processing by given method.
Aggregation of events merges some events into groups and allows to define patterns of larger
attacks which consist of several sub-events. Individual aggregations of events can be activated or
deactivate. Parameter Window sets maximum time in seconds between two separate events.
In the FlowMon ADS plug-in you can create your own event perspectives that will assign events
with priorities according to their type, the network segment where they occurred (based on the
filter) and to the NetFlow source, that provides NetFlow data used for event detection. Priority can
be assigned to all sources by keeping default value NONE in the selection of the source. These
perspectives can then be used when reporting events, alerting or searching in the application UI.
Each perspective is a uniquely named group of assigned priorities to events of given type (i.e. to
events generated by given detection method), and thus either network-wide or depending on the
filter.
www.invea.com 23 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• CRITICAL
• HIGH
• MEDIUM
• LOW
• INFORMATION
The default perspectives can be generated using the Create default perspectives button (the
icon with the star).
In subsection Event categories you can define your own event categories into which you
can then assign events through Manage event categories context menu item. In this way you
can mark interesting events that should be further explored; marks can be used in subsequent
searches.
Detected events can be marked as false positives through Mark as false positive context menu
item. This mark means that the event of given type caused by given IP address will no longer be
reported. Validity of marking an event as false positive can be limited to individual days of the week,
time intervals and the NetFlow source. The validity of marking an event can be limited only to the
targets of the current event as well. If there is a limitation by the targets of the events, it is possible
to ignore the event source. The event source or event targets relevant to the rule can be defined
by filter as well. It is recommended to use these filters to define the restrictions based on event
source and event target IP addresses because of the limitations on the false positive number.
It is possible to send an e-mail about the false positive event to the INVEA-TECH company. The
e-mail will consist from event details data, NetFlow entries that are related to the event, application
www.invea.com 24 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
model and version and from the customer’s name. That data will be used to enhance the perfor-
mance of the application. The data will be processed in accordance with the law on personal data
protection.
The false positive rule can be defined by weekday choice. The events can be ignored during
the whole day or within the interval specified by the event time and by the radius of the interval in
minutes. The rule has to be connected to event source or to some (or all) event targets. It can be
set the validity and the comment to the rule.
It is possible to define the false positive rule without respect to the event on which was was this
dialog window opened. It is possible to manually choose the detection methods, enter the source
and target IP addresses and enter the time range. The rule is always created for each combination
of detection methods and source IP address, the targets are all assigned to each rule.
IP addresses can be entered as comma separated list. When entering the IPv4 address, one
of its fields can be written using wildcard. This wildcard can represent the numbers enumeration
(comma separated list enclosed in curly braces), range of two numbers (2 numbers separated by
dash enclosed in square brackets) or the asterisk that represents the 0-255 range.
Examples:
Removal of rules for false positives marking is done in the Traffic processing\False positives
subsection. Removal of selected rules can be done through Delete selected.
It is possible to edit the comments of the false positives in this subsection, too.
www.invea.com 25 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
FlowMon ADS plug-in allows you to define regular reports which will be sent via e-mail by the
application.
Each e-mail report must be uniquely named and bound to just one perspective. A report has
active/inactive state. The inactive report is defined in the system but not sent regularly. The report
can be assigned with any number of recipient addresses by Add new mail. There is also an option
to suppress sending of an empty report (Prevent empty report – only daily and weekly reports can
be sent empty, if disabled) and option to set minimum priority of events to be reported (Minimal
priority to report). Reports are sent according to the following rules:
• CRITICAL – reporting immediately after the batch processing of NetFlow data, approximately
every 5 minutes, a blank report is never sent.
You can use the Same events gap parameter to suppress repetitive sending the same event in
the given report for the chosen time period. The events with same event type and event source are
considered as a same. Only one same event is reported in the long-term report (reports for priority
HIGH or lower) if set to non-zero value.
The FlowMon ADS application allows to sending e-mail reports in few formats. The Full for-
mat sends the reports as a table formatted by HTML, the Compact format sends the reports in
plain text, the Extra compact format is also in plain text, but there are some omitted information
(e.g. event detail, event targets etc.). The Mail per event format sends in one e-mail only infor-
mation about single event and it is dedicated especially for automatic processing. This report is in
a following format:
www.invea.com 26 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
It is possible to send reports as a tickets to the ticketing systems. Nowadays, the RT ticketing
system is supported. The format has to be set to RT value. This format is adding three attributes
into the e-mail header: X-RT-Tool-Name, X-RT-Incident-IP and X-RT-Incident-Time. The first at-
tribute is always set to the “FlowMon ADS - ” string concatenated with the name of the event, the
others have assigned their values with respect to the reported events. There are all events with
given type related to the one IP in the single e-mail/ticket.
It is possible to send reports using your own SMS gateway. Please contact the vendor, company
INVEA-TECH a.s., in case you want to use this possibility.
Application also supports event export in chosen format (e.g. Common Event Format) to one
remote syslog which can be configured in Event reporting subsection. All events are exported
according to selected perspective, according to this perspective they may be assigned with a specific
level (CRITICAL priority fits to the alert severity). It is possible to extend the syslog message with
the field that contains the unique identifier of the event by setting the parameter EventId to the
value “yes”. If the remote syslog is listening on nondefault port it is possible to set the port number
to the current value (Port). It is possible to activate sending one syslog message for each event
target (Divide by targets parameter). The count of messages for single event is limited by the
value of Max messages for one event parameter. The last message for the given event contains
the list of the remaining targets. Syslog messages are sent using the daemon facility. If the Machine
readable syslog parameter is active, the list of tuples parameter:value is used as a format of the
event detail for better parsing.
Application supports exporting events using SNMP too. Events are generated as a SNMP traps
that are generated based on MIB file INVEA-ADS-MIB.txt (this file can be downloaded from the
authenticated subsection of www.invea.com pages). Except for the SNMP traps that report the
events there are also generated the SNMP traps of the number of processed flows per a batch and
of the time necessary for processing of the batch. It is necessary to configure the IP address and
the port number of the device, that is dedicated to receive the traps. Then it is required to choose
the perspective.
www.invea.com 27 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
3 Detection methods
Detection methods are the core of FlowMon ADS . They serve for detecting various potentially
undesirable activities on the network or to cumulate appropriate information (behavior profiles).
Detection methods are predefined by the manufacturer who guarantees their development and
expansion according to the current trends in the area of network services and security of computer
networks in particular. Detection methods can be imagined like signatures for IDS systems (e.g.
SNORT). Unlike signatures which represent particular strings to be searched in individual packets,
detection methods contain specific behavior patterns of network devices. FlowMon ADS uses the
principle of detection methods also for other tasks (e.g. event reporting etc).
• Common network behavior patterns – common network behavior patterns that generate
events always when processing the current batch of NetFlow data (typically every 5 minutes).
• Common behavior patterns for SIP traffic – common behavior patterns that are based on
SIP extensions. These methods works only with NetFlow sources with activated SIP process-
ing.
• Advanced network behavior patterns – advanced network behavior patterns that detect
long term trends in network behavior based on continuous processing of NetFlow data.
• Derived behavior patterns – derived behavior patterns that generate characteristics of indi-
vidual devices. They do not directly depend on processing of the NetFlow data. Typically they
use the outputs of the above two detection method groups and are run periodically (every
hour).
A typical duty cycle of the FlowMon ADS application includes performing of following steps:
1. Receiving and storage of NetFlow data – receiving of NetFlow data batch representing the
actual network traffic, typically every 5 minutes.
2. Processing of NetFlow data batch – application of all active detection methods on given Net-
Flow data batch which results in events generation and event reporting. Applications lever-
ages multi-threading to increase overall processing throughput.
www.invea.com 28 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Independently of the NetFlow data processing the application performs regularly every hour active
detection methods from General system procedures and Derived behavior patterns groups.
It is possible to create so called instances of the detection methods. Each instance represents
specific settings of the detection method and it should be connected to some NetFlow sources.
The count of instances is limited by the maximal number of NetFlow sources for each detection
method.
Two types of actions are available for method settings – actions performed collectively on whole
group of instances and actions performed on single method instances.
www.invea.com 29 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• Adding new method instance – it creates new method instance with configuration along
the method configuration template. It is necessary to assign the method instance to some
NetFlow sources (New instance).
• Setting the time to store outputs – it sets the time period within which are the outputs of
the detection method stored in the system (Set Delete after parameter).
Actions for single method instances These actions are available in addition to events corre-
sponding to actions available for templates:
• Delete method instance – it removes the given method instance (Delete method instance).
• Perform action – some methods allows to call actions that are related with the given method.
This action could be for example deleting the learned classifier. The action is performed after
clicking the Perform action button.
• Assigning filters to the method instance – most methods may be restricted in terms of pro-
cessed traffic by assigning filters to them (Assign filters). This setting is reflected immediately,
precisely when processing the next batch of NetFlow data.
• Periodic deletion of events – all detection methods which generate events offer their peri-
odic deletion through a configuration option DeleteEventsAfter indicating the number of
days for which the events remain in application memory. Older events are automatically
deleted. When the option is set to value “0” events are never deleted.
www.invea.com 30 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• The method instance is always processing only the data from assigned NetFlow sources.
• Data from single NetFlow source are processed isolated, the classifiers based on these data
are also kept separately for each NetFlow source and each method instance.
• The assigned IP address filter restricts the data according the source or destination IP ad-
dresses (details follow).
• There is no need to use the IP filter, if all data from the current NetFlow source satisfies this
filter.
• It is better not to use any filter instead of using the filter with all IP addresses.
www.invea.com 31 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network. Appropriate place for monitoring the traffic is the central switch.
Interpretation of results This method is able to detect unknown (or forgotten) devices that are
connected to the monitored network.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses excluded from communications on the LAN by the option
LANFilter. Appropriate place for monitoring the traffic is the Internet connection line.
Interpretation of results This method achieves very reliable results in detection of notorious P2P
downloaders. On the other hand, incidental and occasional use of P2P network may not be
detected, especially when strict mode is set on. Furthermore, this method may alert to spy-
ware infected devices, whose symptoms are often similar to the symptoms of P2P networks.
www.invea.com 32 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Inter-
net connection line. To update the list of IP addresses correctly it is necessary not to block
the communication of the device (probe/collector) to port 443 (HTTPS, standard secured web
traffic) on services.invea.com server.
Interpretation of results This method uses the INVEA-TECH blacklist service. If some of the black-
listed IP addresses are marked as the event originator it’s probably a network attack on the
organization. If some of the organization IP addresses is the event originator it’s likely to be
part of botnet or infected with some form of malware.
www.invea.com 33 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Interpretation of results The results of this method can be used to identify IP addresses commu-
nicating with the potentially dangerous country destinations.
www.invea.com 34 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Using the parameter TimeWindow you can set the time window (in hours) for collecting and
processing long-term statistics. Filter DHCPServers defines DHCP servers that are used in the
network, it is necessary for proper detection of bogus DHCP servers. Parameter DHCPThresh-
old specifies the maximum allowed increase of observed DHCP traffic. The parameter Traf-
ficSizeThreshold is used to set the minimal amount of DHCP traffic for an individual IP ad-
dress to be considered as the flood attack. The detection of fake DHCP servers can be en-
abled by the parameter FakeDHCPDetEnabled. It is possible to exclude communication of
DHCP servers from detection of anomalously increased DHCP traffic (servers defined by filter
DHCPServers).
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses and additionaly set a filter defining DHCP servers. Appro-
priate place for monitoring the traffic is the central switch.
Interpretation of results The method is able to detect flooding attacks in DHCP traffic and suspi-
cious increase of the volume of communication. The typical example is DHCP discover flood-
ing which is used to exhaust resources of DHCP server. Detection of fake DHCP server can
indicate attempted man-in-the-middle attack or incorrect configuration of a network device.
Method configuration It is appropriate to activate this method for IP addresses from own net-
work, that shouldn’t be able to communicate directly into the Internet (e.g. due to security
guidelines). Appropriate place for monitoring the Internet is the connection line.
Interpretation of results This method is capable to detect devices that communicate directly into
the Internet even if they are expected not to do this (they should use proxy server or they
should communicate only with other devices inside the local segment).
www.invea.com 35 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method for IP addresses from own net-
work or for all addresses when monitoring publicly available server farms. Appropriate place
for monitoring the traffic is the central switch as well as the Internet connection line.
Interpretation of results This method is capable of detecting devices that scan ports, spyware of
infected devices or misconfiguration of the devices. Typical false positives include detection
of devices implementing SNMP Monitoring such as Zabbix.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line.
www.invea.com 36 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Assigned filter Filter is used for restricting source IP addresses (classifier and illegal DNS servers
detection), source or destination IP addresses (large UDP packets and DNS TCP transfer de-
tection).
Interpretation of results This method is capable of detecting DNS service abuse for other unde-
sirable activities, which typically include tunneled traffic. The sudden change of usage of DNS
servers could indicate the malware infection.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the central
switch.
Interpretace metody This method alerts to the misuse of the provided service. The solution of
this situation can be the change of the service configuration.
www.invea.com 37 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (for large organizations with the vast network).
Assigned filter Filter is used for restricting source IP addresses (victim of the attack).
Interpretation of results This method reliably alerts to the DoS/DDoS attacks of the specified
minimum range.
Method configuration It is appropriate to activate this method only for IP addresses from own
network. The appropriate place for monitoring the traffic is the Internet connection line.
www.invea.com 38 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Interpretation of results This method reliably alerts to the IP addresses which transferred more
data then it is allowed.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network except for the IP addresses from which we except the access to the honeypots (e.g.
because of configuration). It is necessary to set up the name of the filter defining honeypots
for proper functioning. Appropriate place for monitoring the traffic is the Internet connection
line or the central switch.
Interpretation of results This method alerts to the unauthorized access on the chosen comput-
ers in the network. It could mean horizontal scanning or the attempt to network-wide ssh
attack.
Method configuration It is appropriate to activate only for the webservers in the monitored net-
work, possibly for all traffic on the network (to detect attacks from clients in the monitored
network). Appropriate place for monitoring the traffic is the Internet connection line or the
central switch.
www.invea.com 39 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Interpretation of results The method highlights the increased count of sending the same-sized
file from the webserver to single client. That probably means the dictionary attack on the web
login form.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch.
Interpretation of results This method shows clearly the excessive usage of internet connection.
www.invea.com 40 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
crease of observed ICMP type 3 messages and parameter Type3MsgThreshold is used to set
the lower bound of ICMP type 3 messages for a single IP address (minimal number of mes-
sages that could be considered as anomalous). By setting the parameter ICMPSmurf and
ICMPScan to 1 you will enable detection of ICMP smurf attacks and ICMP scans, respectively.
The ICMP scans part of detection method can be limited by minimal count of scanned devices,
too (the ScannedDevices parameter).
The ICMP echo request flood detection is limited by the PingFloodThreshold parameter. Its
value defines minimal count of sent echo request packets. If the value equals zero, echo
request flood detection is not performed.
Excessive payload of ICMP packets detection is limited by MinimalPackets and MinimalPay-
load parameters that corresponds to minimal count of given ICMP type and their minimal
average payload. If the MinimalPayload parameter equals zero, the excessive payload of
ICMP packets detection is not performed.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
Interpretation of results The method is able to detect increase of ICMP type 3 messages (Un-
reachable). This could happen during spread of worm, especially in case when UDP protocol
is used and hosts with closed ports send back ICMP Port Unreachable messages. ICMP scans
are used to determine live hosts in the network and it could be used by malware. The goal
of ICMP smurf attack is to flood the network and especially connection link to the victim with
a large number of ICMP Echo replies.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
www.invea.com 41 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Interpretation of results The method detects devices communicating over IPv6 protocol thah is
tunneled through IPv4.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (with option LANFilter set).
Interpretation of results Although this is a heuristic the method achieves very reliable results
in the real traffic. In some cases the confusion of roles of the event originator/event target
occurs, i.e. IP address from a local network that runs the client’s instant messaging is marked
as the event target and the server of the service as the event originator.
www.invea.com 42 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
one detects packets with the same source and destination IP address. Both IPv4 and IPv6 are
supported.
The filter InternalNetworks specifies the range of allowed internal networks and it is impor-
tant for the first part of the detection (IP spoofing). It is possible to individually enable or
disable each part of the detection using parameters IPSpoof, SourceIPAnom and SameSr-
cDestAnom. Enabling the parameter IgnoreBroadMulticast you can inhibit the detection of
IP spoofing for the flows with multicast or broadcast destination IP address. The flows with
link-local IP addresses and zero network broadcasts are by default excluded from detection
of IP spoofing.
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the Internet
connection line or the central switch (with option InternalNetworks) set).
Interpretation of results The communication of IP addresses outside the scope of local networks
may indicate IP spoofing or an attempt to modify IP headers. In case of flows with incorrect
IP addresses (broadcast or multicast source IP address or the same source and destination
IP address) it could be an attack on some implementation issue of TCP/IP stack of a network
equipment.
www.invea.com 43 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
for example data link between two workplaces of the organization or line to the organization
servers.
Interpretation of results This method shows a particular value of delay between recording of the
first request packet and the first response packet. This value thus indicates the delay at the
network layer and can help in analyzing the problem of latency in selected application or data
link. The method can also be used to check the SLA on the selected data link.
Method configuration In the case of network problems or suspicion to problems associated with
multicast traffic, it is appropriate to activate this method network-wide for all communication
in the network regardless of IP addresses. Appropriate place for monitoring the traffic is the
Internet connection line or the central switch.
Interpretation of results This method reliably alerts to the IP addresses on the network that gen-
erate multicast traffic.
www.invea.com 44 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The method takes interest in the TCP/25 (SMTP), TCP/465 (Secured-SMTP) and TCP/587 (Mes-
sage Submission service). Based on the number of flows and responses from the mail servers
the method estimates the number of emails and whether the emails were actually sent. This
information is then available in the detail of the generated event. Event targets represent all
mail servers through which attempts to send mail were made.
The option ServersFilter identifies legitimate SMTP servers through which you can send mail.
The option StrictMode set to value “strict” means that IP addresses assigned to the method
by the filter have to be the sources of the event. The option ExcludeMailServers set to value
“exclude” means that IP addresses from the ServersFilter list are excluded from detection.
The option IgnoreSecuredSMTP allows to ignore secured SMTP traffic (port TCP 465). The
option IgnoreScans set to value “ignore” allows ignoring too small transmission, that can’t be
e-mail traffic. The option IgnoreTCP587 allows to ignore Message Submission service (port
TCP 587). The option IgnoreFailed allows to ignore e-mail delivery failures (e.g. mail server
isn’t responding).
Method configuration It is appropriate to activate this method for IP addresses of the organi-
zation. Appropriate place for monitoring the traffic is the central switch and the Internet
connection line.
Assigned filter Filter is used for restricting source IP addresses (according the StrictMode param-
eter and in the profiler part of detection).
Interpretation of results This method not only detects attempts to spam, but also may help to
identify spyware infected devices. Further it may help detecting employees that use other
than corporate mail servers, which may indicate misconfiguration as well as an intention.
www.invea.com 45 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The average and standard deviation of communication partners statistics are calculated for
the sliding window during the detection. If the current count of unique communication part-
ners is higher than the sum of average and the standard deviation, then the increase rate is
calculated. The event is reported if the increase rate is higher than the value of the Threshold
parameter.
Method configuration It is appropriate to activate this method only for IP addresses from moni-
tored network.
Interpretation of results This method alerts increased number of communication partners for
certain IP address.
www.invea.com 46 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
for successful detection. The DetectOnlyKnown and IgnoreChaotic are ignored in this type
of detection.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
If the PortBasedDetection parameter is active, it is appropriate to activate this method only
for IP addresses from monitored network. The event is then reported only if some IP address
from this definition is scanned.
Assigned filter Filter is used for restricting source or destination IP addresses, for destination IP
addresses only in case of portbased detection.
Interpretation of results Apart from detecting attempts to deliberate port scanning this method
may detect misconfigured devices which are unsuccessfully trying to establish a connection
or devices infected with malware that is trying to replicate itself to other devices.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line. It is
recommended to activate the OnlyRejected parameter if the detection is performed on the
sampled traffic.
Interpretation of results Apart from detecting successful Denial of Service attack this method
may also detect an erroneous configuration – either on server, which does not provide the
www.invea.com 47 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
service that should be provided, or on the clients, which demands services that are not pro-
vided.
Method configuration It is appropriate to activate this method only for IP addresses from the
monitored network. Appropriate place for monitoring the traffic is the central switch.
Interpretace This method detects devices that are sharing their desktop using TeamViewer.
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line. By
setting the option IgnoreScans to value “yes” it is possible to detect devices that are infected
with some form of malware (e. g. botnet Chuck Norris) invading other network devices such
as routers, IP cameras, etc.
Interpretation of results This method detects devices using or attempting to use the Telnet ser-
vice (depending on configuration). The method can also detect specialized devices that are
infected with some form of malware oriented to misuse specialized network devices.
www.invea.com 48 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method for client stations of the monitor-
ing network. Appropriate place for monitoring the traffic is the Internet connection line.
Interpretation of results This method detects client’s stations that are using the anonymity Tor
protocol while they are browsing the Internet.
Method configuration It is appropriate to activate this method for client’s stations of monitoring
network. Appropriate place for monitoring the traffic is the Internet connection line.
Interpretation of results This method reports the stations from which a file was uploaded, so it
may be an attempt to sensitive data leakage.
www.invea.com 49 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method for explicitly selected IP addresses
of organization whose traffic structure is known or expected. Appropriate place for monitor-
ing the traffic is the Internet connection line.
Interpretation of results This method focuses solely on pairs of port/protocol therefore it can
produce large number of false positives in case that it is misconfigured.
Method configuration It is appropriate to activate this method for explicitly selected IP addresses
of an organization whose traffic structure is known or expected. Appropriate place for moni-
toring the traffic is the Internet connection line.
Interpretation of results This method allows determining the devices on your network using VP-
N/tunnels. Basic detection is focused solely on pairs of port/protocol therefore it can produce
large number of false positives in case that it is misconfigured. Advanced detection success-
fully detects general VPN traffic where all station communication with external network is
going through.
www.invea.com 50 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method for all IP addresses. Appropriate
place for monitoring the traffic is the central switch and the Internet connection line.
Interpretation of results Accuracy of detection depends on the database of known web sharing
services. There is also statistical distortion in the Event evidence. This distortion is caused
by webshare server IP address used during transmission, which is often different from known
gateway address. Therefore the amount of transferred data is less than the amount shown in
the Detail field.
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
www.invea.com 51 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Internet connection line. It is necessary to activate this detection method combined with the
NetFlow source with activated SIP processing.
Assigned filter Filter is used for restricting source IP addresses (attack victims).
Interpretation of results The victim of the attack is shown as a event source. Event targets (at-
tackers or devices trying to attempt actual SIP connection during the attack) have generated
large amount of Register or Invite requests and the victim cannot handle this amount of re-
quests. The flooded victim cannot handle the real phone calls, too.
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
Internet connection line. It is necessary to activate this detection method combined with the
NetFlow source with activated SIP processing.
Interpretation of results The scanning attacker is trying to detect SIP PBX’s and gateways (hori-
zontal, especially Register and Options scans; the information can be misused e.g. for eaves-
dropping) or active SIP addresses (vertical, especially Invite scans; the information can be mis-
used for telephonical SPAM).
www.invea.com 52 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
If the filter is assigned, only devices outside these IP addresses are detected.
Method configuration It is recommended to activate this method for all IP addresses of SIP de-
vices in the monitored network segment. Appropriate place for monitoring the traffic is the
Internet connection line. It is necessary to activate this detection method combined with the
NetFlow source with activated SIP processing.
Interpretation of results The device indicated as SIP proxy (the event source) transmits the SIP
traffic for callers with distinct SIP URIs. This device can be dedicated for wiretrapping the
forwarded communication (Man-in-the-middle attack).
Method configuration It is appropriate to activate this method only for IP addresses that belongs
to sensors. All non-sensors IP addresses in the controlled range would cause high amount of
false positives. Appropriate place for monitoring the traffic is the central switch.
Interpretation of results this method alerts to the wrong behavior of sensor (based on transmis-
sion period, bytes per packet or transmissions per hour). It is necessary to consider how large
and often deviation from standard behavior can be caused by defective sensor.
www.invea.com 53 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate this method network-wide for all traffic on the
network regardless of IP addresses. Appropriate place for monitoring the traffic is the central
switch.
Interpretation of results This method reliably alerts to the increased number of DNS queries,
which can indicate the viral infection of the station identified as the event source.
Method configuration It is appropriate to activate this method for all IP addresses and monitor
www.invea.com 54 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
not only attacks against own servers, but also the attacks from own network to the Internet.
Appropriate place for monitoring the traffic is the central switch and the Internet connection
line.
Interpretation of results The results of this method are relatively straightforward, the method
detects an attack against the RDP service.
Method configuration It is appropriate to activate this method for all IP addresses and monitor
not only attacks against own servers, but also the attacks from own network to the Internet.
Appropriate place for monitoring the traffic is the central switch and the Internet connection
line.
Interpretation of results The results of this method are relatively straightforward, the method
detects an attack against the SSH service. The method may produce false positives when
evaluating activities of some surveillance systems using the SSH protocol.
www.invea.com 55 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is appropriate to activate the method for all the IP addresses depending
on the DNS configuration policy of the organization. Appropriate place for monitoring the
traffic is the central switch and the Internet connection line.
Interpretation of results This method can detect configuration problems, and also alert to new
or unauthorized devices on the network.
Automatic anomaly detection system provided by FlowMon ADS application works on the prin-
ciples of prediction based on short-time historical data. The statistics describing the network be-
havior are predicted for the whole network. In case the outlier between the predicted and the
current value occurs, the possible responsible device is identified and the event is generated.
The detail of the event always contains the predicted value of the relevant statistic, its current
value, its current value computed only for the responsible device and the procentual increase for
this device since the last batch of NetFlow data.
• Transferred data
www.invea.com 56 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• Transferred packets
• Established connections
• Communication peers
The ANOMALY method that is used for automatic anomaly detection has to have assigned the
filter defining the monitored segment to work properly. Two parameters defining the sensitivity of
the classifier can be set.
The first parameter is the length of the sliding window (WindowLengthNet), that defines the
maximal age of data used for the current value prediction. It applies that the longer period is used,
the less adaptable is the classifier in general (therefore more sensitive).
The second parametr is the threshold value for the event detection (NetworkThreshold). This
value defines how much bigger has to be the current value than the predicted value to generate
the event. E.g. if the predicted value is 100, the value of this parameter is 2, then the current value
has to be bigger than 300 (= 100 + (2 × 100)) to generate the event. This parameter can be set to
two decimal places. The lower is the given value, the higher is the sensitivity of the classifier.
The MinimalPart parameter can be used for improving the event source identification. This
parameter defines minimal part of whole traffic relevant to single device and to the exceeded mea-
sure. If the device exceeds this threshold, it gets bigger weight (the devices under the threshold get
the weight equal to 1).
www.invea.com 57 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration It is possible to configure the threshold ratio for each individual metric (e.g.
amount of unpaired flows) and set on or off the detection of wrong active timeout settings on
the NetFlow exporter or the detection of duplicit packets in the monitored network.
Interpretation of results The method is generating simple warnings. These warning can be in-
terpreted as some problems with NetFlow exporters (e.g. wrong configuration, incomplete
data).
Threat detections can be activated, deactivated and configured using the relevant parameters.
The individual threat detections always depends on the set of the simple event detetections. If
there is no active dependency, the threat detection cannot be activated.
The detected threats are displayed in the own tab in the Dashboard:Overview view. The
source, start time, current end time, completion (there will be no further update to the threat,
if closed), aggregated details and the list of particular simple events (dependencies, that are aggre-
gated into the threat) are shown for each threat.
In the moment, the particular event is deleted, the threat is deleted too.
www.invea.com 58 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Each aggregation threat detection can be configured using the Window parameter, which de-
fines the maximal time window between two consecutive simple events (in seconds; if there is no
other desired simple event in the time window, the threat is closed).
Dependencies SSH attack, RDP attack, Web form attack, Communication with blacklisted
hosts (Known botnet command & control center)
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threats has to be interpreted according to the number of particular events. In
case of very high number, it can be sign of an malware infection.
Dependencies Data upload anomaly, Country reputation, Web sharing traffic (only uploads).
Method configuration It is possible to set the minimal threshold for data sent out of the network
for particular event (Threshold parameter) except the Window parameter.
Interpretation The threats can be interpreted as a potential data leaks or as an use of the moni-
tored network to private purposes (e.g. uploading some vacation photos – but there could be
watermarked data in these).
www.invea.com 59 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Dependencies Denial of service attack, Amplificated DoS attack, ICMP anomaly (ICMP smurf
attack, ping flood), Behavior anomaly (increased packet ratio)
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The source of the threat is a victim of some kind of denial of service attack.
Dependencies DNS traffic anomaly (large TCP DNS traffic, use of unusual/unauthorized DNS
server), DNS query volume anomaly
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat can be interpreted as a presence of the malware infection on the device
(the DNS is used as a communication channel to the C&C center) or as a wrong configuration
of the device.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat can highlight the longlasting or frequently recurring high data transfer-
res.
www.invea.com 60 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Dependencies Port scanning (scanning the 22, 23, 135, 137, 139, 389, 445, 1433 or 3389 ports),
SMTP anomaly, Telnet anomaly, Honeypot traffic, Target hosts/ports anomaly (only after
some of the other dependencies), Communication with blacklisted hosts (Known botnet
command & control center)
Method configuration It is possible to set the minimal count of targets for particular events
(MinTargets parameter) except the Window parameter.
Interpretation According the increasing number of the particular events is increasing also the
probability of the malware infection on the threat source.
Dependencies SMTP anomaly (low number of e-mails using low number of mailservers), DNS
traffic anomaly (attempt to use unexpected/unauthorized DNS server), IPv6 tunneled traf-
fic
Method configuration It is possible to set the maximal number of mailservers and maximal num-
ber of e-mails (MaxTargets and MaxEmails parameters) for particular OUTSPAM events ex-
cept the Window parameter.
Interpretation The source of the threat is probably wrong configured – it is trying to use the unex-
pected/unauthorized DNS server, or it is using the unauthorized SMTP server (but still sending
adequate number of e-mails).
www.invea.com 61 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat is highlighting significant changes in the monitored network traffic.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Interpretation The threat source is discovering the monitored network and trying to find some
exploitable weaknesses.
3.9.10 PROXYBYPASS
Method description The method is aggregating simple events informing about the devices that
are bypassing (or trying to bypass) the specified proxy server.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
www.invea.com 62 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Dependencies SMTP anomaly, Communication with blacklisted hosts (Known SPAM sources)
Method configuration It is possible to set the minimal count of mailservers (MailServers param-
eter) for particular OUTSPAM events except the Window parameter.
Interpretation The probability of the threat source sending the unwanted e-mails is increasing
according the number of particular events.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
Method configuration The method does not provide any parameter other than the Window pa-
rameter.
www.invea.com 63 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Dependencies BitTorrent traffic, Instant messaging traffic, Online messaging traffic, TOR
traffic, TeamViewer traffic, Target hosts/ports anomaly, Web sharing traffic, Telnet
anomaly, Country reputation.
Method configuration It is possible to set the maximal count of targets for particular TELNET
events (Telnet parameter) except the Window parameter.
Interpretation The threat highlights using the services/application, that can be undesired in the
given environment – either with respect to theirs nature (BitTorrent), or with respect to the
security (Telnet).
4 User interface
The FlowMon ADS plug-in offers a complete Web user interface based on JavaScript and A JAX
technology. For basic control and accessing various parts of the application there is the main menu
on the left side. The upper part displays the status and information bar, the rest of the window
area serves as the user workspace. Another means of controlling application is a context menu
available by right clicking on relevant object.
Tips of the day are part of the application displayed after successful user login. After login to the
application a welcome screen is displayed. You can find there some important information about
what should be done before you start using the application.
The main application menu is a basic guidepost to all perspectives and features available in the
application. Related functions and views are brought together in joint groups. The main application
menu contains the following items:
www.invea.com 64 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Events Overview of the most important and the latest events, summary of all recognized
events.
Aggregated view Aggregated view brings together neighbor events of the same type of indi-
vidual device into continuous blocks, which are then graphically displayed on the time-
line.
Simple list A simple list of events, advanced searching and filtering of events.
By hosts A view of events grouped by IP addresses, which relate to the events.
Reports A set of HTML/PDF reports (reports on request) that summarize all information about
individual IP addresses available in the plug-in.
Generate report Generate report based on given template and time window.
Reports Configuring the templates used for generating reports.
Chapters Configuring the chapters of reports.
Scheduled reports Scheduling of automatic generating and sending reports via e-mail.
About Displaying a brief information about the application and its version, information about the
number of processed flows, license information, access to user documentation, information
about skipped methods and batches during the data processing.
The currently selected menu item is always highlighted. The main application menu can be
hidden and thus increase the available workspace of the user. For hiding/displaying the main menu
of the application there is a panel separating the main menu from the workspace of the user with
the arrow icon (left – to hide, right – to display). Moving between the individual subsubsections can
be done using the tabs in the user workspace.
Status and information bar indicates selected basic information concerning the application and
its user interface to the user (items are listed from left to right):
www.invea.com 65 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Drop-down menu Switching between individual plug-ins that are available on the FlowMon
probe/collector.
NetFlow sources problem indicator Status icon which has a green color when everything is work-
ing correctly. If there are some warnings or errors, it changes color to orange or red. The most
recent error is displayed on the left of the icon. The number inside the status icon indicates
the number of unread messages. Click on the icon to open a window listing all messages,
time and severity. Users in the admin group can delete these messages.
Language switch An immediate switch of the user interface of the application to the language
selected by positioning the language switch (available English and Czech).
Context menu is a means for fast control of the application. Context menu brings together all
the actions that can be performed with element that is selected in the user interface. Context menu
appears after clicking the right mouse button.
The most frequently used context menu is a menu of IP address/events which includes the
following items:
www.invea.com 66 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
General information The translation of IP address on the DNS name, obtaining WHOIS informa-
tion and displaying custom information about IP address (if specified – see Configuring filters).
The data are displayed in a floating window.
Related events A view of events associated with the IP address, transition to the perspective of
Events\By hosts view.
External IP services Allows to display additional information about IP addresses using user de-
fined external internet services.
Aggregated events A view of aggregated events on timeline associated with the IP address, tran-
sition to the Events\Aggregated view.
Locate in map Traces the physical location of IP address and displays it on the map. This
function communicates with an external service (Yahoo Maps) and for its functionality it
is necessary not to block the communication of the device (probe/collector) to port 80
(standard web traffic) and the External services has to be allowed.
Ping Check availability of selected IP addresses.
Traceroute Is a computer network tool for measuring the route path and transit times of
packets across an Internet Protocol (IP) network.
Display events of this type A view of all events of the same type, transition to the Simple list
view.
Mark as false positive Marks the event as a false alarm, it will be no longer reported. It is possi-
ble to send an e-mail about the false positive event to the INVEA-TECH company. The e-mail
will consist from event details data, NetFlow entries that are related to the event, applica-
tion model and version and from the customer’s name. That data will be used to enhance
the performance of the application. The data will be processed in accordance with the law
on personal data protection. It is possible to add an explanation as a comment during the
marking procedure.
Event details Transition to event details, displaying of related information (categorization, notes).
Event evidence A detailed view of events including all data flows from which the event has been
generated. The view is primarily intended for exporting the evidence from the application;
displayed Web page is adapted to copy its contents in plain text to the clipboard.
www.invea.com 67 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The menu item is only available if the given address of your NetFlow collector data is tied to
the event.
Visualize event A view of the events through an interactive chart based on NetFlow data caused
by the event.
The menu item is only available if the given address of your NetFlow collector data is tied to
the event.
Latency Graphical view of the latency of the packets between monitored devices.
Export as image This function opens focused dashboard or events table in new window as image.
It can be saved or copied into clipboard.
This function is available for Firefox browser only.
Export events to .csv This function exports the events from the displayed table into the CSV file.
Send feedback Allows to send the bugreport or feedback to INVEA-TECH company. The form is
placed on external web page.
Other specific context menu is given under the relevant parts of the user interface description,
namely the context menu available at some dashboard tables. Above the context menu there is
also a tooltip for IP addresses available. Tooltip contains information about the country where the
IP address is located.
It is possible to filter data in all views according to corresping search criteria. For greater clarity
are the search criteria devided to basic search criteria, that are displayed always, and to advanced,
that are available only in the complete form (the complete form can be open by clicking on the
bottom edge of the reduced form).
From, To The relevant period for displaying the information on the dashboard, the period
can be specified directly or chosen from associated calendar.
www.invea.com 68 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
IPs, IP address, Targets IP addresses, which are to be given information on the Dashboard,
individual IP addresses can be separated by a comma. It is also possible to enter the
network address/mask, instead of IP addresses you can enter the DNS name.
In case of IP address field it is allowed to write only single IP address.
4.2 Dashboard
Dashboard is a basic interface element that is displayed to the user right after logging on to the
application. Dashboard is used to obtain an overall picture of what is happening on the network
via a set of top 10 statistics. The default view shows events for the last 24 hours with the possibility
of adjusting the view by changing the corresponding search criteria (From, To, IPs, Event types,
Filters, NetFlowSources).
www.invea.com 69 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
According to dashboard part (Overview, Events only relevant search criteria are available.
4.2.1 Overview
The Overview chart allows to view the comparison of transferred data (packet count, flow
count) with respect to the priority of the events that are detected using this data. If the data were
used to detection of more events with different priorities, the data are displayed according the
highest priority, that was achieved.
Data can be filtered by start and end time, the perspective and the NetFlow source.
It is possible to mark the shorter time period. The available information are displayed for the
marked interval. You can use the context menu over the marked interval to display this data in
other views (Aggregated view, Simple list, By hosts and Dashboard events) or to zoom in or out.
You can shift the marked interval using arrows in right lower corner of the chart and switch the
scale of the vertical axis (linear, logarithmic, left upper corner of the chart).
4.2.2 Events
Top 10 events by priority The table shows the 10 most important events from the chosen per-
spective.
Within the table, you can:
www.invea.com 70 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
• View all events according to selected perspective, transition to the Events\Simple list
Top 10 events by event type The table shows the top 10 event types along with the number of
occurrences of the events of that type.
Within the table, you can:
Top 10 IPs by event count The table shows the 10 IP addresses, which produce the greatest num-
ber of events.
www.invea.com 71 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Events in last batch The table shows maximum 10 event types, which was detected during the
last processed batch of data.
Within the table, you can:
4.3 Events
Aggregated view presents events of particular device in an intuitive graphical way considering
the aspect of time.
Events are filtered by the following search criteria: From, To, IPs, Event types, Filters, Net-
FlowSources, Categories, Perspective.
Each event type the device takes place in a given time period is represented by one line called
a swimline.Event occurrences are represented by a colored rectangle in a particular swimline.
Event occurrences are represented by a colored rectangle in a particular swimline. According to
the selected scale the neighbor events are aggregated into one rectangle. Lenght of the rectangle
corresponds to the time length of the event. Time goes prom from left to right at the x axis. For
clarity the night and the day alternation is displayed.
www.invea.com 72 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Visualization interaction
Zoom User can zoom in visualization (showing in a larger scale) by using left mouse button to
select the requested time interval. There are “Undo” and “Redo” icons on the right side above the
visualization to navigate through changes of the scale. Using the icons “Plus” and “Minus” you can
change the size of colored rectangles in a swimline.
Event details By right clicking on the event (green rectangle) it is possible to display context
menu allowing displaying event details (IP address, start time, end time, summary) or transition
to Events\Simple list with the corresponding events. The detail summary can be shown only for
events detected after installation of application FlowMon ADS version 2.08.00 because of migration
to new technologies, which allow us to aggregate the events into the high level events better.
Computing aggregated event details, which consists of more than 25 events is accelerated by
sampling. When sampling is used there is information about lower accuracy of data in event detail.
www.invea.com 73 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
View of events in the form of a simple list (events table). It is primarily sorted by the time of the
event creation.
Events are filtered by the following search criteria: From, To, Source IP, Targets, Filter, Method,
Categories and Perspective.
User can show directly the Event details view of the event with known event ID using the search
dialog available after clicking the magnifier glass icon in upper right corner of the search criteria
box.
The results of query are divided into pages where one page contains a maximum of 500 items
of the result. The result is a table that includes the following items:
Type Type of event, in fact a reference to the detection method, which recognized the event.
NetFlow source NetFlow data source on which the event has been generated
Targets Event targets (a list of IP addresses). At most 10 items is shown in the table. If more targets
are associated with the event they are available on request in a dialog window.
It is possible to export the output into the CSV file by clicking Export events to .csv in context
menu.
4.3.3 By hosts
A table view of the events grouped according to the sources and targets of events.
www.invea.com 74 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Events are filtered by the following search criteria: From, To, Source IP, Filter, Method, Cate-
gories, Perspective, IP’s role and Number of events.
The result table is sorted according to the IP addresses, for each IP address the number of
events where the IP address is the source or the target of the event is displayed. Consequently,
it is possible to view a list of event types related to the IP address. For each event type can be
displayed specific events in the form of a separate table, which includes the same data as in event
table Events\Simple list.
The Event detailsview is unlike other event views available only through the context menu.
Event details include all available information about the event, event comments and classification
of events into categories.
Type Type of event, in fact a reference to the detection method, which recognized the event
First NetFlow Timestamp of the first NetFlow on which was based the event detection
Captured source hostname DNS name assigned to the IP address at the time of event detection
www.invea.com 75 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
NetFlow source NetFlow data source on which the event has been generated
False positive Indicates whether it is a false positive (according to rules for marking events as
false positives currently in effect). Event can be marked as a false positive by Mark as false
positive context menu item. When marking an event it is necessary to enter time relevance of
marking (individual days of the week, time tolerance). Marking of an event as a false positive
means that event of the same type and originator will not be generated if there is a rule for
marking the events as the false positive in effect.
Targets Event targets (a list of IP address). The targets can be shown grouped by the appropriate
countries or address prefixes.
User Identity User ID from domain controller (for more information see FlowMon collector docu-
mentation)
Further for each event there are chronologically listed related comments. The comment always
includes the author (Author) and a timestamp of comment insertion (Timestamp). Comments
may be changed (Change) or deleted (Delete)depending on the author and currently logged on
user. It is always possible to add a new comment (Add new comment).
Event details also include event categories. The category always includes the author (Author)
and the timestamp (Timestamp). Individual categorization can be removed (Remove) or added
(Add to category). Note that the management of event categories is also available through Man-
age event categories context menu item.
www.invea.com 76 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The Interactive event visualization view enables to view the network traffic data, based on
which the event was detected. The view is available for each event detected on the basis of network
traffic through the Visualize event context menu item. Similarly as in the Event details view the
event details are displayed first in the table to make clear what the event is visualized.
Interactive visualization displays individual IP addresses as nodes and data transmission be-
tween the IP addresses as edges. Size of nodes and edges is proportional to the volume of trans-
mitted data and their colors ranged from green to red are corresponding to the number of flows.
Event visualization can be interactively traversed; each node has a context menu marked by sym-
bol “+”. The item More data of this menu ensures downloading of all relevant IP address com-
munication. The item Info obtains and displays the details of the network traffic in the form of
a floating table. For nodes it displays table of aggregated communication with other IP addresses.
For inbound traffic the communication is aggregated on source IP address, destination port and
protocol. For the outbound traffic it is aggregated on the destination IP address, source port and
protocol. For edges it displays a table of individual data flows that constitute the edge including
details such as the duration of the connection, flags and the type of service (TOS).
Special type of node is called aggregation. Aggregation represents a larger number of IP ad-
dresses and is visualized as a circle shaped node. Clicking on such a node displays a list of IP
addresses that constitute the aggregation. Selecting any of the displayed IP address will tear it
from the aggregation. Furthermore it is possible to work with the IP address and details of its
communication by a standard means that are described above.
The Event evidence view provides the means to export the evidence (network data flows on
the basis of which the event was detected) from the application. Displayed web page is adjusted to
be able to copy its content to the clipboard in a plain text. For each event there is the event type,
timestamp of event creation, event originator, event details and targets.
It is followed by the histogram, which could display relations between various pairs of variables.
Below is displayed the list of data flows (raw NetFlow data from the collector). The displayed in-
formation includes the source and the target IP address, time stamp of the data flow, its duration,
protocol, source and destination port, the volume of transferred data, number of transmitted pack-
www.invea.com 77 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The listed flows can be filtered along one of the columns. The filter can be defined by chosing
the column and the relation from the lists and by writing the constant into the text box.
The listed flows with the same (or reversed) tuple source IP address, destination IP address,
source port, destination port and protocol can be highlighted using the context menu over the
single flows (Flows coloring\Follow flow). The flows without corresponding opposite flow can be
highlighted using the Flows coloring\Single flow item.
The list in the user interface is limited to 10000 flows. The exported text file includes all appro-
priate flow records.
www.invea.com 78 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
4.4 Reports
The reports are a means to obtain complete information about the IP address/IP addresses
registered in the application. Reports save the information on events into an assembly, which can
be directly exported to the PDF.
4.4.1 Chapters
Overall status report It displays the network traffic overview chart and the traffic statistics table.
Event matrix Table of the most important events in the network. It is displayed by single days and
devices.
Event list List of the most important events in the network displayed as in Events\Simple list
view.
www.invea.com 79 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The given chapter consists from the given type and parameter settings. It is possible to create
more chapters of same type but different settings.
Each user can create and edit the chapters. The user can delete the chapter only if the chapter is
not used in the report created by another user (or if the user has admin rights). The user is warned
if the deleted chapter belongs to some report. If the deleted chapter is the last one in the report,
the user will be warned and the report will be deleted, too.
4.4.2 Reports
The report is defined as the sequence of chosen chapters. Each user can create and edit his
own reports. The user can mark the report as public (it could be seen by other users). The common
user can edit or delete only his own reports, the administrator can see, edit or delete all reports.
To generate the report it needed to choose one of the defined report templates and specify the
time window, which will be included into the report. The generated report can be directly exported
to the PDF. Generating the report can consume much time and system resources with respect to
the chapter parameters settings and the chosen time window. The generating of the report can be
interrupted anytime.
It could be used also the default report template beyond the user defined report templates. The
default report consists from following chapters:
Overall status for Security Issues Based on the Security Issues perspective, the chart is gener-
ated along the flow count in the logarithmic scale for each NetFlow source separately.
Overall status for Operational Issues Based on the Operational Issues perspective, the chart is
generated along the flow count in the logarithmic scale for each NetFlow source separately.
Event matrix for Security Issues For the priority HIGH or higher.
Event matrix for Operational Issues For the priority HIGH or higher.
www.invea.com 80 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
The FlowMon ADS application allows to set up the automatic report generating and sending
in the PDF format. It is necessary to choose the report to generate (Report), activate/deactivate
the generating and sending (Active), select the period used for the generating (Interval). When
is the daily or weekly reporting selected, it is necessary to choose which weekdays are the reports
generated. Using the monthly generated report, the report is generated at the first day of the next
week. Using the Custom interval (it is needed to choose the first and last day of the report), the
report is generated at the end of the given period.
It is possible to set the e-mail addresses of the sender (Sender email) and of the recipients
(Recipient emails).
www.invea.com 81 / 82
FlowMon ADS Enterprise 7.02.00
User Guide, April 30, 2015
Contacts
INVEA-TECH a.s.
U Vodarny 2965/2
Brno 61600
Web: www.invea.com
Email:[email protected]
Tel.: +420 511 205 251
Feedback
We would be pleased if you tell us your comments to this text (typing errors, incomplete or unclear
information). Please, contact us via email [email protected].
Copyright
This document is intended for informational purposes only. Any information herein is believed to be reliable. However,
INVEA-TECH assumes no responsibility for the accuracy of the information. INVEA-TECH reserves the right to change the
document and the products described without notice. INVEA-TECH and the authors disclaim any and all liabilities.
Except as stated herein, none of the document may be copied, reproduced, distributed, republished, downloaded, dis-
played, posted, or transmitted in any form or by any means including, but not limited to, electronic, mechanical, photo-
copying, recording, or otherwise, without the prior written consent of INVEA-TECH. Any unauthorized use of this speci-
fication may violate copyright laws, trademark laws, the laws of privacy and publicity, and communications regulations
and statutes.
FlowMon logo is a trademark registered to CESNET, z.s.p.o. association. Other brands and product names are trademarks
of their respective owners.
This product contains NfSen and Nfdump software Copyright © 2004, SWITCH - Teleinformatikdienste fuer Lehre und
Forschung.
All other trademarks are the property of their respective owners. Copyright © 2007 – 2014 INVEA-TECH a.s. All rights
reserved.
www.invea.com 82 / 82