With Advanced Security Analytics module(ASAM) in NetFlow Analyzer, Security Analyst job on a network would be very easy. This blog helps you to understand the requirements for security Analytics in a network and how ASAM help you to identify network holes.
What is ASAM?
This a flow based security analytics and anomaly detection tool that helps in detecting zero-day network intrusions, using Continuous Stream Mining Engine technology.
It classifies intrusions to tackle network security threats in real time and has intelligence to detect a broad spectrum of external and internal security threats.
Benefits of using ASAM:-
- Uses the same NetFlow, sFlow pacekets exported from the devices.
- Centralized agent less traffic data collection, analysis and management
- Deeper visibility into both external and internal security threats
- Zero-day intrusion / anomaly detection capabilities
- Continuous overall security assessment on a network
- Real time analysis of Security threats.
- Non-Signature based security analytics tool.
- Capable of detecting threats which can surpass the IDS or Firewall
- No extra hardware required for implementing and it is integrated with existing traffic monitoring tool.
Here is the situation on network, A malware sitting on couple of PC or in some portion of internal network segment is causing a Syn flood(DoS attack), the network with out a flow based traffic and security analytics tool might a face huge task in identifying this threat.Say for an example a network with ManageEngine NetFlow Analyzer with ASAM module facing the above mentioned will easily find out the infected system or segment and take a necessary action to remove the Malware.
- How ASAM helps in this situation?
Assume that the PC’s or infected network segments(Group of PC’s) is connected to a Core layer 3 switch which is currently being monitored in NetFlow Analyzer using NetFlow export., Administrator notice that there is sudden huge spike on their traffic graphs on a particular port, he suspect that it might be a some security threat.
He now uses the ASAM module to check is there any threat on this particular device.
For easier analysis he is using resource based security threat analysis. The Resource based analysis snapshot tells which particular Router, Source Network, Source IP, Destination Network and Destination IP is having more number of events.
This snapshot helps administrator to easy drill down to problematic Network Segment to find out the offenders, once the list offender IP’s extracted, network administrator can now identify the PC’s and remove the malwares using some Anti Virus tool or disconnect those infect PC’s from network.
You can download the 30 day trial of ManageEngine NetFlow Analyzer from here.
Reach us on Facebook at NetFlow Analyzer TAC
Catch up with the latest updates in the industry, through our LinkedIn community Bandwidth Monitoring and Traffic Analysis for Enterprises
NetFlow Analyzer Technical Team
Download | Interactive Demo | Twitter | Customers
You Can Learn More About the ManageEngine Product Line By Going to manageengine.optrics.com
The original article/video can be found at Security Analytics in NetFlow Analyzer