#Netflow

running malcom but the old malcolm - need to image and install latest - sort of dread going from debian to ubuntu but if i image i can revert easily. maybe they figured out updating, i don't want github only updates.

anyways it is a good one to offer vs say security onion - they use the same components mostly, suricata, zeek, elastic, maybe he has a live iso like last time.

i think the reason to go to ubuntu is better newer drivers, bigger dev base? as long as it works - that is my concern, avoid dependency hell and breakage.

it is good with managing all the containers and space for /datastore #sigs #hashes #dpi #netflow #ntop-ng #tcp-replay #binaries #hashcat

misryoum global news networkUs_Today
2026-03-08

Shiba Inu Records -131 Billion in 24 Hours: Negative Netflow Signals Growing

misryoum.com/us/economy/shiba-

SHIB exchange flow is hinting at another rallyShiba Inu OI flips positive with 2.24% surgeThe Shiba Inu exchange netflow has gone extremely negative despite the weak price trend, suggesting that retail and institutional traders are quietly accumulating the asset...

#131

Peter N. M. Hansteenpitrh
2026-02-24

Yes, You Too Can Be An Evil Network Overlord - On The Cheap With OpenBSD, pflow And nfsen nxdomain.no/~peter/yes_you_too

A story about network metadata and , originally from 2014, good for reprising. See The Book of PF for more @nostarch

@da_667 i would say go for the standalonelib? this would be a nice switch to use when building, more info is better #ntop-ng #netflow #logs

Using nDPI as a standalone library when building Suricata is a powerful way to transform it from a traditional signature-based IDS/IPS into a smarter, more context-aware network security monitoring system. The integration addresses several key limitations of Suricata by adding a dedicated, high-performance deep packet inspection (DPI) engine .

The table below summarizes the core reasons for this integration.
Reason Explanation Key Benefits
Massively Expanded Protocol Coverage Suricata natively supports ~20 protocols, while nDPI recognizes 450+ (including Cloud, IoT, and OT protocols) . Enables visibility into a wider range of applications and potential threats that Suricata would otherwise miss .
Enhanced Threat Detection Capabilities nDPI adds behavioral analysis and risk detection to Suricata's signature-based approach . Allows detection of anomalies like encrypted traffic on standard ports, self-signed certificates, and command-and-control (C2) channels hiding in plain sight .
More Powerful and Precise Rules The plugin introduces new rule keywords: ndpi-protocol and ndpi-risk . Enables writing rules based on detected application (e.g., TLS.YouTube) or specific risk (e.g., NDPI_BINARY_APPLICATION_TRANSFER), significantly reducing false positives .
Richer Contextual Metadata Suricata's logs (EVE JSON) can be augmented with protocol and metadata identified by nDPI . Provides security analysts with deeper insights for faster threat hunting and forensic analysis without needing full packet captures .
πŸ› οΈ How to Integrate nDPI with Suricata

nDPI is integrated as a plugin that is not built into Suricata by default. You need to explicitly enable it during compilation. The process, as outlined in the official Suricata documentation, involves two main steps :

Build Suricata with nDPI Support: When configuring your Suricata build from source, you must use the --enable-ndpi flag and point to your nDPI source code.
bash

./configure --enable-ndpi --with-ndpi=/path/to/your/nDPI/source

Load the Plugin: After installation, you need to ensure Suricata loads the nDPI plugin by adding its path to the suricata.yaml configuration file.
yaml

plugins:
- /usr/lib/suricata/ndpi.so

By building Suricata with the standalone nDPI library, you are essentially giving it a "second opinion" on network traffic. nDPI handles the heavy lifting of identifying countless applications and their potential risks, which then feeds directly into Suricata's core engine for alerting and logging. This makes your network defense far more robust and intelligent.

Would you like to see more detailed examples of Suricata rules that use the ndpi-protocol and ndpi-risk keywords?

2026-02-18

Π­Π²ΠΎΠ»ΡŽΡ†ΠΈΡ сбора flow-статистики Π² ЯндСксС: Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π°, Π³Ρ€Π°Π±Π»ΠΈ ΠΈ ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΠΈ

ΠŸΡ€ΠΈΠ²Π΅Ρ‚, Π₯Π°Π±Ρ€! На связи Баша Π›ΠΎΠΏΠΈΠ½Ρ†Π΅Π², SRE Π² Π³Ρ€ΡƒΠΏΠΏΠ΅ Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠΈ сСтСвой инфраструктуры ΠΈ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° Yandex Infrastructure. Π― ΠΎΡ‡Π΅Π½ΡŒ люблю ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³ β€” Π° ΠΊΠΎΠ³Π΄Π° Π΄Π΅Π»ΠΎ касаСтся видимости сСтСвого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°, Π½Π°ΠΌ Π½Π΅ ΠΎΠ±ΠΎΠΉΡ‚ΠΈΡΡŒ Π±Π΅Π· Π°Π½Π°Π»ΠΈΠ·Π° flow‑данных. БСгодня расскаТу, ΠΊΠ°ΠΊ ΠΈ ΠΏΠΎΡ‡Π΅ΠΌΡƒ ΠΌΡ‹ ΠΏΠ΅Ρ€Π΅Π΅Ρ…Π°Π»ΠΈ с ΡƒΡΡ‚Π°Ρ€Π΅Π²ΡˆΠ΅Π³ΠΎ flow‑коллСктора Π½Π° GoFlow2, Ρ€Π΅Π°Π»ΠΈΠ·ΠΎΠ²Π°Π»ΠΈ запись Π² Π‘Π” ΠΈ Ρ‡Π΅Ρ€Π΅Π· etcd Ρ€Π΅ΡˆΠΈΠ»ΠΈ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌΡ‹ с шаблонами. Новая систСма ΠΎΠ±Ρ€Π°Π±Π°Ρ‚Ρ‹Π²Π°Π΅Ρ‚ 85 тысяч ΠΏΠ°ΠΊΠ΅Ρ‚ΠΎΠ² статистики Π² сСкунду, обСспСчиваСт ΠΎΡ‚ΠΊΠ°Π·ΠΎΡƒΡΡ‚ΠΎΠΉΡ‡ΠΈΠ²ΠΎΡΡ‚ΡŒ ΠΈ ΠΏΠΎΠΌΠΎΠ³Π°Π΅Ρ‚ ΡΠΎΠ·Π΄Π°Π²Π°Ρ‚ΡŒ ΠΎΡ‚Ρ‡Ρ‘Ρ‚Ρ‹. Если Π²Π°ΠΌ интСрСсно ΡƒΠ·Π½Π°Ρ‚ΡŒ Ρ‡ΡƒΡ‚ΡŒ большС ΠΎΠ± Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Π΅, экспСримСнтах, ΠΎΡˆΠΈΠ±ΠΊΠ°Ρ… ΠΈ Ρ€Π΅ΡˆΠ΅Π½ΠΈΡΡ…, ΠΏΠΎΠ»Π΅Π·Π½Ρ‹Ρ… для инфраструктурного ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° Π² ΠΏΡ€ΠΎΠ΄Π°ΠΊΡˆΠ½β€‘ΡΡ€Π΅Π΄Π΅, Ρ‡ΠΈΡ‚Π°ΠΉΡ‚Π΅ Π΄Π°Π»Π΅Π΅.

habr.com/ru/companies/yandex/a

#flowΠΌΠ΅Ρ‚Ρ€ΠΈΠΊΠΈ #goflow #goflow2 #etcd #ipfix #sflow #netflow

2026-02-14

UNC3886 leveraged ORB infrastructure for stealthy telecom targeting.

Per Cyber Security Agency of Singapore:
β€’ Zero-day firewall compromise
β€’ Rootkit persistence mechanisms
β€’ GOBRAT & TINYSHELL C2 nodes
β€’ ORB-tagged IP clustering in Singapore ASNs
β€’ NetFlow-confirmed router-to-ORB communications
β€’ Pre-positioned reconnaissance

Attribution aligned with assessments from Mandiant linking activity to China-sponsored espionage.

ORB networks blur the line between botnets and residential proxy ecosystems, increasing attribution friction and collateral risk.

Defensive priorities:
β€’ Threat intel enrichment
β€’ Edge device patch enforcement
β€’ ASN anomaly detection
β€’ Zero-trust segmentation
β€’ IoT telemetry visibility

How mature are ORB detection capabilities in your SOC?

Engage below.

Source: cyberpress.org/orb-networks-ma

Follow @technadu for advanced threat analysis.

#ThreatIntel #UNC3886 #ORBNetworks #IoTSecurity #ZeroDay #C2Infrastructure #NetFlow #TelecomSecurity #BlueTeam #ThreatHunting #APTActivity #CyberOperations #Infosec

ORB Networks Leverages Compromised IoT Devices for Masked Cyberattacks
2025-12-20

OH: β€žI mean that it’s generally bad idea to enable Netflix on switchβ€œ

#BGP #Netflow #sflow #InternetLarry

2025-12-17

Hopefully soon I'll publish a new project to create #netflow infrastructure in Oracle cloud with "one" click

By the moment I've completed the "single developer" use case but a "one click #kubernetes cluster" is in progress

Rainer "friendica" Sokollrainer@friendica.sokoll.com
2025-11-07

Sehr schΓΆn: Mein #Mikrotik schreibt jetzt #Netflow zu #ntopng.
Next step: die Daten weiter zu #Grafana schieben.

#Hashtaggalore

2025-09-06

ΠžΠ±Π·ΠΎΡ€ NetFlow-ΠΊΠΎΠ»Π»Π΅ΠΊΡ‚ΠΎΡ€Π° с Π²ΠΈΠ·ΡƒΠ°Π»ΠΈΠ·Π°Ρ†ΠΈΠ΅ΠΉ Akvorado: ΠΎΡ‚ развСртывания Π΄ΠΎ практичСского использования

Akvorado β€” Π½Π΅ просто инструмСнт для привлСчСния Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°, Π° соврСмСнноС ΠΈ ΠΌΠ°ΡΡˆΡ‚Π°Π±ΠΈΡ€ΡƒΠ΅ΠΌΠΎΠ΅ Ρ€Π΅ΡˆΠ΅Π½ΠΈΠ΅, ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ΅ ΠΏΡ€Π΅ΠΎΠ±Ρ€Π°Π·ΡƒΠ΅Ρ‚ сырыС Π΄Π°Π½Π½Ρ‹Π΅ (NetFlow, sFlow) Π² ΠΏΠΎΠ½ΡΡ‚Π½ΡƒΡŽ ΠΈ Π½Π°Π³Π»ΡΠ΄Π½ΡƒΡŽ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ. Π’ этой ΡΡ‚Π°Ρ‚ΡŒΠ΅ ΠΌΡ‹ расскаТСм ΠΎ ΠΊΠ°ΠΆΠ΄ΠΎΠΌ этапС Ρ€Π°Π±ΠΎΡ‚Ρ‹ с Akvorado: ΠΎΡ‚ Π°Ρ€Ρ…ΠΈΡ‚Π΅ΠΊΡ‚ΡƒΡ€Ρ‹ Π΄ΠΎ нюансов развСртывания, ΠΎΠΏΠΈΡ€Π°ΡΡΡŒ Π½Π° наш ΠΎΠΏΡ‹Ρ‚.

habr.com/ru/companies/hostkey/

#hostkey #netflow #sflow #ipfix #akvorado #clickhouse #kafka #docker #сСтСвой_ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³

VictoriaMetricsvictoriametrics
2025-08-13

Tired of fighting with SNMP and confusing network data? 😀
Join our "Nonsense Networking" live stream where we make sense of network , , and . We'll cover the common pain points and show you better alternatives.

πŸ“… August 28th at 10 am PDT | 6 pm BST | 7 pm CEST

bit.ly/45ykGpy

Rainer "friendica" Sokollrainer@friendica.sokoll.com
2025-08-12

mannmann.

ich mΓΆchte mit #netflow spielen. Mein #Mikrotik kann als Probe dienen, einen Collector gibs hier: github.com/synfinatic/netflow2… ein Frontend hier: hub.docker.com/r/ntop/ntopng.
Nur funktioniert das nicht, startet man ntopng mit dem Parameter --community, dann tauchen keine Daten im Frontend auf.
Ohne --community schon, mit einem Manko:

Das ist dann eine Demo-Version, die 10 Minuten(!!!) funktioniert. NatΓΌrlich kann man Lizenzen kaufen: shop.ntop.org/

Bis vor kurzem hat die Combo netflowng/ntop(community) wohl noch funktioniert, aber nun nicht mehr: github.com/synfinatic/netflow2…

Ich verstehe, daß man für seine Arbeit bezahlt werden mâchte. Aber das: Aus einer funktionierenden Version eine 10-minütige Demo zu machen: Nein, das finde ich uncool. Und die Àlteren Versionen, die vermutlich noch funktioniert haben, gibt es nicht mehr, es gibt nur noch latest.

Und nun? Was mache ich nun, wenn ich doch einfach nur mal mit Netflow spielen will?

Jared Jenningsjaredj@bsd.cafe
2025-08-11

@maulanahirzan @david_chisnall The grasp of #netgraph I have (which is tenuous) i got by searching out conference talks and #FreeBSD Journal articles: the reference documentation doesn't tell the story. The reason I'm still working at it, after VLAN-aware bridges have been announced and merged, is that netgraph has a #netflow node, which emits data about each connection or "flow" to a side channel. I think Open vSwitch might be able to do that, but the in-kernel bridges don't; and OVS is another layer of complexity.

Ralf Lenz, BOFH Emeritus πŸ΄β€β˜ οΈralf@fedi.jrlenz.net
2025-06-06

So, how many network folks have been looking for [n] years for a reasonable, easy-to-setup netflow collector/analyzer that doesn't:

1) run on java and require massive hardware
2) cost anything at all, ever (unless you want to send me money then I'm cool)
3) take [hours|days] to configure properly because whoever wrote it was allergic to documentation?

#network #engineering #netflow

2025-05-13

АнализируСм сСтСвой Ρ‚Ρ€Π°Ρ„ΠΈΠΊ срСдних ΠΈ ΠΊΡ€ΡƒΠΏΠ½Ρ‹Ρ… сСтСй с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ Netflow/IPFIX/sFlow ΠΈ борСмся с DoS/DDoS с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ BGP

НС Ρ‚Π°ΠΊ Π΄Π°Π²Π½ΠΎ ΠΌΡ‹ выпустили Π½ΠΎΠ²ΡƒΡŽ Π²Π΅Ρ€ΡΠΈΡŽ open source xFlow-ΠΊΠΎΠ»Π»Π΅ΠΊΡ‚ΠΎΡ€Π° ΠΈ Π°Π½Π°Π»ΠΈΠ·Π°Ρ‚ΠΎΡ€Π° xenoeye . Π­Ρ‚ΠΎ Π½Π΅ΠΏΠ»ΠΎΡ…ΠΎΠΉ ΠΏΠΎΠ²ΠΎΠ΄ ΠΏΠΎΠΏΠΈΠ°Ρ€ΠΈΡ‚ΡŒΡΡ. Ρ‚Π΅ΠΌ Π±ΠΎΠ»Π΅Π΅ Ρ‡Ρ‚ΠΎ xFlow-ΠΊΠΎΠ»Π»Π΅ΠΊΡ‚ΠΎΡ€Π°ΠΌΠΈ/Π°Π½Π°Π»ΠΈΠ·Π°Ρ‚ΠΎΡ€Π°ΠΌΠΈ часто ΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ΡΡ для Π°Π½Π°Π»ΠΈΠ·Π°, ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π° ΠΈ Π±ΠΎΡ€ΡŒΠ±Ρ‹ с DoS/DDoS Π°Ρ‚Π°ΠΊΠ°ΠΌΠΈ, это сСйчас ΠΎΡ‡Π΅Π½ΡŒ Π°ΠΊΡ‚ΡƒΠ°Π»ΡŒΠ½ΠΎ. Если совсСм ΠΊΠΎΡ€ΠΎΡ‚ΠΊΠΎ - Π°Π½Π°Π»ΠΈΠ·Π°Ρ‚ΠΎΡ€ собираСт xFlow (Netflow ΠΈ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ родствСнныС ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹ Ρ‚ΠΈΠΏΠ° Jflow, IPFIX, sFlow), распрСдСляСт ΠΈΡ… ΠΏΠΎ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Π°ΠΌ ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π°, экспортируСт ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ Π² Π‘Π£Π‘Π” (Π² Ρ‚Π΅ΠΊΡƒΡ‰Π΅ΠΉ вСрсии PostgreSQL), ΠΈ ΠΌΠΎΠΆΠ΅Ρ‚ быстро Ρ€Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π½Π° всплСски Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ° Π²Ρ‹ΡˆΠ΅ ΠΏΠΎΡ€ΠΎΠ³ΠΎΠ² для Π΄Π΅Ρ‚Π΅ΠΊΡ†ΠΈΠΈ DoS/DDoS Π°Ρ‚Π°ΠΊ с ΠΏΠΎΠΌΠΎΡ‰ΡŒΡŽ ΡΠΊΠΎΠ»ΡŒΠ·ΡΡ‰ΠΈΡ… срСдних. Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡŽ ΠΈΠ· Π‘Π£Π‘Π” ΠΌΠΎΠΆΠ½ΠΎ Π²ΠΈΠ·ΡƒΠ°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Ρ€Π°Π·Π½Ρ‹ΠΌΠΈ способами - Π³Π΅Π½Π΅Ρ€ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ статичСскиС ΠΊΠ°Ρ€Ρ‚ΠΈΠ½ΠΊΠΈ ΠΈ ΠΎΡ‚Ρ‡Π΅Ρ‚Ρ‹ ΠΈΠ»ΠΈ ΠΏΠΎΠΊΠ°Π·Ρ‹Π²Π°Ρ‚ΡŒ красивоС Π² Grafana. Π Π΅Π°Π³ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ Π½Π° всплСски ΠΌΠΎΠΆΠ½ΠΎ Ρ‚ΠΎΠΆΠ΅ ΠΏΠΎ-Ρ€Π°Π·Π½ΠΎΠΌΡƒ - ΠΎΡ‚ΠΏΡ€Π°Π²Π»ΡΡ‚ΡŒ сообщСния Π² мСссСндТСр, ΠΏΠΈΡΠ°Ρ‚ΡŒ Π΄Π°Π½Π½Ρ‹Π΅ ΠΎΠ± аномалиях Π² Π‘Π”, Π°Π½ΠΎΠ½ΡΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ BGP Flowspec для подавлСния Π°Ρ‚Π°ΠΊ.

habr.com/ru/articles/909132/

#netflow #ipfix #sflow #postgresql #grafana #ddos #bgp_flowspec

2025-03-19

ΠŸΡ€ΠΎΠ΄ΠΎΠ»ΠΆΠ°Π΅ΠΌ экспСримСнты с сСтСвым Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠΎΠΌ.
Π’ этот Ρ€Π°Π· смотрим Π½Π° распрСдСлСниС TTL.
На Ρ‚Π΅ΠΏΠ»ΠΎΠ²ΠΎΠΉ ΠΊΠ°Ρ€Ρ‚Π΅ (heatmap) ΠΎΡ‚Ρ‡Π΅Ρ‚Π»ΠΈΠ²ΠΎ Π²ΠΈΠ΄Π½ΠΎ Ρ‚Ρ€ΠΈ "полосы".
Π’ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ, Π²ΠΎ врСмя сСтСвой Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΈ распрСдСлСниС мСняСтся.
Ну Ρ‡Ρ‚ΠΎ ΠΆ, посмотрим.

IP TTL distribution in network traffic
2025-03-17

ЭкспСримСнт с Π²ΠΈΠ·ΡƒΠ°Π»ΠΈΠ·Π°Ρ†ΠΈΠ΅ΠΉ ускорСния сСтСвого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°.
На Π²Π΅Ρ€Ρ…Π½Π΅ΠΌ Π³Ρ€Π°Ρ„ΠΈΠΊΠ΅ - ΡΠΊΠΎΡ€ΠΎΡΡ‚ΡŒ, Π½Π° Π½ΠΈΠΆΠ½Π΅ΠΌ - ускорСниС (производная скорости).
Π“Ρ€Π°Ρ„ΠΈΠΊΠΈ Π½Π΅ΠΌΠ½ΠΎΠ³ΠΎ смСщСны, Π½Π° Π²Π΅Ρ€Ρ…Π½Π΅ΠΌ Π΅ΡΡ‚ΡŒ BPS ΠΈ PPS, Π½Π° Π½ΠΈΠΆΠ½Π΅ΠΌ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ PPS.
Но Π²Ρ€ΠΎΠ΄Π΅ ΠΊΠ°ΠΊ Π²ΠΈΠ΄Π½ΠΎ - Π²ΠΎ врСмя всплСсков ускорСниС растСт, ΠΏΠΎΡ‚ΠΎΠΌ ΠΏΠ°Π΄Π°Π΅Ρ‚, Π³Ρ€Π°Ρ„ΠΈΠΊ ΠΏΠΎΡ‡Ρ‚ΠΈ симмСтричный ΠΎΡ‚Π½ΠΎΡΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ 0.

netflow/ipfix time series chart, network traffic speed and acceleration
Rainer "friendica" Sokollrainer@friendica.sokoll.com
2025-02-26
Scheinbar hatte iich mal mit #netflow gespielt πŸ˜€
root@a:/var/cache/nfdump# rm *
bash: /usr/bin/rm: Argument list too long
root@a:/var/cache/nfdump# ls | wc -l
178239
root@a:/var/cache/nfdump# ls | xargs rm
root@a:/var/cache/nfdump# ls | wc -l
0
root@a:/var/cache/nfdump#
2025-02-19

IPFIX с Ρ‚ΠΎΡ‡ΠΊΠΈ зрСния ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности

NetFlow ΠΈ IPFIX – это ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Ρ‹ для сбора ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° сСтСвого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Π΅ для ΠΌΠΎΠ½ΠΈΡ‚ΠΎΡ€ΠΈΠ½Π³Π°, обСспСчСния бСзопасности ΠΈ ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΠΈ Ρ€Π°Π±ΠΎΡ‚Ρ‹ сСти. Они ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‚ ΡΠΎΠ±ΠΈΡ€Π°Ρ‚ΡŒ ΠΌΠ΅Ρ‚Π°Π΄Π°Π½Π½Ρ‹Π΅ ΠΎ ΠΏΠ΅Ρ€Π΅Π΄Π°Π²Π°Π΅ΠΌΡ‹Ρ… ΠΏΠ°ΠΊΠ΅Ρ‚Π°Ρ… ΠΈ Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΈΡ… для выявлСния Π°Π½ΠΎΠΌΠ°Π»ΠΈΠΉ, диагностики ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ ΠΈ ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½ΠΈΡ эффСктивности сСти. ΠŸΡ€ΠΎ диагностику ΠΈ ΠΏΠΎΠ²Ρ‹ΡˆΠ΅Π½ΠΈΠ΅ эффСктивности сСти написано Π½Π΅ΠΌΠ°Π»ΠΎ, поэтому Π² этой ΡΡ‚Π°Ρ‚ΡŒΠ΅ я Ρ…ΠΎΡ‡Ρƒ Ρ€Π°ΡΡΠΌΠΎΡ‚Ρ€Π΅Ρ‚ΡŒ основныС поля IPFIX(Π½ΠΎ Π°Π½Π°Π»ΠΎΠ³ΠΈΡ‡Π½Ρ‹Π΅ поля Π΅ΡΡ‚ΡŒ ΠΈ Ρƒ Netflow ΠΈ Π΄Ρ€ΡƒΠ³ΠΈΡ… x-Flow ) ΠΈ ΠΊΠ°ΠΊ ΠΌΠΎΠΆΠ½ΠΎ ΠΈΡ… ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π² Ρ€Π΅Π°Π»ΡŒΠ½ΠΎΠΉ ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅ Π½Π° Π±Π»Π°Π³ΠΎ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности.

habr.com/ru/articles/883932/

#netflow #ipfix

2025-02-14

Π—Π°ΠΌΠΎΠ»Π²ΠΈΡ‚Π΅ словСчко Π·Π° akvorado

Π”ΠΎΠ±Ρ€Ρ‹ΠΉ дСнь! МСня Π·ΠΎΠ²ΡƒΡ‚ ΠœΠΈΡ…ΠΎΠ»Π°ΠΏ ΠšΠΎΠ½ΡΡ‚Π°Π½Ρ‚ΠΈΠ½. Π Π°Π±ΠΎΡ‚Π°ΡŽ Π² нСбольшом ΠΎΠΏΠ΅Ρ€Π°Ρ‚ΠΎΡ€Π΅ связи ΠΈΠ½ΠΆΠ΅Π½Π΅Ρ€ΠΎΠΌ, Π° Π²ΠΎΡ‚ Π² ΠΊΠ°ΠΊΠΎΠΌ ΡƒΠΆΠ΅ ΠΏΠΎΠΉΠΌΠ΅Ρ‚Π΅ ΠΏΠΎ AS ΠΈ страничкС Π² PeeringDB. Π’ 2025-ΠΎΠΌ Π³ΠΎΠ΄Ρƒ Π½ΠΈΠΊΠΎΠ³ΠΎ ΡƒΠΆΠ΅ Π½Π΅ ΡƒΠ΄ΠΈΠ²ΠΈΡ‚ΡŒ Π½Π°Π»ΠΈΡ‡ΠΈΠ΅ΠΌ возмоТности Π²ΠΈΠ·ΡƒΠ°Π»ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ входящий Ρ‚Ρ€Π°Ρ„ΠΈΠΊ для Ρ€Π°Π·Π½ΠΎΠ³ΠΎ Ρ€ΠΎΠ΄Π° ISP ΠΈΠ»ΠΈ Π¦ΠžΠ”, поэтому Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ Π’Ρ‹ ΡƒΠΆΠ΅ ΡΠ»Ρ‹ΡˆΠ°Π»ΠΈ Ρ‡Ρ‚ΠΎ-Ρ‚ΠΎ ΠΏΡ€ΠΎ Akvorado. Π’ Ρ€Π°ΠΌΠΊΠ°Ρ… этой ΡΡ‚Π°Ρ‚ΡŒΠΈ познакомимся с Π°Π΄Π°ΠΏΡ‚Π°Ρ†ΠΈΠ΅ΠΉ Ρ‚Π°ΠΊΠΎΠ³ΠΎ ΠΏΡ€ΠΎΠ³Ρ€Π°ΠΌΠΌΠ½ΠΎΠ³ΠΎ комплСкса инструмСнта Akvorado . И Ρ‚Π°ΠΊ, Akvorado - это Netflow-ΠΊΠΎΠ»Π»Π΅ΠΊΡ‚ΠΎΡ€ с функциями Π²ΠΈΠ·ΡƒΠ°Π»ΠΈΠ·Π°Ρ†ΠΈΠΈ собираСмого Ρ‚Ρ€Π°Ρ„ΠΈΠΊΠ°. К ΠΏΡƒΠ±Π»ΠΈΠΊΠ΅ ΠΎΠ½ Π²Ρ‹ΡˆΠ΅Π» Π² 2022 Π³ΠΎΠ΄Ρƒ, ΠΎ Π½Π΅ΠΌ ΠΌΠ½ΠΎΠ³ΠΎ ΠΊΡ‚ΠΎ ΡΠ»Ρ‹ΡˆΠ°Π», я ΡƒΠ²Π΅Ρ€Π΅Π½. Π‘Ρ‹Π»ΠΈ Ρ€Π°Π·Π½Ρ‹Π΅ ΠΌΠ°Ρ‚Π΅Ρ€ΠΈΠ°Π»Ρ‹ Π½Π°ΠΏΡ€ΠΈΠΌΠ΅Ρ€ Π² linkmeup. ΠžΡ‡Π΅Π½ΡŒ прост для установки, развСртывания ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΠΎ Π΄Π°ΠΆΠ΅ обслуТивания (Ссли Π²Ρ‹ Ρ‡ΡƒΡ‚ΡŒ-Ρ‡ΡƒΡ‚ΡŒ Π·Π½Π°Π΅Ρ‚Π΅ Π‘lickhouse).

habr.com/ru/articles/881180/

#akvorado #netflow #opensource #bgp #ipfix #visualization

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst