Use cases
- Detection of connections to known bad servers
- If we detected a malware and know a C&C server, we can search through historical flow data to detect other possible infected systems.
- Atipical data transfer volume
- Could lead to a data exfiltration.
- Long living connections
- Often, this is an indicator for a C&C connection, which stays open for a very long time.
Tools
Standard unix tools like awk can also been used with a cat of a flow file.
Leave a Reply
You must be logged in to post a comment.