Share to: share facebook share twitter share wa share telegram print page

Packet capture appliance

A packet capture appliance is a standalone device that performs packet capture.[1] Packet capture appliances may be deployed anywhere on a network, however, most commonly are placed at the entrances to the network (i.e. the internet connections) and in front of critical equipment, such as servers containing sensitive information.

In general, packet capture appliances capture and record all network packets in full (both header and payload), however, some appliances may be configured to capture a subset of a network's traffic based on user-definable filters. For many applications, especially network forensics and incident response, it is critical to conduct full packet capture, though filtered packet capture may be used at times for specific, limited information gathering purposes.[2]

Deployment

The network data that a packet capture appliance captures depends on where and how the appliance is installed on a network. There are two options for deploying packet capture appliances on a network. One option is to connect the appliance to the SPAN port (port mirroring) on a network switch or router. A second option is to connect the appliance inline, so that network activity along a network route traverses the appliance (similar in configuration to a network tap, but the information is captured and stored by the packet capture appliance rather than passing on to another device).[3]

When connected via a SPAN port, the packet capture appliance may receive and record all Ethernet/IP activity for all of the ports of the switch or router.[4]

When connected inline, the packet capture appliances captures only the network traffic traveling between two points, that is, traffic that passes through the cable to which the packet capture appliance is connected.[3]

There are two general approaches to deploying packet capture appliances: centralized and decentralized.

Centralized

With a centralized approach, one high-capacity, high-speed packet capture appliance connects to a data-aggregation point. The advantage of a centralized approach is that with one appliance you gain visibility over the network's entire traffic. This approach, however, creates a single point of failure that is a very attractive target for hackers; additionally, one would have to re-engineer the network to bring traffic to appliance and this approach typically involves high costs.[4]

Decentralized

With a decentralized approach you place multiple appliances around the network, starting at the point(s) of entry and proceeding downstream to deeper network segments, such as workgroups. The advantages include: no network re-configuration required; ease of deployment; multiple vantage points for incident response investigations; scalability; no single point of failure – if one fails, you have the others; if combined with electronic invisibility, this approach practically eliminates the danger of unauthorized access by hackers; low cost. Cons: potential increased maintenance of multiple appliances.[4]

In the past, packet capture appliances were sparingly deployed, oftentimes only at the point of entry into a network. Packet capture appliances can now be deployed more effectively at various points around the network. When conducting incident response, the ability to see the network data flow from various vantage points is indispensable in reducing time to resolution and narrowing down which parts of the network ultimately were affected. By placing packet capture appliances at the entry point and in front of each work group, following the path of a particular transmission deeper into the network would be simplified and much quicker. Additionally, the appliances placed in front of the workgroups would show intranet transmissions that the appliance located at the entry point would not be able to capture.[3]

Capacity

Packet capture appliances come with capacities ranging from 500 GB to 192 TB and more. Only a few organizations with extremely high network usage would have use for the upper ranges of capacities. Most organizations would be well served with capacities from 1 TB to 4 TB.[5]

A good rule of thumb when choosing capacity is to allow 1 GB per day for heavy users down to 1 GB per month for regular users. For a typical office of 20 people with average usage, 1 TB would be sufficient for about 1 to 4 years.[3]

Link speed ratio 100/0 100 Mbit/s 1 Gbit/s 10 Gbit/s 40 Gbit/s
Data on Disc/sec 12.5 MB 125 MB 1.25 GB 5 GB
Data on Disc/min 750 MB 7.5 GB 75 GB 300 GB
Data on Disc/hr 45 GB 450 GB 4.5 TB 18 TB

The ratio 100/0 means simplex traffic on real links you can have even more traffic

Features

Filtered vs. full packet capture

Full packet capture appliances capture and record all Ethernet/IP activity, while filtered packet capture appliances capture only a subset of traffic based on a set of user-definable filters; such as IP address, MAC address or protocol. Unless using the packet capture appliance for a very specific purpose covered by the filter parameters, it is generally best to use full packet capture appliances or otherwise risk missing vital data. Particularly when using a packet capture for network forensics or cybersecurity purposes, it is paramount to capture everything because any packet not captured on the spot is a packet that is gone forever. It is impossible to know ahead of time the specific characteristics of the packets or transmissions needed, especially in the case of an advanced persistent threat (APT). APTs and other hacking techniques rely for success on network administrators not knowing how they work and thus not having solutions in place to counteract them.[3]

Intelligent packet capture

Intelligent packet capture uses machine learning to filter and reduce the amount of network traffic captured. Traditional filtered packet capture relies on rules and policies which are manually configured to capture all potentially malicious traffic. Intelligent packet capture uses machine learning models, including features from Cyber threat intelligence feeds, to scientifically target and capture the most threatening traffic. Machine learning techniques for network intrusion detection,[6][7] traffic classification,[8] and anomaly detection [9] are used to identify potentially malicious traffic for collection.

Encrypted vs. unencrypted storage

Some packet capture appliances encrypt the captured data before saving it to disk, while others do not. Considering the breadth of information that travels on a network or internet connection and that at least a portion of it could be considered sensitive, encryption is a good idea for most situations as a measure to keep the captured data secure. Encryption is also a critical element of authentication of data for the purposes of data/network forensics.[3]

Sustained capture speed vs. peak capture speed

The sustained captured speed is the rate at which a packet capture appliance can capture and record packets without interruption or error over a long period of time. This is different from the peak capture rate, which is the highest speed at which a packet capture appliance can capture and record packets. The peak capture speed can only be maintained for short period of time, until the appliance's buffers fill up and it starts losing packets. Many packet capture appliances share the same peak capture speed of 1 Gbit/s, but actual sustained speeds vary significantly from model to model.[3][10]

Permanent vs. overwritable storage

A packet capture appliance with permanent storage is ideal for network forensics and permanent record-keeping purposes because the data captured cannot be overwritten, altered or deleted. The only drawback of permanent storage is that eventually the appliance becomes full and requires replacement. Packet capture appliances with overwritable storage are easier to manage because once they reach capacity they will start overwriting the oldest captured data with the new, however, network administrators run the risk of losing important capture data when it gets overwritten. In general, packet capture appliances with overwrite capabilities are useful for simple monitoring or testing purposes, for which a permanent record is not necessary. Permanent, non-overwritable recording is a must for network forensics information gathering.[4]

GbE vs. 10 GbE

Most businesses use Gigabit Ethernet speed networks and will continue to do so for some time.[11] If a business intends to use one centralized packet capture appliance to aggregate all network data, it would probably be necessary to use a 10 GbE packet capture appliance to handle the large volume of data coming to it from all over the network. A more effective way is to use multiple 1 Gbit/s inline packet capture appliances placed strategically around the network so that there is no need to re-engineer a gigabit network to fit a 10 GbE appliance.[10]

Data security

Since packet capture appliances capture and store a large amount of data on network activity, including files,[12] emails and other communications, they could, in themselves, become attractive targets for hacking. A packet capture appliance deployed for any length of time should incorporate security features, to protect the recorded network data from access by unauthorized parties. If deploying a packet capture appliance introduces too many additional concerns about security, the cost of securing it may outweigh the benefits. The best approach would be for the packet capture appliance to have built-in security features. These security features may include encryption, or methods to “hide” the appliance's presence on the network. For example, some packet capture appliances feature “electronic invisibility”, where they have a stealthy network profile by not requiring or using IP nor MAC addresses.[4]

Though connecting a packet capture appliance via a SPAN port appears to make it more secure, the packet capture appliance would ultimately still have to be connected to the network in order to allow management and data retrieval. Though not accessible via the SPAN link, the appliance would be accessible via the management link.[3]

Despite the benefits, the ability to control a packet capture appliance from a remote machine presents a security issue that could make the appliance vulnerable.[13] Packet capture appliances that allow remote access should have a robust system in place to protect it against unauthorized access. One way to accomplish this is to incorporate a manual disable, such as a switch or toggle that allows the user to physically disable remote access. This simple solution is very effective, as it is doubtful that a hacker would have an easy time gaining physical access to the appliance in order to flip a switch.[3]

A final consideration is physical security. All the network security features in the world are moot if someone is simply able to steal the packet capture appliance or make a copy of it and have ready access to the data stored on it. Encryption is one of the best ways to address this concern, though some packet capture appliances also feature tamperproof enclosures.[3]

See also

References

  1. ^ "What is Network Packet Capture?". www.endace.com. 2023.
  2. ^ Sherri Davidoff. "Network Forensics: Tracking Hackers Through Cyberspace". Retrieved 2012-07-08.
  3. ^ a b c d e f g h i j Vacca, John R. (2013-08-26). Network and System Security. Elsevier. ISBN 978-0-12-416695-0.
  4. ^ a b c d e Vacca, John R. (2012-11-05). Computer and Information Security Handbook. Newnes. ISBN 978-0-12-394612-6.
  5. ^ "Storage Capacity - IPCopper Packet Capture Appliances". www.ipcopper.com. Retrieved 2020-12-04.
  6. ^ "KDD Cup 1999: Computer Network Intrusion Detection". SIGKDD. Retrieved 17 June 2019.
  7. ^ Buczak, Anna; Guven, Erhan (26 October 2015). "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection". IEEE Communications Surveys & Tutorials. 18 (2): 1153–1176. doi:10.1109/COMST.2015.2494502. S2CID 206577177.
  8. ^ Li, Wei; Moore, Andrew W. (24–26 October 2007). A Machine Learning Approach for Efficient Traffic Classification. 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. pp. 310–317. CiteSeerX 10.1.1.219.6221. doi:10.1109/MASCOTS.2007.2. ISBN 978-1-4244-1853-4. S2CID 2037709.
  9. ^ Ahmed, Tarem; Oreshkin, Boris; Coates, Mark (April 10, 2007). Machine Learning Approaches to Network Anomaly Detection. Second Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML07). Retrieved 17 June 2019.
  10. ^ a b "Packet Analyzer - Network Analysis & Scanning Tool | SolarWinds". www.solarwinds.com. Retrieved 2020-12-04.
  11. ^ "Gigabit Ethernet – Is it the future?". ComputerWeekly.com. Retrieved 2020-12-04.
  12. ^ Erik Hjelmvik (2008). "Passive Network Security Analysis with NetworkMiner". Forensic Focus. Archived from the original on 2012-02-23. Retrieved 2012-07-08.
  13. ^ Mike Pilkington (2010). "Protecting Admin Passwords During Remote Response and Forensics". SANS. Retrieved 2012-07-08.

Read other articles:

Stasiun Prambon Prambon Tampak luar bangunan Stasiun Prambon, 2020LokasiKedungwonokerto, Prambon, Sidoarjo, Jawa Timur 61264IndonesiaKoordinat7°27′41.2042″S 112°33′51.6114″E / 7.461445611°S 112.564336500°E / -7.461445611; 112.564336500Koordinat: 7°27′41.2042″S 112°33′51.6114″E / 7.461445611°S 112.564336500°E / -7.461445611; 112.564336500Operator Kereta Api IndonesiaDaerah Operasi VIII Surabaya Letakkm 42+650 lintas Surabaya …

Artikel ini bukan mengenai cincau. Wikispecies mempunyai informasi mengenai Tiliacora triandra. Cuwing Tiliacora triandra TaksonomiDivisiTracheophytaSubdivisiSpermatophytesKladAngiospermaeKladmesangiospermsKladeudicotsOrdoRanunculalesFamiliMenispermaceaeSubfamiliMenispermoideaeTribusTiliacoreaeGenusTiliacoraSpesiesTiliacora triandra Diels, 1910 Tata namaBasionimCocculus triandrus (en) lbs Cuwing (Tiliacora triandra) adalah spesies tumbuhan berbunga dari genus tiliacora yang berasal dari Asia Ten…

Henri Rivière oleh Antony-Samuel Adam-Salomon sekitar tahun 1859. Henri Laurent Rivière (1827 – 1883) merupakan seorang perwira angkatan laut Prancis dan seorang penulis yang terutama diingat hari ini karena memajukan penaklukan Prancis atas Tonkin (Vietnam utara) pada tahun 1880-an. Perebutan Rivière atas benteng Hanoi pada bulan April 1882 meresmikan periode pertikaian yang tidak diumumkan antara Prancis dan Tiongkok yang memuncak dua tahun kemudian dalam Perang Tiongkok-Prancis (Agustus …

Becak dayung di kota Medan Becak yang sedang mengangkut penumpang Becak dayung adalah becak tidak bermotor di kawasan Sumatra bagian utara yang didayung oleh pengemudinya. Berbeda dengan becak di Jawa, dan pulau-pulau lain di Indonesia karena pengemudinya berada di samping becak bukan di belakang seperti pada umumnya. Becak seperti ini juga ditemukan di Singapura dan Semenanjung Malaysia. Becak dayung secara perlahan digantikan oleh becak mesin karena beberapa alasan: jarak tempuh yang relatif t…

Codex Bezae, teks dari Yohanes 1:1-16 Varian tekstual dalam Injil Yohanes (dan kitab-kitab Perjanjian Baru) muncul ketika seorang penyalin membuat sebuah perubahan yang disengaja atau tidak disengaja pada teks yang sedang direproduksi olehnya. Beberapa perubahan yang umum termasuk penghapusan, penataan ulang, pengulangan, atau penggantian satu atau beberapa kata ketika mata si penyalin beralih kembali dari salinannya ke naskah asli tetapi pada kata yang serupa di lokasi yang salah pada naskah as…

Kelenjar endokrin utama pada manusia: 1.Kelenjar Pineal. 2.Kelenjar Hipofisis. 3.Kelenjar Tiroid. 4.Kelenjar Timus. 5.Kelenjar Adrenal. 6.Kelenjar Pankreas. 7.Ovarium. 8.Testis Sistem endokrin adalah sistem kontrol kelenjar tanpa saluran (ductless) yang menghasilkan hormon yang tersirkulasi di tubuh melalui aliran darah untuk memengaruhi organ-organ lain. Hormon bertindak sebagai pembawa pesan dan dibawa oleh aliran darah ke berbagai sel dalam tubuh, yang selanjutnya akan menerjemahkan pesan ter…

Korps Brigade MobileKorps Brimob PolriAktif14 November 1945 Berdasarkan surat order Y.M. Menteri Kepala Kepolisian Negara No. Pol. 23/61/ tanggal 12 Agustus 1961 ditetapkan tanggal 14 November 1961 sebagai hari Mobrig ke-16NegaraRepublik IndonesiaTipe unitParamiliterPeranKhususJumlah personel45.000MotoJiwa Ragaku Demi KemanusiaanBaret BIRU GELAP Pertempuran Revolusi Nasional Indonesia Peristiwa Madiun Operasi Trikora Konfrontasi Indonesia-Malaysia Operasi Pagar Betis Operasi Seroja Kon…

Kieran Trippier Trippier bermain untuk Inggris di Piala Dunia FIFA 2018Informasi pribadiNama lengkap Kieran John Trippier[1]Tanggal lahir 19 September 1990 (umur 33)[2]Tempat lahir Bury, InggrisTinggi 173 cm (5 ft 8 in) [3]Posisi bermain Bek kananInformasi klubKlub saat ini Newcastle UnitedNomor 15Karier junior1999–2007 Manchester CityKarier senior*Tahun Tim Tampil (Gol)2007–2012 Manchester City 0 (0)2010 → Barnsley (pinjaman) 3 (0)2010–2011 …

Disney ChannelDiluncurkan17 Desember 2004NegaraIndiaBahasaInggrisHindiTeluguTamilSaluran seindukBindassDisney International HDDisney Junior (India)Disney XD (India)Hungama TVUTV MoviesUTV ActionSitus webDisney Channel (India) Disney Channel India adalah sebuah saluran televisi India milik divisi India dari The Walt Disney Company, yang mengkhususkan diri dalam penyiaran acara televisi untuk anak-anak melalui serial asli, film dan penayangan pihak ketiga. Saluran tersebut resmi diluncurkan pada 1…

Felis TaksonomiKerajaanAnimaliaFilumChordataKelasMammaliaOrdoCarnivoraFamiliFelidaeGenusFelis Linnaeus, 1758 Species Felis chaus Felis lunensis † Felis margarita Felis nigripes Felis silvestris Felis catus DistribusiFelis range lbs Felis adalah genus kucing dalam famili Felidae, termasuk kucing domestik dan kucing liar.[1] Spesies liar tersebar secara luas di seluruh Eropa, Asia Selatan dan Tengah, juga Afrika; kucing domestik telah diperkenalkan di seluruh dunia. Anggota genus Felis s…

Republik Demokratik Timor-Leste Pemakaian Bendera dan bendera kapal nasional Perbandingan 1:2 Dipakai 28 November 1975 (de facto) 19 Mei 2002 (de jure) Rancangan Bidang merah dengan segitiga sama kaki hitam yang didasarkan pada sisi kerekan yang memuat bintang putih berujung lima di tengah yang ditumpangkan pada segitiga kuning yang lebih besar, juga didasarkan pada sisi kerekan, yang memanjang ke tengah bendera. Bendera Timor Leste (bahasa Portugis: Bandeira de Timor-Leste) adalah bendera nasio…

Conquistador dalam bahasa Spanyol berarti penakluk. Istilah ini secara khusus diberikan kepada para serdadu dan kolonis Spanyol yang pergi menjelajah ke benua Amerika, dan kemudian ke Asia untuk melakukan Conquista (penaklukan) dalam rangka mencari rempah-rempah dan kemudian menaklukkan bangsa Indian Inka, Aztek, Maya, dan Filipina. Penemuan Columbus akan Dunia Baru pada 1492 memberikan kesempatan kepada Spanyol kesempatan terlebih dulu dalam melakukan kolonisasi di benua Amerika, ketika para pe…

La Teapot Dome Rock ed i pozzi petroliferi dell'area coinvolti nello scandalo Lo scandalo Teapot Dome è stato uno scandalo di corruzione che coinvolse l'amministrazione del presidente degli Stati Uniti d'America Warren G. Harding (1921-1923). Il Segretario degli Interni Albert Bacon Fall aveva conferito ad alcune compagnie petrolifere private la concessione di estrazione, a tassi bassi e senza offerte competitive, nella riserva petrolifera presso Teapot Dome (Wyoming) e in altre due riserve in …

Porsche 963 de la catégorie LMDh. Le Mans Daytona h (LMDh) est une catégorie de voitures de compétition de type sport-prototypes conçues pour participer au championnat du monde d'endurance FIA (WEC) ainsi qu'aux compétitions IMSA, à compter de la saison 2022 pour le FIA WEC et de la saison 2023 pour l'IMSA. LMDh et LMH (Le Mans Hypercar) sont deux types de voitures qui forment la catégorie reine Hypercar en championnat du monde WEC, en remplacement de l'ancienne catégorie LMP1. Dans le c…

Part of a series on the History of Hamburg by timeline Prehistory and AntiquityHamburg culture (15 ka)Treva (1st CE)Tangendorf disc brooch (3rd CE) Middle AgesHammaburg (810)Archbishops (832–1072)Cathedral (1035)Bornhöved (1227)Hanseatic League (1321–1669)Victual Brothers (1389–1401)Constitution (1410) Early ModernFree Imperial city (1510–1806)All Saints' Flood (1570)Barbary pirates (1578–1751)Greenland whaling (1644–1806) Continental BlockadeBouches-de-l'Elbe (1811–14)Siege of Ha…

Second-largest city in Moldova For other uses, see Balti. Not to be confused with Belz. Municipality in MoldovaBălțiMunicipality FlagSealBălțiLocation within MoldovaCoordinates: 47°46′N 27°55′E / 47.767°N 27.917°E / 47.767; 27.917Country MoldovaCommunesSadovoe, ElizavetaFounded1620[1][2][3][4]City rights1803[5][6]Government • TypeMayor–council government • MayorAlexandr Petkov (Our …

2012 song by Nicki Minaj Marilyn MonroeSong by Nicki Minajfrom the album Pink Friday: Roman Reloaded Recorded2011Conway StudiosBeluga Heights Studio (Los Angeles, California)GenrePopLength3:21Label Young Money Cash Money Republic Songwriter(s) Onika Maraj Daniel James Leah Haywood Ross Golan J.R. Rotem Producer(s) J.R. Rotem Dreamlab Audio videoMarilyn Monroe on YouTube Marilyn Monroe is a 2012 song by American rapper Nicki Minaj. The song was written by Minaj, Daniel James, Leah Haywood, Ross G…

Cet article est une ébauche concernant une église ou une cathédrale et les Alpes-de-Haute-Provence. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les recommandations des projets correspondants. Cette cathédrale n’est pas la seule cathédrale Notre-Dame-de-l'Assomption. Cathédrale Notre-Dame de l'Assomption d'Entrevaux Vue de la façade. Présentation Culte Catholique Dédicataire Assomption de Marie Type Église paroissialeAncienne cathédrale (jusqu'en …

Questa voce sull'argomento hockeisti su ghiaccio tedeschi è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Christoph Schubert Nazionalità  Germania Altezza 191 cm Peso 107 kg Hockey su ghiaccio Ruolo Difensore Palmarès Per maggiori dettagli vedi qui   Modifica dati su Wikidata · Manuale Christoph Schubert (Monaco di Baviera, 5 febbraio 1982) è un hockeista su ghiaccio tedesco. Carriera Nel corso della sua carriera ha indossato le maglie …

English rugby union player For the English footballer and administrator, see Jim Rodwell. Rugby playerJames RodwellRodwell at the 2009 Hong Kong SevensDate of birth (1984-08-23) 23 August 1984 (age 39)Place of birthWendover, Buckinghamshire, EnglandHeight1.95 m (6 ft 5 in)Weight106 kg (234 lb)Rugby union careerPosition(s) ForwardNational sevens teamYears Team Comps2008– England 93 Medal record Men's rugby sevens Representing  Great Britain Olympic Games 2016 …

Kembali kehalaman sebelumnya