Network Monitoring / NDR
Network Monitoring monitors network traffic for anomalies, outages, and attacks. Network Detection and Response (NDR) is the security-focused evolution of this technology: using behavioral analysis, machine learning, and threat intelligence, NDR also detects zero-day attacks, lateral movement, and data exfiltration within the internal network.
Network Monitoring is the continuous monitoring of network devices, connections, and traffic for performance issues and security incidents. NDR (Network Detection and Response) goes a step further: It analyzes all network traffic using behavior-based analysis and detects attacks that bypass endpoint security solutions.
Network Monitoring vs. NDR
Traditional Network Monitoring
- Availability: Is the router/switch reachable?
- Performance: Bandwidth, latency, packet loss
- Configuration: Changes to network devices
- Tools: PRTG, Zabbix, Nagios, LibreNMS
Network Detection and Response (NDR)
- Security Focus: Attack detection in traffic
- Behavior-Based: Deviations from the baseline
- Threat Intelligence: Known IoCs, C2 domains
- ML-based: Detects unknown attack patterns
- Response: Manual or automated response
- Tools: Darktrace, Vectra, Cisco Stealthwatch, Zeek+SIEM
NDR detects what EDR misses
Scenario: Attacker uses legitimate admin tools (WMI, PowerShell Remoting)
- Endpoint: sees normal admin processes, no alert
- NDR: sees unusual east-west traffic, alert
Scenario: Compromised IoT device exfiltrates data
- Endpoint: no agent possible on IoT device
- NDR: sees DNS tunneling patterns, alert
Network Flow Analysis - NetFlow/IPFIX
NetFlow does not capture complete packets (too much memory), but rather flow data: source, destination, port, protocol, bytes, packets, time. Generated by routers, switches, and firewalls.
NetFlow entry example:
Src-IP:Port Dst-IP:Port Proto Bytes Pkts Start-Time
10.0.1.50:443 93.184.216.34:443 TCP 15.2MB 12400 09:15:03.000
What NetFlow analysis detects:
- Port scans: many connections from a single source
- Data exfiltration: unusually high outgoing bytes
- Beaconing: regular connections to the same IP (C2 indicator)
- Lateral movement: unusual internal connection patterns
- DNS tunneling: excessive number of DNS queries
Open-source NetFlow collection with nfdump/nfsen:
# nfcapd: NetFlow collector
nfcapd -D -l /var/cache/nfdump -p 2055 -T all
# Analysis: Top 10 talkers (last hour)
nfdump -R /var/cache/nfdump -n 10 -s record/bytes
# Search for suspicious DNS query volumes
nfdump -R /var/cache/nfdump \
-A srcip -s record/bytes \
'proto udp and dst port 53' | head -20
Deep Packet Inspection (DPI) and Zeek
Zeek (formerly Bro) - Network Analysis Framework
Zeek generates structured logs from network traffic without real-time blocking. It is extremely valuable for forensics and threat hunting.
apt install zeek
Basic configuration (/etc/zeek/node.cfg):
[zeek]
type=standalone
host=localhost
interface=eth0
# Start:
zeekctl deploy
Zeek logs (in /var/log/zeek/current/):
| Log | Content |
|---|---|
conn.log | all TCP/UDP/ICMP connections |
dns.log | all DNS queries (extremely valuable) |
http.log | HTTP requests (User-Agent, URL, status) |
ssl.log | TLS connections (certificate, JA3 hash) |
files.log | transferred files (MD5 hash) |
x509.log | certificate details |
weird.log | anomalous behavior (RFC violations) |
notice.log | Zeek alerts |
DNS log example:
ts uid id.orig_h query qtype answer
1709.123456 Cfk8G0 10.0.1.50 evil.c2server.com A 45.33.32.156
1709.123457 Cfk8G1 10.0.1.50 evil.c2server.com A 45.33.32.156
# ↑ Repeated queries to the same domain = beaconing indicator!
JA3/JA3S - TLS Fingerprinting:
- Fingerprint of the TLS client (which cipher suites, extensions?)
- Known malware has known JA3 hashes
- Zeek automatically generates JA3 in
ssl.log - Threat Intel: ssl-bl.abuse.ch JA3 blacklist
Practical Anomaly Detection
1. Port Scan Detection (Zeek Notice Policy)
event notice(n: Notice::Info) {
if (n$note == Scan::Port_Scan) {
print fmt("PORT SCAN from %s", n$src);
}
}
2. Suspected DNS Tunneling (KQL for Microsoft Sentinel)
DnsEvents
| where TimeGenerated > ago(1h)
| summarize QueryCount=count(), Domains=dcount(Name)
by ClientIP
| where QueryCount > 500 or Domains > 100
| order by QueryCount desc
3. Beaconing Detection (Regular C2 Connections)
DeviceNetworkEvents
| where TimeGenerated > ago(24h)
| summarize ConnectionCount=count(),
AvgInterval=avg(TimeGenerated)
by DeviceName, RemoteIP, RemotePort
| where ConnectionCount > 50
| extend RegularBeacon = ConnectionCount > 100
| where RegularBeacon == true
4. Data Exfiltration Detection
DeviceNetworkEvents
| where TimeGenerated > ago(24h)
| where RemoteIPType == "Public"
| summarize TotalBytesSent=sum(SentBytes)
by DeviceName, RemoteIP
| where TotalBytesSent > 100000000 // >100 MB to an external IP
| order by TotalBytesSent desc
5. Lateral Movement (Unusual Admin Connections)
SecurityEvent
| where EventID in (4624, 4648) // Logon Events
| where LogonType in (3, 10) // Network + Remote Interactive
| summarize count() by
SourceComputerName, TargetComputerName, Account
| where count_ > 10
| order by count_ desc
NDR Products Compared
Open Source / Free
Zeek + ELK Stack
- Zeek generates logs, Elasticsearch indexes them, Kibana visualizes them
- Free, but setup is time-consuming (~2 days)
- Ideal for threat hunting and forensics
- No ML/anomaly detection out-of-the-box
Suricata + MISP
- Suricata: Real-time signature and anomaly detection
- MISP: Threat Intelligence Platform (IoC feeds)
- Combination: New IoC in MISP → Automatic Suricata rule
- Free, active community
Security Onion
- All-in-one distribution: Zeek + Suricata + ELK + Kibana
- Ideal for getting started with network monitoring
- ISO: security-onion.net
Commercial NDR Solutions
Darktrace
- AI-based anomaly detection (proprietary AI)
- “Self-learning”: learns its own environment
- Automated response (Antigena) possible
- Very expensive, starting at approx. 50,000 EUR/year
Vectra AI
- Attack Signal Intelligence
- Focus: Privilege Escalation, Lateral Movement
- Good for Active Directory Monitoring
- Mid-market pricing
Cisco Stealthwatch (Secure Network Analytics)
- NetFlow-based, scales for large networks
- Integration into the Cisco security ecosystem
- Suitable for existing Cisco infrastructure
Recommendations for SMBs:
- Zeek + Elastic Security SIEM (open source)
- ExtraHop Reveal(x) (mid-market, good value for money)
- Corelight (Zeek Enterprise, support included)