Investigating network flows
The flow, also commonly known as NetFlow, is network session information generated by network devices, such as routers and layer 3 switches, to aid network engineers during network issue troubleshooting. The flows have several names, based on the device vendor – for example, the used protocol for Cisco devices’ flow control is NetFlow (which is the most common and well-known flow protocol), Jupiter devices’ flow protocol is J-Flow, and HP devices’ flow protocol is Netstream.
Regardless of the name of the protocol used to generate the network session information, the generated information includes at least the following details:
- Timestamps (start and finish)
- A source IP
- A destination IP
- A source port
- A destination port
- Transferred bytes
Most SIEM solutions provide an integration capability to receive flows from different network devices. As an SOC analyst, you should take advantage of the network session information (NetFlow) generated from the network devices to detect and investigate the following:
- Suspicious communications from/to blacklisted IPs
- Suspicious communications over suspicious ports
- A high number of transferred bytes between two IPs
- Outbound communications during unusual times – for example, outside of working hours
You should now be aware of the information included in the generated network flows and how to utilize it to detect and investigate different cyber threats. In the next section, you will learn how to investigate IPS and IDS alerts.