Having discussed about what are the traffic patterns to be checked for to identify bot behavior, we will now look at how NetFlow / cFlowd data with ManageEngine NetFlow Analyzer can make the tracking much more easier. In case you have not read the PART 1 of this blog which outlines the traffic patterns related to bot behavior in a network, do catch up with it.

It is not easy to track the traffic behavior with just SNMP based or other tools as no technology provides an in depth information as NetFlow. To use NetFlow or cFlowd for traffic analysis, all you need is a device that is capable of exporting NetFlow / sFlow or similar flow packets. The sweet part of this is that NetFlow or similar flows are supported on most of the devices from the major vendors thus removing the need for additional equipment and hardware purchases. NetFlow Analyzer, which can be installed on a server in your network would receive the exported packets to generate reports about bandwidth and traffic. With no additional configuration to get the reports, setting up and reporting all happens in a matter of minutes.

Lets now delve into how the traffic patterns outlined in the last blog can be analyzed easily with NetFlow Analyzer using NetFlow data.

The first point we had talked about is the necessity of the bots to locate the C&C servers for updates and how this is done through DNS requests. Thus, seeing a large volume of DNS requests from the network is something to be concerned about.
NetFlow data can report in detail about the traffic and show you the applications passing through the interfaces. Monitoring the OUT traffic on the WAN link will show if there are any DNS requests to the Internet from the network and how much of the total traffic was taken up by these requests. You can also drill down on the application to find the hosts involved with the traffic. NetFlow Analyzer can also generate alerts if the DNS requests leaving the network exceeds an expected percentage. This can be done from ‘Alert Profiles’ under ‘Admin Operations’ where the alert for IN or OUT traffic with specific criteria can be set and have the alerts send as an email or SNMP trap.

After having located the C&C server, the bots communicate with them over IRC to receive the update commands on attacks to be performed or for updating the bot itself. If see your internal hosts communicating a lot over IRC, this should definitely be checked. To track this, you can take a look at the LAN or WAN interface and look at the applications being used. The ‘Application’ tab will show you if IRC is being used and the hosts involved with IRC traffic. Here again, you can make use of alerts to alert you or if you are expecting zero percent IRC traffic from the network, create an IP Group associating the IRC application and this grouping will show you even the smallest volume of IRC traffic in an easy to view category removing the needs for drill down and searches.

Another work of the bots is to spread further and this is done by scanning hosts in the subnet for vulnerable hosts. The scanning is done by sending small burst of packets in the subnet checking for host vulnerabilities. You can easily track the traffic based on packets for each interface from the Traffic – Packets tab. This should show you easily if there is an increase in the number of packets in the LAN without a large increase in traffic volume.

After locating the C&C server and after having received the updates, the botnets take part in a DDoS attack. One method of DDoS attack is by sending a high volume of outbound TCP SYN requests with an invalid source IP Address. Our blog on tracking TCP/SYN attack will help in finding an attack on your server and looking at the TCP/SYN requests exiting your WAN link will let you know if there are DDoS attacks originating from your network.

The last point we talked about was on how the botnets involved with email spamming can be identified. Since such bots sends millions of emails to all sort of email addresses, keep a watch on the SMTP traffic to the outside and get alerted for an unusually large volume of SMTP traffic. Here too you can make use of the IP Group option for tracking specific application behavior and this blog should help you on application tracking with IP Groups.

The features and capabilities of NetFlow Analyzer does not end here. You can make use of various options like customizable dashboard to track the top applications from the network, use IP Groups and alerts to inform you on traffic behavior, have reports exported to PDF, CSV or even instantly emailed and much more. Try ManageEngine NetFlow Analyzer 30 day trial with free technical support to have a hands on experience on what more you can do with NetFlow Analyzer.

Download | Interactive Demo | Product overview video

Regards,
Don Thomas Jacob

  1. Pingback: Twitted by dashokkumar