Title: Network Analysis While Preserving Privacy
1Network Analysis While Preserving Privacy
- Karl F. Lutzen
- Information Security Officer
- kfl_at_mst.edu
- meaning contents of transmission
2Introduction
- Privacy concerns today
- Analyzing traffic usually is done by examining
packets Deep packet inspection - Looking at calling information can reveal much
- Can be used as an IDS
- Can be use as policy enforcement
3Calling Information
- Source IP address and port
- Destination IP address and port
- Protocol
- Other data
- Timestamps
- Number of packets
- Bytes
- Technology used Netflow
4NetFlow Background
- Developed by Cisco to
- Characterize traffic
- Account for how and where it flows
- Help optimize network investment
- Traffic engineering/network planning
- Provide usage-based billing
5NetFlow Background
- Three key characteristics
- Be scalable
- Be manageable
- Be reliable
6NetFlow Example
- Computer A Web browses to Computer B will
generate 2 flows - Request flow
- A (TCP) 1.2.3.43365 -gt 4.3.2.1 80
- Reply Flow
- B (TCP) 4.3.2.180 -gt 1.2.3.43365
7NetFlow Typical Record
- Source and destination IP address
- Source and destination ports
- Transport protocol TCP,UDP, ICMP, etc.
- Type of service (ToS)
- Packet and byte counts
- Start and end timestamps
- Input and output interface numbers
- TCP flags
- Routing information (next-hop address, source
autonomous system (AS) number, destination AS
number, source prefix mask, destination prefix
mask)
8NetFlow Data Cache
- Available on Cisco routers/switches
- Available on Juniper routers
- Cached on devices
- WARNING! Not all devices are NetFlow-enabled!
9NetFlow Cache Example
- show ip cache flow
- IP packet size distribution (78630M total
packets) - 1-32 64 96 128 160 192 224 256 288
320 352 384 416 448 480 - .002 .448 .062 .027 .013 .011 .008 .011 .003
.003 .002 .006 .005 .003 .002 - 512 544 576 1024 1536 2048 2560 3072 3584
4096 4608 - .002 .003 .015 .033 .331 .000 .000 .000 .000
.000 .000 - IP Flow Switching Cache, 6553988 bytes
- 32929 active, 32607 inactive, 524367786 added
- 4111490554 ager polls, 0 flow alloc failures
- Active flows timeout in 30 minutes
- Inactive flows timeout in 15 seconds
- IP Sub Flow Cache, 794824 bytes
- 32895 active, 16257 Inactive, 519171584 added,
519168554 added to flow - 0 alloc failures, 12911870 force free
- 3 chunks, 1155 chunks added
- last clearing of statistics never
- --More
10NetFlow Cache Example (cont.)
- Protocol Total Flows Packets Bytes
Packets Active(Sec) Idle(Sec) - -------- Flows /Sec /Flow /Pkt
/Sec /Flow /Flow - TCP-Telnet 3833510 0.8 10 179
9.2 9.0 26.8 - TCP-FTP 12511306 2.9 6 132
19.7 6.3 16.5 - TCP-FTPD 1194796 0.2 544 866
151.5 86.7 21.2 - TCP-WWW 944754736 219.9 13 627
2871.0 3.2 23.7 - TCP-SMTP 53320030 12.4 14 399
185.8 6.6 19.2 - TCP-X 913841 0.2 41 631
8.9 19.2 24.5 - TCP-BGP 1867 0.0 1 49
0.0 0.5 20.5 - TCP-NNTP 1086658 0.2 252 874
63.8 15.2 26.8 - TCP-Frag 228697 0.0 9 131
0.5 6.5 25.3 - TCP-other 2264274585 527.1 23 568
12466.6 12.9 24.4 - UDP-DNS 231113128 53.8 2 79
114.7 3.6 26.0 - UDP-NTP 6394017 1.4 3 76
5.2 9.7 27.2 - UDP-TFTP 13567 0.0 1 95
0.0 3.1 29.3 - UDP-Frag 211973 0.0 3165 1266
156.2 116.2 27.5 - UDP-other 1177902953 274.2 5 293
1385.8 6.1 25.8 - ICMP 103453714 24.0 2 62
57.9 3.8 26.0 - IGMP 726 0.0 2 300
0.0 3.5 29.1
11NetFlow Limitations of Cache
- Difficult to read
- Only shows recent activity
- No automation on devices for analysis
- No accounting of flows (besides overall totals)
12NetFlow Export of Data
- Greatly enhances NetFlow and turns the technology
into a analysis tool! - Data sent to external collector(s)
- Analyzed by one or more systems
- Archived for other concerns
- Efficient Uses multiple records per UDP packet
13NetFlow Export Establish Policies!
- Ensure policies are in place before deploying
covering - Retention of network usage statistics
- Establish a retention policy.
- Privacy protection of the data, who is
authorized, no offloading without sanitizing
personal data (the host portion)
14Privacy
- While the contents of the packet are not
recorded, the calling information can still be a
concern. - However, with virtual servers, it is impossible
to know the true destination - Mostly it can only be used as verification that
something occurred.
15Deployment Diagram
16Securing The Data Stream
- Hmm, hold on there!
- Using UDP, any Security in the transmission?
- Nope!
- Most deployments use a private, maintenance
network that only admins can touch.
17Introduction to flow-tools
- Full featured NetFlow tool set
- Open-source software
- Available from http//www.splintered.net/sw/flow-
tools/ - Entire package compiles on most Linux, FreeBSD,
etc. systems
18Flow-tools Contains
- flow-capture
- flow-cat
- flow-dscan
- flow-expire
- flow-export
- flow-fanout
- flow-filter
- flow-gen
- flow-header
- flow-import
- flow-mask
- flow-merge
- flow-nfilter
- flow-print
- flow-receive
- flow-report
- flow-send
- flow-split
- flow-stat
- flow-tag
- flow-xlate
19Single Source to Many Collectors
- flow-fanout
- Inline replacement for flow-capture
- Replicates a NetFlow stream to multiple locations
- Ideal for simultaneous
- Replicated storage
- Multiple systems for near real time analysis
20No NetFlow? Use fprobe
- http//sourceforge.net/projects/fprobe
- Open source NetFlow probe
- Linux, FreeBSD, etc.
- Uses a SPAN port or network tap
- Consider libpcap-ring kernel or MMAPed pcap for
high-speed collections (over 100 Mbits) - Can match CPU to traffic load
- Downside loss of interface on reports
21Portable Probe
- Build a couple of portable probes to have on hand
for remote probes for network analysis. Install
flow-tools, fprobe, tcpdump on a system with a
large hard drive. - When a problem occurs, you can deploy it on a
SPAN port or with a hub or network TAP.
22Traffic Analysis Know Thy Network!
- NetFlow records the communication between systems
- Quickly tells you what is happening on your
network at a high level - Can be used to spot anomalies
- Simple IDS capabilities
- Locate all stations doing the same thing on the
network - Policy enforcement
23Knowing Where to Look
- Deploy NetFlow on devices at keys location
- Border of network(s)
- Core points
- Deploy probes where needed
- Specific problem areas
- Network aggregation points without NetFlow
capabilities.
24Planning/Policies Make for Success
- Establish policies as to what traffic is allowed
- Establish specific pathways or gateways for
traffic like SMTP, IRC, HTTP, etc. - Any traffic not flowing through these gateways
are your indicator for problems - Segregate servers and workstations with subnets.
25Analysis Finding the Needles
- Which State?
- Which County?
- Which Field?
- Which haystack?
- What part of the haystack?
- How many needles?
26Finding the Needle(s) flow-stat
- The flow-stat command provides quick statistics
- Can provide reports on SRC/DST IPs or ports, as
well as others - Can sort by flows, octets or packets in ascending
or descending order - Coupled with flow-nfilter removes known good
traffic or look known problem traffic -
27Using flow-stat
- flow-stat f format S sort field lt filename
- Sort format
- -s (lower case) sort field ascending
- -S (upper case) sort field descending
- Remember that the first field or column will be
0, not 1!
- Report format.
- 0 Overall Summary
- 1 Average packet size distribution
- 2 Packets per flow distribution
- 3 Octets per flow distribution
- 4 Bandwidth per flow distribution
- 5 UDP/TCP destination port
- 6 UDP/TCP source port
- 7 UDP/TCP port
- 8 Destination IP
- 9 Source IP
- 10 Source/Destination IP
- 11 Source or Destination IP
28Stats sorted by flows
- --- ---- ---- Report Information --- --- ---
-
- Fields Total
- Symbols Disabled
- Sorting Descending Field 1
- Name Source IP
-
- Args flow-stat -f9 -S1
-
-
- IPaddr flows octets
packets -
- 207.188.7.131 8676 3579254
26397 - 131.151.165.34 5442 107280977
131352 - 131.151.1.7 4943 1570499 8382
- 131.151.1.145 4572 514276
10864 - 131.151.177.2 4374 9645573
57475 - 131.151.178.57 4176 8924188
11501 - 131.151.175.115 4110 28260371
42063
29Filtering traffic flow-nfilter
- filter-primitive test
- type ip-port
- permit 135
- permit 139
- permit 445
- or permit 135,139,445
- default deny
- filter-primitive ipok
- type ip-address
- deny 131.151.32.202
- default permit
- filter-primitive ip
- type ip-address-prefix
- permit 131.151/16
- default deny
- filter-primitive servers
- type ip-address-prefix
- deny 131.151.0/23
- deny 131.151.2/24
- default permit
- filter-definition ms-scan
- match dst-ip-port test
- match src-ip-addr ipok
- match src-ip-addr ip
- match dst-ip-addr servers
- match src-ip-addr servers
30Sasser Worm Example
- flow-nfilter -f ms-scan -F ms-scan lt
ft-v07.2004-05-02.155141-0500 flow-stat -f9 -S1
more - IPaddr flows octets
packets - 131.151.169.114 2380 860065 8302
- 131.151.171.111 2368 807897 8150
- 131.151.177.132 2365 797034 8165
- 131.151.176.229 2357 782567 8032
- 131.151.171.23 2353 787680 8045
- 131.151.173.40 2337 662575 7775
- 131.151.176.81 2329 843737 7848
- 131.151.175.151 2329 745276 7840
- 131.151.177.47 2321 653594 7697
- 131.151.172.131 2317 723814 7755
- 131.151.172.192 2317 640136 7640
- 131.151.172.224 2311 641091 7629
- 131.151.173.73 2301 623940 7568
- 131.151.63.62 2298 596356 7519
- 131.151.199.2 2297 789097 7801
31(No Transcript)
32(No Transcript)
33Profile of a Worm in NetFlow
- Can use different protocols
- High flow count
- Low packet count 3 packets or less per flow
- Use flow-stat or flow-report to spot them
- Downside If the stations generate other
traffic, it can obscure the worm activity
34Flow File Size Can Tell a Story
- Always keep an eye on the NetFlow file sizes
- Works best after a baseline of a few days or
weeks of observation. - General fluctuations are normal traffic patterns,
but a sudden surge indicates something new is
going on. - Sudden drops could indicate network problems.
35Pig in the Python
- -rw-r--r-- 1 netflow afsuser 2019685 May 2
1521 ft-v07.2004-10-02.151649-0500 - -rw-r--r-- 1 netflow afsuser 2031767 May 2
1526 ft-v07.2004-10-02.152148-0500 - -rw-r--r-- 1 netflow afsuser 2032419 May 2
1531 ft-v07.2004-10-02.152647-0500 - -rw-r--r-- 1 netflow afsuser 2072933 May 2
1536 ft-v07.2004-10-02.153145-0500 - -rw-r--r-- 1 netflow afsuser 2062822 May 2
1541 ft-v07.2004-10-02.153645-0500 - -rw-r--r-- 1 netflow afsuser 2120842 May 2
1546 ft-v07.2004-10-02.154144-0500 - -rw-r--r-- 1 netflow afsuser 7013906 May 2
1551 ft-v07.2004-10-02.154643-0500 - -rw-r--r-- 1 netflow afsuser 11331622 May 2
1556 ft-v07.2004-05-02.155141-0500 - -rw-r--r-- 1 netflow afsuser 15607255 May 2
1601 ft-v07.2004-05-02.155640-0500 - -rw-r--r-- 1 netflow afsuser 15748046 May 2
1606 ft-v07.2004-05-02.160139-0500 - -rw-r--r-- 1 netflow afsuser 14216272 May 2
1611 ft-v07.2004-05-02.160638-0500 - -rw-r--r-- 1 netflow afsuser 12008287 May 2
1616 ft-v07.2004-05-02.161137-0500 - -rw-r--r-- 1 netflow afsuser 9972353 May 2
1621 ft-v07.2004-05-02.161636-0500 - -rw-r--r-- 1 netflow afsuser 8973700 May 2
1626 ft-v07.2004-05-02.162135-0500 - -rw-r--r-- 1 netflow afsuser 9042363 May 2
1631 ft-v07.2004-05-02.162635-0500 - -rw-r--r-- 1 netflow afsuser 8017690 May 2
1636 ft-v07.2004-05-02.163133-0500 - -rw-r--r-- 1 netflow afsuser 8109288 May 2
1641 ft-v07.2004-05-02.163632-0500 - -rw-r--r-- 1 netflow afsuser 7301829 May 2
1646 ft-v07.2004-05-02.164131-0500 - -rw-r--r-- 1 netflow afsuser 7175834 May 2
1651 ft-v07.2004-05-02.164630-0500
36NetFlow Email Virus Detection
- Systems infected with Email viruses can be
detected via NetFlow due to - Multiple mail messages per host in the same flow
file (over 15 messages in 5 min) - Mail going directly to the border instead of
authorized servers (requires policies). - Policy enforcement example!
37Typical Email Virus
- flow-cat ft-v07.2004-11-18.190 flow-nfilter -f
/kfl/emailblocked -Femail flow-print -f3more - srcIP dstIP prot srcPort
dstPort octets packets - 131.151.148.26 64.12.138.152 6 1148
25 144 3 - 131.151.148.26 64.12.138.57 6 1150
25 144 3 - 131.151.148.26 64.12.138.89 6 1152
25 144 3 - 131.151.148.26 64.12.137.249 6 1154
25 144 3 - 131.151.148.26 67.28.113.11 6 1156
25 144 3 - 131.151.148.26 67.28.114.36 6 1158
25 144 3 - 131.151.148.26 64.156.215.7 6 1160
25 144 3 - 131.151.148.26 206.190.36.245 6 1162
25 144 3 - 131.151.148.26 67.28.113.11 6 1165
25 144 3 - 131.151.148.26 67.28.114.36 6 1167
25 144 3 - 131.151.148.26 64.156.215.7 6 1169
25 144 3 - 131.151.148.26 206.190.36.245 6 1171
25 144 3 - 131.151.148.26 66.135.195.181 6 1174
25 144 3 - 131.151.148.26 66.135.195.180 6 1176
25 144 3 - 131.151.148.26 66.135.195.181 6 1179
25 144 3 - 131.151.148.26 66.135.195.180 6 1181
25 144 3 - 131.151.148.26 195.245.231.83 6 1184
25 144 3
38Email checks Not all are bad
- flow-print f3 lt last grep 131.151.65.124
grep " 25 6 - srcIP dstIP prot srcPort
dstPort octets packets - 131.151.65.124 65.54.252.230 6 3828
25 96 2 - 131.151.65.124 65.54.252.99 6 3842
25 96 2 - 131.151.65.124 65.54.252.230 6 3852
25 96 2 - 131.151.65.124 64.4.50.239 6 3867
25 96 2 - 131.151.65.124 65.54.167.230 6 3879
25 96 2 - 131.151.65.124 65.54.252.99 6 3897
25 96 2 - 131.151.65.124 65.54.252.230 6 3912
25 96 2 - 131.151.65.124 64.4.50.239 6 3922
25 96 2 - 131.151.65.124 65.54.167.230 6 3934
25 96 2 - 131.151.65.124 65.54.252.99 6 3943
25 96 2 - 131.151.65.124 65.54.252.230 6 3957
25 96 2 - 131.151.65.124 64.4.50.239 6 3972
25 96 2 - 131.151.65.124 65.54.167.230 6 4003
25 96 2 - 131.151.65.124 65.54.252.99 6 4018
25 96 2 - 131.151.65.124 65.54.252.230 6 4035
25 96 2 - 131.151.65.124 64.4.50.239 6 4053
25 96 2 - 131.151.65.124 65.54.167.230 6 4072
25 96 2
39Controlled Mass Mailer
- flow-nfilter -f /kfl/emailblocked -F email lt
ft-v07.2004-11-17.220025-0600 \ - flow-print -f3
- srcIP dstIP prot srcPort
dstPort octets packets - 131.151.173.197 64.48.9.3 6 3281
25 144 3 - 131.151.173.197 32.97.166.40 6 3282
25 144 3 - 131.151.173.197 216.200.145.10 6 3283
25 144 3 - 131.151.173.197 208.36.123.68 6 3284
25 144 3 - 131.151.173.197 66.126.156.4 6 3285
25 144 3 - 131.151.173.197 61.9.0.109 6 3286
25 144 3 - 131.151.173.197 211.233.37.232 6 3287
25 144 3 - 131.151.173.197 200.217.215.90 6 3288
25 144 3 - 131.151.173.197 216.213.21.13 6 3289
25 144 3 - 131.151.173.197 202.138.96.6 6 3290
25 144 3 - 131.151.173.197 207.55.105.2 6 3291
25 144 3 - 131.151.173.197 216.86.113.228 6 3292
25 144 3 - 131.151.173.197 194.158.37.140 6 3293
25 144 3 - 131.151.173.197 209.242.224.42 6 3294
25 144 3 - 131.151.173.197 67.65.226.82 6 3295
25 144 3 - 131.151.173.197 64.18.4.10 6 3296
25 144 3
40Multiple Control Hosts
- flow-print -f3 lt ft-v07.2004-11-17.220025-0600
grep 131.151.173.197 more - 131.151.173.197 64.48.9.3 6 3281
25 144 3 - 218.7.120.95 131.151.173.197 6 1438
12942 217 5 - 131.151.173.197 218.7.120.95 6 12942
1438 168 4 - 131.151.173.197 32.97.166.40 6 3282
25 144 3 - 210.51.191.41 131.151.173.197 6 3900
12942 217 5 - 131.151.173.197 210.51.191.41 6 12942
3900 168 4 - 131.151.173.197 216.200.145.10 6 3283
25 144 3 - 218.16.122.101 131.151.173.197 6 4559
12942 217 5 - 131.151.173.197 218.16.122.101 6 12942
4559 168 4 - 131.151.173.197 208.36.123.68 6 3284
25 144 3 - 218.16.122.100 131.151.173.197 6 3570
12942 261 6 - 131.151.173.197 218.16.122.100 6 12942
3570 210 5 - 131.151.173.197 66.126.156.4 6 3285
25 144 3 - 207.46.106.169 131.151.173.197 6 1863
3010 356 1 - 131.151.173.197 207.46.106.169 6 3010
1863 40 1 - 61.142.80.147 131.151.173.197 6 2857
12942 261 6 - 131.151.173.197 61.142.80.147 6 12942
2857 210 5 - 131.151.173.197 61.9.0.109 6 3286
25 144 3
41Traffic Analysis Worm?
- flow-nfilter -f ms-scan -F ms-scan lt
ft-v07.2004-10-25.141702-0500 \ - flow-stat -f9 -S1 more
- --- ---- ---- Report Information --- --- ---
-
- Fields Total
- Symbols Disabled
- Sorting Descending Field 1
- Name Source IP
-
- Args flow-stat -f9 -S1
-
-
- IPaddr flows Octets
packets -
- 131.151.175.221 3365 186336
3882 - 131.151.151.144 137 89054
654 - 131.151.26.211 66 1913668
21807 - 131.151.38.229 41 60142
734 - 131.151.173.154 32 12131
93
42Traffic Analysis Zeroing In
- flow-print -f3 lt ft-v07.2004-10-25.141702-0500
grep 131.151.175.221 more - 131.151.175.221 39.20.119.86 6 1332
445 96 2 - 131.151.175.221 131.151.39.200 6 1333
445 96 2 - 131.151.175.221 131.151.197.61 6 1334
445 96 2 - 131.151.175.221 181.213.252.165 6 1336
445 144 3 - 131.151.175.221 131.120.180.161 6 1338
445 144 3 - 131.151.175.221 131.252.118.187 6 1339
445 144 3 - 131.151.175.221 213.22.152.79 6 1340
445 144 3 - 131.151.175.221 132.241.57.93 6 1341
445 144 3 - 131.151.175.221 131.20.244.221 6 1343
445 96 2 - 131.151.175.221 131.151.68.88 6 1246
445 96 2 - 131.151.175.221 131.7.183.3 6 1344
445 144 3 - 131.151.175.221 131.239.215.78 6 1345
445 96 2 - 131.151.175.221 131.151.221.89 6 1347
445 144 3 - 131.151.175.221 131.39.76.244 6 1348
445 96 2 - 131.151.175.221 131.151.66.165 6 1349
445 144 3 - 131.151.175.221 101.211.104.57 6 1286
445 96 2 - 131.151.175.221 38.110.247.113 6 1351
445 144 3 - 131.151.175.221 131.38.73.212 6 1352
445 96 2
43Traffic Analysis Check the Border
- flow-cat ft-v07.2004-10-25.141 flow-print f3
grep 131.151.175.221 - srcIP dstIP prot srcPort
dstPort octets packets - 131.151.175.221 65.54.252.230 6 3828
80 9173 15 - 65.54.252.230 131.151.175.221 6 80
3828 38860 72 - 131.151.175.221 64.4.50.132 6 2127
80 1516 7 - 64.4.50.132 131.151.175.221 6 80
2127 17834 32 - 131.151.175.221 128.73.23.25 6 2523
80 7872 123 - 128.73.23.25 131.151.175.221 6 80
2523 287793 374 - 131.151.175.221 206.63.81.89 6 1034
6667 11291 269 - 206.63.81.89 131.151.175.221 6 6667
1034 42958 290 - 206.63.81.89 131.151.175.221 6 6667
1034 105 1 - Turns out that this was an IRC controlled Bot
sdbot.worm.j
44Situation IFRAME Exploit
- System suddenly generated a virus warning after
visiting a well known, trusted website. - System scan removed the known virus and
downloader, but an undetectable trojan was
downloaded during the event. - Trojan NOT detectable after virus definition
update and full system scan. - System now displays ads and runs very slow
- Analysis of system required. Noted traffic
involving Netherlands IP address.
45IFRAME Exploit Examining traffic
- flow-cat ft-v07.2004-11-18.08 flow-print f3
grep " 62\.4\.84 - srcIP dstIP prot srcPort
dstPort octets packets - 131.151.232.172 62.4.84.45 6 3585
80 1106 23 - 62.4.84.45 131.151.232.172 6 3585
80 42562 34 - 131.151.232.172 62.4.84.41 6 3586
80 12637 313 - 62.4.84.41 131.151.232.172 6 80
3586 879907 590 - 131.151.232.172 62.4.84.53 6 3587
80 1633 7 - 62.4.84.53 131.151.232.172 6 80
3587 2257 6 - We knew approximate time of the event.
- Search on the network portion of the IP address
in question. - Three systems on foreign network are involved in
the exploit. - Banned IP range to contain problem.
- Now we can search an entire days logs to find
the number of infected systems.
46Create iframe Filter
- filter-primitive test-address
- type ip-address
- permit 62.4.84.41
- permit 62.4.84.45
- permit 62.4.84.53
- default deny
- filter-primitive test-protocol
- type ip-protocol
- permit tcp
- filter-definition iframe
- match dst-ip-addr test-address
- match ip-protocol test-protocol
47Run iframe Filter
- flow-cat f flow-nfilter -f iframe -F iframe
flow-print -f3 gt \ /out - Then run this output through awk, sort and grep
- awk 'print 1' /out sort u grep 131.151
- 131.151.177.161
- 131.151.178.45
- 131.151.174.18
- 131.151.176.14
- 131.151.177.44
- 131.151.176.38
- 131.151.170.80
- 131.151.174.10
- 131.151.174.40
- 131.151.178.128
- 131.151.169.181
- 131.151.170.87
- 131.151.18.149
- 131.151.18.8
48Spot Who is Using Services
- Netflow is very useful for determining
- Who is using various services
- Impact on closing down ports
- Location of servers
49Other Types of Detection
- Spyware
- Verify claims on traffic from your network
- DMCA reports
- Attacks reports
- Scanning reports
- Email spoofed or real
- Can aid with determining access controls and
Firewall rules null interface for dropped
traffic
50Other Links
- MOREnet NetFlow usage stats http//solutions.mor
e.net/mymorenet/plogin/ - Cisco http//www.cisco.com
- flow-tools home http//www.splintered.net/sw/flo
w-tools/ - Great selection of links for various NetFlow
toolshttp//www.switch.ch/tf-tant/floma/software
.html - Fprobe source http//sourceforge.net/projects/fpr
obe - Libcap-ring, nprobe, ntop http//www.ntop.org
- Well known IP ports (very good reference for
analysis) http//www.iana.org/assignments/port-n
umbers - If you ever have any questions of any sort,
please email me at kfl_at_mst.edu.