HowTo Visualise ntopng Alerts in Kibana

Posted · Add Comment

ntopng can export both flows and alerts in Elastic according to the Elastic Common Schema (ECS) format. You can dump flows (not alerts) in Elastic starting ntopng with -F “es;<mapping type>;<idx name>;<es URL>;<http auth>”. For instance you can do ntopng -F “es;ntopng;ntopng-%%Y.%%m.%%d;http://localhost:9200/_bulk;” We do not advise to use Elastic as flow collector, as when the […]

Introducing PF_RING 8.2: New Mellanox Support

Posted · Add Comment

This is to announce a new PF_RING release 8.2! This new stable version adds support for a new family of ASIC-based adapters from Mellanox/NVIDIA, including ConnectX-5 and ConnectX-6 (please check the User’s Guide for the exact list of supported firmwares). This new driver/adapter combination delivers high performance (in our tests nProbe Cento was able to scale up to […]

HowTo Use nProbe To Create Traffic Timeseries in InfluxDB

Posted · Add Comment

One of the latest additions in nProbe, is the ability to create network traffic timeseries that will be stored in the popular InfluxDB database. This features allows nProbe users to create timeseries that can be depicted and integrated in Grafana dashboard for instance. Timeseries are dumped by means of two new nProbe command line options: […]

ntopConf2022: News, Announcements and Future Plans

Posted · Add Comment

Last week the ntopConf 2022 was held in presence in Milan at Bocconi University and about 100 people attended it. Presentation material including slides and videos are available at the conference page so even if you have missed this event you can see what happened and presented. On a nutshell: This July we will release […]

How to Configure Flow Risk Exclusions in nDPI and ntopng

Posted · Add Comment

Flow risks are the mechanism nDPI implements for detecting issues in network traffic whose theoretical design is documented in this paper Using Deep Packet Inspection in CyberTraffic Analysis we have written last year. While we are reworking the definition of risk exceptions in ntopng to make them fully configurable with a matter of clicks, you […]

Best Practices for Using ntop Tools on Containers

Posted · Add Comment

Many people use software containers to simplify application deployment. As you know ntop tools are also available on docker hub for quick deployment using Docker or other container management tools such as Portainer or Kubernetes. When using containers, there are a few things to keep in mind: Service Persistency ntopng relies on third party services […]

How ntopng monitors IEC 60870-5-104 traffic

Posted · Add Comment

Busy times for OT analysts. Last month the number of known OT (operational technology) malware increased from five to seven. First malware discovered is Industroyer2 which was caught in the Ukraine. As nowadays popular, security companies name the malware they discover. That is why for the second malware two names were assigned, Incontroller or Pipedream. […]

Registration for ntopConf 2022 (June 23-24) is now Open

Posted · Add Comment

This year the ntop community will meet in Milan, Italy on June 23-24. Conference will take place the first day, whereas the second day will be used for training. We’ll be talking about network traffic monitoring, cybersecurity, and discuss future roadmap items. It is a good chance to get together after pandemic restrictions, as well […]

HowTo Use TLS for Securing Flow Export/Collection

Posted · Add Comment

One of the main limitations of flow-based protocols such as IPFIX and NetFlow is that the traffic is sent in cleartext. This means that it can be observed in transit and that it is pretty simple to send fake flow packets that can then pollute the collected information. As of today, unencrypted protocols need to […]

How PF_RING is Used to Fight Internet Censorship: Refraction Networking

Posted · Add Comment

Internet censorship is a global phenomenon (see Figure 1) that aims to throttle or entirely block access to certain Internet resources. National or regional governments impose Internet censorship by using sophisticated networking appliances—strategically placed at the edge of their networks at various Internet inter-connection points—capable of inspecting and discarding network packets destined to sites with […]