• Working at ntop
  • E-Shop Legal Information
  • E-Shop Terms and Conditions
  • GitHub
  • Resellers
  • Newsletter
ntop
  • Home
  • Blog
  • Products
    • Packet Capture
      • PF_RING
      • PF_RING ZC (Zero Copy)
      • PF_RING FT (Flow Table)
    • Traffic Recording & Replay
      • n2disk
      • disk2n
      • nBox Recorder
    • Flow-based Traffic Analysis
      • nProbe
      • nProbe™ Cento
      • nBox NetFlow/IPFIX
    • Traffic Analysis and Enforcement
      • ntopng
      • ntopng Edge
    • Deep Packet Inspection
      • nDPI
    • DDoS Mitigation and VPN
      • nScrub
      • n2n
  • Support
    • Documentation
      • FAQs
      • User’s Guides
      • Video Tutorials
    • Need Help?
      • Bug Report
      • Contact Us
      • Community Support
      • Commercial Support
    • Training
      • Professional Training
    • Misc
      • Code Security
      • Contributor License Agreement
      • Brochures
  • GitHub
  • Get Started
  • About
    • About Us
    • The ntop Team
    • ntop Conference
    • Credits
    • Partners
    • Resellers
    • Legal Information
    • Privacy Policy
    • Locations
    • Resources
  • Shop
admin 0

Security-Centric Traffic Analysis

Posted October 23, 2020 · Add Comment

Days ago we have given a short speak about cybersecurity at an Italian meetup. These are the presentation slides (English) where you can read more about the steps we have taken to make our tools more cybersecurity-oriented. Below you can … Continue reading →

Read More
Simone Mainardi 0

How Attack Mitigation Works (via SNMP)

Posted August 26, 2020 · Add Comment

One of the greatest strengths of ntopng is its ability to correlate data originating at different layers and at multiple sources together. For example, ntopng can look at IP packets, Ethernet frames and, at the same time, poll SNMP devices. … Continue reading →

Read More
admin 0

How to Detect Domain Hiding (a.k.a. as Domain Fronting)

Posted August 19, 2020 · Add Comment

Domain fronting is a technique that was used in 2010s by mobile apps to attempt to bypass censorship. The technique relies on a “front” legitimate domain that basically acts as a pivot for the forbidden domain. In essence an attacker … Continue reading →

Read More
admin 0

Mice and Elephants: HowTo Detect and Monitor Periodic Traffic

Posted August 4, 2020 · Add Comment

Most people are used to top X: top senders, top receivers, top protocols. So in essence they are looking for elephants. While this is a good practice, mice are also very interesting as they can often be hidden in the … Continue reading →

Read More
  • Next Entries →
 
  • Popular
  • Recent
  • Comments
  • Tags
  • PF_RING 6.0.3 Just ReleasedToday we have released PF_RING 6.0.3  a maintenance release that [...]
  • ntopng Deep Dive: Interview with Ivan PepelnjakLast month Ivan Pepelnjak interviewed me on Software Gone Wild [...]
  • ntop is back: ntopng 1.0 just releasedAfter 15 years since the introduction of the original ntop [...]
  • How ntopng monitors IEC 60870-5-104 trafficBusy times for OT analysts. Last month the number of [...]
  • How ntopng monitors IEC 60870-5-104 trafficBusy times for OT analysts. Last month the number of [...]
  • Registration for ntopConf 2022 (June 23-24) is now OpenThis year the ntop community will meet in Milan Italy [...]
  • HowTo Use TLS for Securing Flow Export/CollectionOne of the main limitations of flow-based protocols such as [...]
  • How PF_RING is Used to Fight Internet Censorship: Refraction NetworkingInternet censorship is a global phenomenon (see Figure 1) that [...]
active monitoring bgp cento containers ebpf elasticsearch export flows fosdem hancitor icinga2 infection influxdb inline layer7 netflow nProbe nprobeagent ntopng performance policer release round trip time rtt security stable tcp states telemetry themes visibility
  • Browse By Date

  • Browse By Categories

    • Announce (50)
    • cento (8)
    • Components (1)
    • Cybersecurity (14)
    • Features (2)
    • Guides (11)
    • libebpfflow (1)
    • n2disk (20)
    • n2n (7)
    • nbox (7)
    • nDPI (50)
    • nEdge (6)
    • News (13)
    • nProbe (93)
    • nScrub (3)
    • ntop (100)
    • ntopng (137)
    • PF_RING (91)
    • snort (3)
    • TNAPI (11)
    • tutorials (17)
    • vPF_RING (3)
    • Webinar (15)
    • ZC (30)
 
  • Latest Posts

    • How ntopng monitors IEC 60870-5-104 traffic
    • Registration for ntopConf 2022 (June 23-24) is now Open
    • HowTo Use TLS for Securing Flow Export/Collection
    • How PF_RING is Used to Fight Internet Censorship: Refraction Networking
    • ntop Conference 2022: Call for Speakers
  • Upcoming Events

    • June 23-24 - ntopConf 2022 (Milan)
© 1998-2022 ntop
ntop, ntopng, nDPI, PF_RING, nProbe, and n2disk are registered trademarks.