-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
MSNM-Sensor for local testing #3
Comments
HI Jesús, nfcapd daemon gets traffic flows from every known NIC by default. I have never used -b option to specify an IP, but you can check it by yourself. If you want to change the number of observations the monitoring graphs show, you have to modify the config.py file located at dashboard/mainboard/config.py Then, you have to restart the dashboard. I hope it helps you! Best, |
Thank you Roberto, I keep working on this and conclude that nfcapd has problem with tcpreplay or even with pcap files, I'm waiting to get a solution to post here as soon as possible. In fact I post the problem I face and maybe you could help me. What I'm trying to do is use the traffic in a pcap file to annalyze with the msnm-sensor and be able to reproduce any traffic or any environment in the virtual machine offered by you. For this I thought in two ways:
I guess that the problem have to be in the timestamp o something like that, in any case, I comment the problem to trace the process that I'm following. I'll keep you informed. Greeting and thank you all Update 1: I didn't get the relation until just now. The problem is that the iptables rules are not apply to tcpreplay traffic. I'm checking for a solution. |
Hi everybody, I get that the traffic read from a pcap. For that you have to read it with tcpreplay in the host machine (or other virtual machine) changing the ip addresses and mac addresses to be congruent. In particular in my example the pcap add a server with 127.0.0.1 and several sensors with 127.0.0.x, and I used the next command to custom the pcap and all the macs (sources and destiny) were the 00:00:00:00:00:00, so I had to deploy the next commands:
Until here we have the traffic read in the host machine passing through the REDIRECT iptables filter. Some details: I hope this will help you to be more flexible in future experiments. Please don't close still the issue because probably with the next experiments I will some information to add here. Greetings, Jesús. |
Hi everybody again, I was investing and discover a little deficiency. Using the context up described I get pass through the iptables of the msnm-sensor machine the traffic replayed using tcpreplay. The point is that I needed to limit the packets per minute to around 150. If I send more than that the csv returned in the examples/scenario_4/routerR1/data/sources/netflow/parsed appear like empty with 0 bytes contained. I did't investigate the reason of that but I guess that is not hard to extend this limitation. I'm planning to upload (in somewhere) the instructions followed to deploy this environment, I will text where when I finish my investment. By the way, how were limited the number of packets was using --mbps 0.002: Greetings, Jesús. |
Hi again, I will update soon |
Hello again, I think that I found a wall in my experiments related with this. I prepared a scenario to test the replaying of a traffic content in a pcap as I said before, and I found a limit in the bit rate taxe that nfcapd cap proccess (The problem comes from empty files in /tmp/netflow_captures). I even delete the payload of each packet (to be able to send more whit the same data rate) and the problem persist. And I thought that the problem was related with the pcap file but I tried a high data rate scan with nmap (sudo nmap -sS --min-rate 5000 -p- -Pn -n msnm-sensor) and the result was the same, empty files in /etc/netflow_captures Did you had this problem during your experiments? |
Good morning again,
I'm trying to use the project to get conclusions about a pcap file with "clean traffic" to calibrate dynamically each 60 minutes and after 2 hours starting to generate malicious traffic to check if the Q-st and D-st observations go out from the UCL's. Here I face with two main problems.
I'm using tcpreplay to generate the traffic in my computer, where I can choose the interface which will read this packets. Checking the
activateNetflow.sh
script, I not sure which interface is listening to generate the nfcapd files. The three interface avaliable are 'lo', 'enp0s3' and 'enp0s8'. I thought to apply the parameter -b"-b bindhost
Specifies the hostname/IPv4/IPv6 address to bind for listening. This can be an IP
address or a hostname, resolving to an IP address attached to an interface. Defaults
to any available IPv4 interface, if not specified."
but I wanted to take advice of you.
The other point is about the dashboard, it looks like just show (Represent) the Q-st and D-st value of the last 90 observations (1'5 hours) is there a way to expand that to several hours?
About the scenario, I'm just using routerR1 to analyze the results but in the context of me is enough to check the followed methodology.
Thank you and greetings,
Jesús.
The text was updated successfully, but these errors were encountered: