Deploy Zeek (Bro), Security Onion, Wireshark. Deep packet inspection. Traffic baselining.
Network Monitoring continuously captures and analyzes network traffic to detect anomalies, threats, and performance issues. Unlike firewalls that block traffic, monitoring tools passively observe everything flowing through the network for forensics, threat hunting, and compliance.
Network Security Monitor (NSM) framework
Packet capture & analysis (GUI)
All-in-one NSM distro (Linux)
CLI packet capture (lightweight)
Unusual domains (DGA), DNS tunneling (data exfil via DNS), C2 beaconing
Self-signed certs (malware), suspicious CN/SAN fields, expired certificates
Large outbound transfers (exfiltration), FTP/SMB file activity, archive uploads (.zip, .rar)
Connections to unexpected countries (e.g., China, Russia for US org), blacklisted IPs
Regular beaconing (malware C2), long-duration connections, port scanning
Unusual protocols (IRC, Tor), protocol misuse (HTTP on port 8443), raw sockets
💡 These logs are JSON/TSV formatted and easily ingested into Splunk, ELK, or QRadar for correlation
Deploy SPAN/TAP to mirror traffic. Use tcpdump or Zeek to capture packets.
Zeek generates logs. Wireshark dissects packets. Extract metadata (IPs, domains, files).
GeoIP lookup, threat intel feeds (VirusTotal, AlienVault OTX), WHOIS, passive DNS.
SIEM correlates network logs with endpoint, firewall, AD logs. Detect attack chains.
Proactively search for IOCs (indicators of compromise). Stack counting, frequency analysis.
Real-time network event capture and analysis. Detect threats through traffic patterns.