190 likes | 412 Views
Monitoring Tools. Open Source Security Tools to monitor your network. Definition.
E N D
Monitoring Tools Open Source Security Tools to monitor your network
Definition Monitoring is defined as "observing and analyzing the status and behavior of the network, which involves end systems, intermediate systems and the core network. By monitoring a network the management entity can get the static, dynamic and statistical information of the network."
Nagios Why? • Offers monitoring and alerting capability for servers, switches, applications, and services • Very flexible in integrating with other third party programs • Many free plugins already developed by companies
Nagios really a security tool? Can be compared as a policemen who does round-the-clock patrols “ISPs claim heightened awareness and vigorous monitoring have helped reduce damage”
Nagios Add-ons Other projects extend the core functionality provided with a basic Nagios install • NSTI + SNMPTT - For managing SNMP traps and receiving alerts • NagVis- A visualization program that can be used to visualize data • NagiosQL - A web based administration tool that helps you to easily build, manage, and use acomplex configuration with all options enabled • BPI - An advanced grouping tool that allows you to define more complex dependencies for determining groups states
Cacti Why? • Provides performance measurement and advanced data acquisition methods • Many flexible graph templates already available • Keeps historical data collection for a long period of time • Little overhead and keeps storage requirements extremely low
Cacti add-ons • Other plugins extend the core functionality provided by a basic Cacti installation • Thold - A threshold Alert Module • Nectar - Plugin to send Graphs and Text to specified mail address(es) • Discovery - Adds auto host discovery to the software • Cycle - Automatically cycles through graphs • Boost - A large Site Performance Booster
Snort why? • Offers a network intrusion prevention and detection system (IDS/IPS) • The most widely deployed IDS/IPS technology worldwide • Perfect for quickly writing simple and powerful new rules • The de facto standard for IPS
Snort add-ons • Other projects extend the core functionality provided by a basic Snort install • Snorby - A new and modern Snort IDS front-end • Barnyard2 - A dedicated spooler for Snort's unified2 binary output format • Pulled_Pork- Perl script that automatically updates Snort rules • bProbe - A Snort IDS configured to run in packet logger mode
Logstash why? • Offers logs/event transport, processing, management, and search • Very fast search results even on a billion logs (elasticsearch) • Can produce multiple personalized dashboards • Can easily parse text-based logs
Logstash add-ons • Other projects extend the core functionality provided by a basic Logstash install • Elasticsearch – A distributed, RESTful, Real time analytics and search engine • Kibana - The visual front end for Logstash & Elasticsearch • RabbitMQ – An Advanced Message Queuing Protocol
Ntop why? • Shows traffic measurement, characterization and network usage in a real time • Monitor high speeds (1 Gbit and above) with common PCs • Detection of network security violations • Work with NetFlow & sFlow protocols
Ntop add-ons • Other projects extend the core functionality provided by a basic Ntop install. • Packet Filter Ring (PF_RING) - High-speed packet capture, filtering and analysis • nProbe- An Extensible NetFlow v5/v9/IPFIX Probe for IPv4/v6
Prival & blesk why? • Provides advanced technologies and solutions to its customers • Blesk represents ten years of development & knowledge in Open Source • Resources to help you implement open source monitoring technologies in your enterprise • Provides support and updates of all open source monitoring components • Customize and Improve open source technologies for your needs