<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Flexible Archives &#8211; CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</title>
	<atom:link href="https://cysight.ai/tag/flexible/feed/" rel="self" type="application/rss+xml" />
	<link>https://cysight.ai/tag/flexible/</link>
	<description>AI-Driven Cybersecurity for NetFlow, IPFIX and sFlow, with Encrypted Traffic Analysis, Baselining and Security Observability</description>
	<lastBuildDate>Thu, 19 Sep 2024 12:28:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</title>
		<link>https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 07:07:14 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Advanced Netflow]]></category>
		<category><![CDATA[Flexible]]></category>
		<category><![CDATA[Granular]]></category>
		<category><![CDATA[Scalable Netflow]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=10</guid>

					<description><![CDATA[<p>Why is flows per second a flawed way to measure a netflow collector&#8217;s capability? Flows-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer’s flow capture (aka collection) rate. This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right?...</p>
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="Default"><strong><span lang="EN-US"> Why is flows per second a flawed way to measure a netflow collector&#8217;s capability?</span></strong></h3>
<p class="Default">Flows<span lang="EN-US">-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer</span><span lang="EN-US">’</span><span lang="EN-US">s flow capture (aka collection) rate.</span></p>
<p class="Default"><span lang="EN-US">This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right? Well, yes and no.</span></p>
<p class="Default"><strong><span lang="EN-US">The Basics<br />
</span></strong></p>
<p class="Default"><span lang="EN-US">NetFlow was originally conceived as a means to provide network professionals the data to make sense of the traffic on their network without having to resort to expensive per segment based packet sniffing tools.</span></p>
<p class="Default"><span lang="EN-US">A flow record contains at minimum the basic information pertaining to a transfer of data through a router, switch, firewall, packet tap or other network gateway. A typical flow record will contain at minimum: Source IP, Destination IP, Source Port, Destination Port, Protocol, Tos, Ingress Interface and Egress Interface. Flow records are exported to a flow collector where they are ingested and information orientated to the engineer</span><span lang="EN-US">’</span><span lang="EN-US">s purposes are displayed.</span></p>
<p class="Default"><strong><span lang="EN-US">Measurement</span></strong></p>
<p class="Default"><span lang="EN-US">Measurement has always been how the </span>IT industry express<span lang="EN-US">es</span> <span lang="EN-US">power and competency. However, a formula used to reflect power and ability changes when a technology design undergoes a paradigm shift.</span></p>
<p class="Default"><span lang="EN-US">For example, when expressing how fast a computer is we used to measure the CPU clock speed. We believed that the higher the clock speed the more powerful the computer. However, when </span><span lang="IT">multi-core chips</span><span lang="EN-US"> were introduced the CPU power and </span><span lang="NL">speed </span><span lang="EN-US">dropped but the CPU in fact became more powerful. The primary clock speed measurement indicator became secondary to the ability to multi-thread.</span></p>
<p class="Default"><span lang="EN-US">The f</span>lows<span lang="EN-US">-per-second yardstick is misleading as it incorrectly reflects the actual power and capability of a flow collector to capture and process flow data and it has become prone to marketing exaggeration.</span></p>
<p class="Default"><strong><span lang="EN-US">Flow Capture Rate</span></strong></p>
<p class="Default"><span lang="EN-US">Flow capture rate ability is difficult to measure and to quantify a products scalability. There are various factors that can dramatically impact the ability to collect flows and to retain</span> <span lang="EN-US">sufficient </span>flows<span lang="EN-US"> to perform higher-end diagnostics.</span></p>
<p class="Default"><span lang="EN-US">I</span>t<span lang="FR">’</span><span lang="EN-US">s important to look not just at flows-per-second but at the granularity retained per minute (flow retention rate), the speed and flexibility of alerting, reporting, forensic depth and diagnostics and the scalability when impacted by high-flow-variance, sudden-bursts, number of devices and interfaces, the speed of reporting over time, the ability to retain short-term and historical collections and the confluence of these factors as it pertains to scalability of the software as a whole.</span></p>
<p class="Default"><span lang="EN-US">Scalable NetFlow and flow retention rates are particularly critical to determine as appropriate granularity is needed to deliver the visibility required to perform A</span>nomaly <span lang="EN-US">Detection, Network Forensics, Root Cause Analysis, Billing substantiation, Peering Analysis and Data retention compliance.</span></p>
<p class="Default"><strong><span lang="EN-US">The higher the flows-per-second and the flow-variance the more challenging it becomes to achieve a high flow-retention-rate to archive and retain flow records in a data warehouse</span>.</strong></p>
<p class="Default">A vendor<span lang="EN-US">’</span><span lang="EN-US">s capability statement might reflect a high flows-per-second consumption ability but many</span> <span lang="EN-US">flow software </span><span lang="NL">tools </span><span lang="EN-US">have retention rate limitations by design.</span></p>
<p class="Default"><span lang="EN-US">It can mean that irrespective of achieving a high flow collection rate the netflow analyzer might only be capable of physically archiving</span> <span lang="EN-US">5</span>00 flows<span lang="EN-US"> per minute. Furthermore, these flows are usually the result of sorting the flow data by top </span>byte<span lang="EN-US">s to identify </span><span lang="EN-US">“</span><span lang="EN-US">Top 10</span><span lang="EN-US">” </span><span lang="EN-US">bandwidth abusers. Netflow products of this kind can be easily identified because they often tend to offer benefits orientated primarily to identifying bandwidth abuse or network performance monitoring.</span></p>
<p class="Default"><span lang="EN-US">Identifying bandwidth abusers is of course a very important benefit of a netflow analyzer. However, it has a marginal benefit today where a large amount of the abuse and risk is caused by many small flows.</span></p>
<p class="Default"><span lang="EN-US">These small flows usually fall beneath the radar screen of many netflow analysis products.</span>  <span lang="EN-US">Many abuses like DDoS, </span>p2p<span lang="EN-US">, botnets</span> <span lang="EN-US">and hacker or insider data exfiltration continue to occur and can at minimum impact the networking equipment and user experience. Lack of ability to quantify and understand small flows creates great risk leaving organizations exposed.</span></p>
<p class="Default"><strong><span lang="EN-US">Scalability</span></strong></p>
<p class="Default"><span lang="EN-US">This inability to scale in short-term</span> <span lang="EN-US">or historical analysis severely impacts a flow monitoring product</span><span lang="EN-US">’</span><span lang="EN-US">s ability to collect and retain critical information required in today</span><span lang="EN-US">’</span><span lang="EN-US">s world where copious data has created severe network blind spots</span>.</p>
<p class="Default"><span lang="IT">To qualify </span><span lang="EN-US">if a tool is really suitable for the purpose, you need to know more about the flows-per-second collection formula being provided by the vendor and <a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">some deeper investigation</a></span> <span lang="EN-US"><a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">should be carried out to qualify the claims</a>.</span></p>
<p class="Default"><strong><span lang="EN-US"> </span></strong></p>
<p class="Default"><strong><span lang="EN-US">With this in mind here are 3 key questions to <a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">ask your </a></span><span lang="EN-US"><a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">NetFlow</a> vendor to understand what their collection scalability claims really mean:</span></strong></p>
<ol>
<li class="Default"><strong><span lang="EN-US">How many </span>flow<span lang="EN-US">s</span> </strong><span lang="EN-US"><strong>can be collected per second?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ol>
<ul>
<li class="Default">Qualify if the flows per second rate provided is a burst rate or a sustained rate.</li>
<li class="Default">Ask how the collection and retention rates might be affected if the flows have high-flow variance (e.g. a DDoS attack).</li>
<li class="Default">How is the collection, archiving and reporting impacted when flow variance is increased by adding many devices and interfaces and distinct IPv4/IPv6 conversations and test what degradation in speed can you expect after it has been recording for some time.</li>
<li class="Default">Ask how the collection and retention rates might change if adding additional fields or measurements to the flow template (e.g. MPLS, MAC Address, URL, Latency)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">How many </span></strong><span lang="EN-US"><strong>flow records can be retained per minute?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ul>
<ul>
<li>Ask how the actual number of records inserted into the data warehouse per minute can be verified for short-term and historical collection.</li>
<li>Ask what happens to the flows that were not retained.</li>
<li>Ask what the flow retention logic is. (e.g. Top Bytes, First N)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">What information granularity is retained for both short-term and historically</span>?</strong>
<ul>
<li><span lang="EN-US">Does the data</span><span lang="EN-US">’</span><span lang="EN-US"><span lang="EN-US">s time granularity degrade as the data ages e.g. 1 day data retained per minute, 2 days retained per hour 5 days retained per quarter</span></span></li>
<li>Can you control the granularity and if so for how long?</li>
</ul>
</li>
</ul>
<p><strong><span lang="EN-US"> </span></strong></p>
<p><strong><span lang="EN-US">Remember &#8211; Rate of collection does not translate to information retention.</span></strong></p>
<p><span lang="EN-US">Do you know what</span><span lang="EN-US">’</span><span lang="EN-US">s really stored in the software&#8217;s database? After all you can only analyze what has been retained (either in memory or on disk) and it is that information retention granularity that provides a flow products benefits.</span></p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img fetchpriority="high" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
<p class="Default">
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
