Presented at the first annual O'Reilly Security conference.
Presented at the first annual O'Reilly Security conference.
Network packet broker hardware is one way to acquire network monitoring data at scale for on-premises intrusion detection. Deployment of this kind of hardware is easy to understand. However, the result is a highly concentrated network capture source. Thus, the next challenge in developing an intrusion detection system becomes finding the tiny amount of relevant information in a very large stream—and doing so efficiently.
Jeff Henrikson presents a data pipeline for digesting useful analytics for intrusion detection from aggregated PCAP, with an emphasis on its highest throughput stage: conversion of PCAP to a netflow-like format. The main building blocks for the system are libpcap, Kafka, Scala, Akka, and Docker. The pipeline runs efficiently at 10 GB a second with end-to-end latency of two minutes and processes streams without approximation. Any individual node can be removed from the system without disruption. Jeff shows how the upfront design compared to the final design and shares experience with the building blocks that the team discovered along the way.