Until the perfect network monitoring tool comes along, knowledge of your network is your best defense One of the best moves you can make to detect security threats is to monitor unusual network traffic connections.Not every server needs to connect to every other server or even every workstation. Most workstations don’t connect to other workstations — or to every server. In a perfect world, every server and workstation would be able to connect to the computers they’re supposed to connect to, period. Anything else would be flagged as abnormal.Those who launch APTs (advanced persistent threats) and other malicious hacks usually don’t know what these normal network flows are. They connect from the first compromised workstation or server to the next jumping-off point, regardless of normal or authorized traffic flows. Want to “detect the undetectable”? Then detect new, unauthorized traffic flows.Unfortunately, this is a difficult task. Most companies lack a good understanding — any understanding at all, for that matter — of what should be connected to what. If you don’t understand what should be allowed, it’s hard to detect what’s abnormal. At the very least, you should create a diagram or spreadsheet documenting what should be allowed — and include examples of connections that shouldn’t happen. The other problem is that perfect monitoring tool for network traffic flows — to my knowledge — doesn’t exist. My perfect tool would:Monitor and document existing network traffic flows between all endpointsPut them in an understandable screen of information for reviewLet network admins define which network traffic flows are or aren’t legitimate (this step would take a lot of research in most organizations)Let admins define alerts for unauthorized or new informationAssign criticality to different network domains or connection typesMonitoring IP-address-to-IP-address traffic would be enough for me, but bonus points if the tool monitored port-level information (TCP port 80, UDP 53, and so on). Early on I used simple network traffic monitor/packet analyzers like Wireshark to map network traffic. These network monitoring tools often have traffic flow maps that show what’s connecting to what. But you’d have to run sensors on every endpoint and then bring the data together for analysis. It would be “analysis paralysis” for most organizations; plus, creating alerts would be problematic.InfoWorld recently published an awesome overview of open source network tools: Nagios, Icinga, NeDi, and Observium. Each tool is part of the solution, but not enough. Some fail due to missing features. Some have tracking and monitoring, but lack alerting. Some have alerting, but they’re not good at discovery. Others aren’t enterprise-ready.Lately, I’ve seen customers employ an interesting commercial tool: Tufin’s SecureTrack. It’s almost perfect. It’s designed to track, manage, and optimize traffic rules (on firewalls, routers, load balancers, and so on). It reads the devices, collects the rules, analyzes, and suggests optimizations. It has an awesome graphical view of which networks (and other logically defined connection boundaries) can and can’t communicate with each other. On one screen you can easily see what boundaries can talk to what. It’s easy to see the intersections and pick out the networks and boundaries that really have no reason to talk to each other. It will even send prioritized alerts when a rule set breaks a connection pathway policy.Only one feature is missing from Tufin SecureTrack: It doesn’t monitor individual endpoints. If I could merge it with a protocol analyzer or endpoint collector, it would be perfect.What are your favorite network monitoring tools? Have you encountered anything that meets all my criteria? If so, let us all know about it in the comments. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe