Flow Analytics

Learn about Unified Assurance Flow Analytics. This section is intended for trained Unified Assurance administrators and consultants to plan, run, and support a Flow Analytics deployment.

Introduction

Unified Assurance Flow Analytics is a complete solution to collect, analyze, and provide real-time visibility into whom and what are consuming network bandwidth.

Flow Analytics lets you:

Architecture

With all Unified Assurance solutions, the components are broken down into three layers: collection, database, and presentation. The majority of the solution resides in the collection layer on a dedicated server. If multiple data centers or multiple managed customers will be exporting flows, Oracle recommends installing separate collection servers in each data center to get as close to the exporting devices as possible. Raw flow data should not have to consume bandwidth traversing WAN links if possible.

The architecture layers provide the Flow Analytics end-to-end functionality as follows:

  1. Collection layer: Devices send flow data into the collection servers where they are processed. See Flow Collector in Unified Assurance Implementation Guide for more information.

  2. Database layer: Flows are stored in the Elasticsearch database.

  3. Presentation layer: Users interact with flow diagrams in the Kibana UI inside the Unified Assurance UI. You can see the default dashboards from the navigation menu by selecting Analytics, then Flow, then Dashboard. The overview dashboard has several tabs allowing you to drill into different visualizations of flow data.

Flow Analytics Architecture Diagram

Description of illustration flow-analytics-architecture-diagram.png

Enriching Flow Data

Flow records can be enriched with additional data not sent from the devices exporting flows. By default, enrichment is not enabled.

To enable enrichment, add the following files to the cluster node running the Flow Collector microservice:

To enable DNS resolution, set the value of the FLOW_PROCESSOR_ENRICH_IPADDR_DNS_ENABLE configuration parameter to true in the Flow Collector microservice's helm chart. You can use either the Helmcharts microservices user interface or the a1helm install command with the --set configData flag.

See Flow Collector in Unified Assurance Implementation Guide for more information about Flow Collector configuration parameters.

Machine Learning Overview

Flow Analytics Machine Learning provides anomaly detections to automatically identify a variety of performance, availability, and security conditions.

Machine learning policies must train a model on your current datafeed. Oracle recommends a minimum of two weeks to two months of data to provide the best detection accuracy.

After a model is trained and set to run continuously, an Elasticsearch Watcher Policy catches identified anomalies and sends them to a Unified Assurance Webhook Aggregator to generate events. Multiple anomalies are sent in batches at the same time and separated into unique events in the aggregator rules.

To enable the aggregator to generate events, you must copy the latest version of the webhook include rules for Elasticsearch from the RO_LOCKED branch to your default branch.

To find the rules:

  1. From the Configuration menu, select Rules.

  2. Expand the Core Rules (core), Default read-only branch (RO_LOCKED), collection, event, webhook, and vendor folders to find the elastic.include.rules file.

  3. Copy the file to the same path in the default read-write branch.

Machine Learning Policies

Flow Analytics includes machine learning policies with anomaly detections for the following areas:

Network Availability Anomaly Detections

Flow Analytics includes the following anomaly detections for network availability:

Network Performance Anomaly Detections

Flow Analytics includes the following anomaly detections for network performance:

Network Security Anomaly Detections

Flow Analytics includes the following types of anomaly detections for network performance:

Network Security Access Anomalies

A Brute Force Access Attempt (CLI) anomaly indicates a potential brute force login attack. This occurs when there are a high number of failed connection attempts to remote ports, such as SSH or telnet.

Network Security Activity Anomalies

Flow Analytics detects rarely occurring network traffic, which can indicate malicious activity, such as malware exfiltration or communication with a command and control server. Although it does not always indicate malicious activity, these anomalies warrant further investigation.

The following network security activity anomalies are detected:

Network Security Amplification Attack Anomalies

Flow Analytics detects reflection-based volumetric distributed denial-of-service (DDoS) attacks.

In this type of attack, an attacker sends requests to open services that act as reflectors, with the target IP address forged as the source. The reflector services send large responses to the target, resulting in amplified traffic to target servers or networks. The volume of data and traffic overwhelms the target, making the server and surrounding infrastructure unavailable.

The following amplification attacks are detected:

Network Security Flood Attack Anomalies

Flow Analytics detects distributed and direct DOS flood attacks. In this type of attack, an attacker sends high volumes of requests directly to target servers. The volume of traffic overwhelms the target, making the server and surrounding infrastructure unavailable to legitimate traffic.

The following flood attacks are detected:

Network Security Reconnaissance Anomalies

Flow Analytics detects reconnaissance anomalies, which can indicate an attacker gathering network information to prepare for subsequent attacks. Detecting this kind of attack can give you an early warning of potential threats before a full attack occurs.

The following reconnaissance anomalies are detected: