Docs
test1test2
6.5
6.5
  • ElastiFlow Documentation
  • Unified Flow Collector
    • General Configuration
    • Changelog
    • Maxmind GeoIP2 and GeoLite2
    • RiskIQ PassiveTotal
    • Network Interfaces
    • User-Defined Metadata
    • Docker
    • Linux
    • Unified Flow Collector Introduction
    • System Requirements
    • Supported IEs
    • AWS VPC Flow Log IEs
    • IPFIX IEs
    • Netflow IEs
    • sFlow IEs
  • Unified SNMP Collector
    • Device Groups
    • Changelog
    • Devices
    • Downloading Definitions
    • Enumerations
    • Objects
    • Object Groups
    • User-Defined Metadata
    • Docker
    • Network Interfaces
    • United SNMP Collector Introduction
    • Linux
    • Scheduling Rediscovery
  • Monitoring ElastiFlow
    • Liveness & Readiness
    • Metrics
    • Prometheus & Grafana
  • Configuration Reference
    • YAML Configuration Files
    • Configuration Reference Overview
    • Common
      • API
      • Licensing
      • Overview
      • Logging
      • HTTP output
      • Elasticsearch output
      • Kafka output
      • Monitor output
      • OpenSearch output
      • Splunk output
      • stdout output
      • Processor
    • Unified Flow Collector
      • Overview
      • Community/Conversation IDs
      • EF_PROCESSOR_ENRICH_TOTALS_IF_NO_DELTAS
      • Overview
      • RiskIQ PassiveTotal
      • Maxmind
      • User-Defined Metadata
      • Overview
      • Overview
      • User-Defined Metadata
      • Overview
      • Benchmark Input
      • Netflow/IPFIX/sFlow (UDP)
      • Licensing
      • Decoder/Processor
      • Sample Rate
      • Configuration Changes
    • Unified SNMP Collector
      • User-Defined Metadata
      • Overview
      • Licensing
      • SNMP Poller
      • EF_PROCESSOR_SNMP_ENUM_DEFINITIONS_DIRECTORY_PATH
  • API Reference
    • API Reference Overview
    • SNMP Operations
  • Data Platforms
    • Elastic
      • Basic Cluster
      • Advanced Cluster
      • Single Server
      • Multi-Tier Cluster
      • Single "Lab" Server
      • Elasticsearch
      • ElastiFlow vs. Filebeat and Logstash
      • RHEL/CentOS
      • Ubuntu/Debian
      • Kibana
      • ML
        • Network Security
        • Machine Learning
        • Availability
          • Network Availability
          • DHCP
          • LDAP
          • DNS
          • NTP
          • RADIUS
          • TCP Sessions
        • Network Security Activity
          • Rare Autonomous System
          • Network Activity
          • Rare Conversation
          • Rare Geolocation
        • Network Security Brute Force
          • Brute Force CLI Access
          • Brute Force Remote Desktop Access
          • Brute Force Attacks
        • Network Security DDoS
          • Denial-of-Service
          • ICMP Flood Attack
          • SYN Flood Attack
          • TCP DDoS Attack
          • UDP Amplification Attack
        • Network Security Recon
          • ICMP Scan
          • Reconnaissance
          • Port Scan
        • Performance
          • Unusual ASN Traffic Volume
          • Unusual Network Interface Traffic Volume
          • Network Performance
    • Opensearch
      • Dashboards
      • Auth Sig V4
    • Splunk
      • Default Search Macro
      • Configuring Data Input & Index
      • Splunk App Installation
    • Output Configuration
  • Additional Guides
    • Catalyst (sFlow)
    • FortiGate
    • hsflowd
    • Configuring Flow Sampling on Juniper Routers
    • Junos OS (sFlow)
    • MikroTik RouterOS
    • OpenWRT (softflowd)
    • Ubiquiti EdgeRouter
    • SonicWall
    • Junos OS
    • Extending SNMP Device Support
    • Flow Device Support Overview
    • SNMP Device Support Overview
    • Generating A Support Bundle
  • FAQ
    • Flows stopped showing up in Kibana (Disk(s) Full)
    • Common reasons why you have discrepancies between ElastiFlow data & reality
    • What Are Snapshots?
    • Importing the wrong dashboards (No data)
  • Knowledge Base
    • Config
      • Elasticsearch Authentication Failure
      • CA Certificate Path Incorrect
      • license/error Invalid Segments
    • Flow
      • Bidirectional Flow Support
      • Configure the UDP Input
      • Flow Records Not Received
      • Netflow v9/IPFIX Template Not Receieved
      • Unsupported sFlow Structures
    • General
      • License Has Expired
      • License Agreement Not Accepted
    • Install
      • .deb Upgrade Fails File Overwrite
    • Operation
      • Flow Collector Queues 90% Full
      • Dashboard Updates
      • Change elastiflow-* Index Name?
  • Elastic Stack Deployment
  • Download Links
Powered by GitBook
On this page
  • Attributes
  • Downloads
  1. Data Platforms
  2. Elastic
  3. ML
  4. Performance

Unusual ASN Traffic Volume

Detecting an unusual volume of traffic to or from an Autonomous System (AS) is crucial for maintaining the integrity and performance of network infrastructures. An Autonomous System is a collection of IP routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the internet. Unusual traffic patterns involving an AS can be indicative of several issues, such as targeted cyber attacks, network hijacking, or unintentional misconfigurations leading to traffic floods or leaks. Identifying these anomalies promptly is essential for preventing potential network disruptions, mitigating security risks, and ensuring efficient network operation. Early detection allows network operators to take swift corrective actions to address the underlying causes and maintain the stability of their networks.

ElastiFlow provides a collection of anomaly detection jobs designed to identify unusual volumes of traffic to or from an Autonomous System comprises various tools and techniques focused on monitoring and analyzing network traffic patterns.

Attributes

Attribute
Information

Analysis

temporal

Downloads

Schema
Endpoint
Metric
Link

CODEX

source

bytes

CODEX

source

packets

CODEX

source

flows

CODEX

destination

bytes

CODEX

destination

packets

CODEX

destination

flows

ECS

source

bytes

ECS

source

packets

ECS

source

flows

ECS

destination

bytes

ECS

destination

packets

ECS

destination

flows

By implementing this suite of anomaly detection jobs, network administrators and security professionals can quickly identify unusual traffic patterns involving an Autonomous System. Early identification of these anomalies is key to taking timely actions to investigate and resolve potential issues, whether they are security-related, operational, or configuration-based. This proactive approach is vital for ensuring the ongoing security, performance, and reliability of network operations in the complex and dynamic environment of internet routing and traffic management.

PreviousPerformanceNextUnusual Network Interface Traffic Volume

elastiflow_codex_perf_asn_src_thruput_bytes
elastiflow_codex_perf_asn_src_thruput_packets
elastiflow_codex_perf_asn_src_thruput_flows
elastiflow_codex_perf_asn_dst_thruput_bytes
elastiflow_codex_perf_asn_dst_thruput_packets
elastiflow_codex_perf_asn_dst_thruput_flows
elastiflow_ecs_perf_asn_src_thruput_bytes
elastiflow_ecs_perf_asn_src_thruput_packets
elastiflow_ecs_perf_asn_src_thruput_flows
elastiflow_ecs_perf_asn_dst_thruput_bytes
elastiflow_ecs_perf_asn_dst_thruput_packets
elastiflow_ecs_perf_asn_dst_thruput_flows