-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TCP Flags should be directional #1033
Comments
The object |
Hmm, looking at it more it looks like there are inconsistencies between the Network Traffic and Network Connection Information. I see that Network Traffic accounts for bidirectional flow of traffic via fields like How do we model bidirectional flow of traffic if we are to use the Network Connection Info? Adding a |
We discussed in the Network meeting today. Perhaps you can supply us with an example of a log you have in mind? The current objects used with |
Unfortunately our data is internal, but is similar to an IPFIX biflow using Direction by Perimeter: https://datatracker.ietf.org/doc/html/rfc5103. IPFIX biflows provide directional containers (fwd/rev) within the flow to hold the various packet metadata. In this case, we have the |
You might be able to dummy out anything considered sensitive but we have been discussing this on the Network weekly call and without an example (I looked online) that counters it, it should be mapped like VPC Flow Logs which so far have used the Network Activity class. The direction is indicated within |
The issue is that VPC Flow Logs are (roughly) unidirectional flow, not biflow. I'll see if we can sanitize our data and provide an example. |
Here is a heavily redacted example of our data represented in JSON. We are collecting "biflows" from AWS EC2 instances, or roughly 1 minute aggregations of data keyed by the 5-tuple. You can see in the {
"metadata": {
"account_id": "012345678901",
"instance_id": "i-0aabbccddeeff001122",
"region": "us-east-1",
"start_time": 1717182549,
"end_time": 1717182580
},
"flow": {
"local_ip": 167810349,
"local_port": 32846,
"remote_ip": 174465028,
"remote_port": 443,
"protocol": 6,
"bytes_in": 520,
"packets_in": 10,
"tcp_flags_in": 0,
"bytes_out": 2715,
"packets_out": 3,
"tcp_flags_out": 0
}
} |
@pagbabian-splunk Were there any further discussions on the TCP flags? @mlartz provided a sample record above |
I was looking at the data dictionary on https://schema.ocsf.io/1.1.0/dictionary?extensions= and noticed that the tcp_flags are set on the Network Connection Information object with no directionality specified.
My understanding is TCP flags are directional and should exist on the Network Traffic object since it is directional in nature.
See https://www.site24x7.com/learn/linux/tcp-flags.html for an example that TCP flags are set in each packet. In systems that log network traffic, TCP flags that are received by the system and sent by the system will be different.
The text was updated successfully, but these errors were encountered: