Discovering unusual traffic patterns
In this recipe, we will learn what are usual and unusual traffic patterns and how to distinguish between them.
The first thing is to locate Wireshark. There are several options for this (see the following diagram):
- When you suspect an attack that comes from the Internet, locate Wireshark after the firewall (1), and when you suspect that it crosses the firewall, locate it before (2).
- When you suspect malicious traffic coming from a remote office, port mirror the traffic coming on the central line before (3) or after (4) the router. In this case, you can filter the suspicious traffic with IP networks to see patterns from different offices in order to isolate the problematic office.
- You can also port ...