Understanding Flow Analytics

Learn about Oracle Communications Unified Assurance Flow Analytics. This section is intended for trained Unified Assurance administrators and consultants to plan, run, and support a Flow Analytics deployment.

About Flow Analytics

Unified Assurance Flow Analytics is a complete solution to collect and analyze network data, and provide real-time visibility into what is consuming network bandwidth.

Flow Analytics lets you:

Flow Analytics Architecture

Flow Analytics, like all Unified Assurance solutions, includes components in three architectural layers: collection, database, and presentation. The majority of Flow Analytics resides in the collection layer on a dedicated server. If your environment includes multiple data centers or multiple managed customers exporting flows, Oracle recommends installing separate collection servers in each data center to get as close to the exporting devices as possible and prevent raw flow data from consuming bandwidth traversing WAN links.

The architectural layers provide the Flow Analytics end-to-end functionality as follows:

  1. Collection layer: Devices send flow data to the collection servers for processing. See Flow Collector in Unified Assurance Implementation Guide for more information about the microservice that collects flow data.

  2. Database layer: Flows are stored in the Historical database. For information about scalability and redundancy, as well as an architecture diagram that includes all Analytics components, see Historical Database Scalability and Redundancy

  3. Presentation layer: Users interact with flow diagrams in OpenSearch Dashboards inside the Unified Assurance UI. You can see the default dashboards from the navigation menu by selecting Analytics, then Flow, and then Dashboard. The overview dashboard has several tabs allowing you to drill into different visualizations of flow data.

Flow Analytics Architecture Diagram

Description of illustration flow-analytics-architecture-diagram.png

Installing and Configuring Flow Analytics

Installing Flow Analytics involves the following steps:

  1. As part of installing Unified Assurance, run AnalyticsWizard. See Overview in Unified Assurance Installation Guide for information about the different Unified Assurance installation configurations.

  2. Set up a microservice cluster. See Microservice Cluster Setup in Unified Assurance Implementation Guide.

  3. Optionally, enable flow data enrichment. See Enriching Flow Data.

  4. Deploy the Flow Collector microservice. See Flow Collector in Unified Assurance Implementation Guide.

  5. Set up anomaly detection. See Anomaly Detection for Flow Analytics.

Enriching Flow Data

Flow records can be enriched with additional data beyond what is sent by the devices that export flows. By default, enrichment is not enabled.

To enable enrichment, add the following files to the cluster node running the Flow Collector microservice:

To enable DNS resolution, set the value of the FLOW_PROCESSOR_ENRICH_IPADDR_DNS_ENABLE configuration parameter to true in the Flow Collector microservice's helm chart. You can use either the Helmcharts microservices user interface or the a1helm install command with the --set configData flag.

See Flow Collector in Unified Assurance Implementation Guide for more information about Flow Collector configuration parameters.

Anomaly Detection for Flow Analytics

Flow Analytics anomaly detection automatically identifies a variety of performance, availability, and security conditions.

Setting Up Flow Anomaly Detection for Flow Analytics

An OpenSearch alerting monitor catches identified anomalies and sends them to the Unified Assurance WebHook Aggregator service to insert events into the Event database. Multiple anomalies are sent in batches at the same time and separated into unique events in the aggregator rules.

To set up anomaly detection for Flow Analytics:

  1. Copy the latest version of the webhook's include rules for OpenSearch from the RO_LOCKED branch to your default branch. To find the rules:

    1. From the Configuration menu, select Rules. See Rules for information about this UI.

    2. Expand the following folders:

      Core Rules (core)/Default read-only branch (RO_LOCKED)/collection/event/webhook/vendor

    3. Open the opensearch.include.rules file.

    4. Copy the file content.

    5. Expand the same path in the default read-write branch:

      Core Rules (core)/Default read-write branch (default)/collection/event/webhook/vendor

    6. Open or create the opensearch.include.rules file.

    7. Paste the copied content from the read-only branch.

    8. Click Submit.

  2. Start the anomaly detectors applicable to your environment and use cases. When you start anomaly detectors, they begin training the machine learning model on your indexes. You can run them on a range of historical data to train the model initially, and then set them to run continuously.

    To run anomaly detectors on historical data:

    1. From the main navigation menu, select Analytics, then Events, then Home.

    2. From the OpenSearch menu, under OpenSearch Plugins, select Anomaly Detection.

    3. From the list on the left, select Detectors.

    4. Click a detector.

    5. Select the Historical analysis tab.

    6. Click Run historical analysis.

    7. Select a time range. Oracle recommends a range of at least two months.

    8. Click Run historical analysis.

    After the model has trained on the historical data, you can start the detectors to run on live data by clicking Start detector on the Real-time results tab.

Anomaly Detectors for Flow Analytics

Flow Analytics includes anomaly detectors for the following areas:

To see the anomaly detectors and dashboards:

  1. From the main navigation menu, select Analytics, then Flow, then Dashboards.

  2. From the OpenSearch menu, under OpenSearch Plugins, select Anomaly Detection.

  3. Do one of the following:

    • To see the anomaly dashboards, select Dashboard.

      See Step 5: Observing the results in the OpenSearch anomaly detection documentation for information about interacting with anomaly dashboards.

    • To see the list of anomaly detectors, select Detectors.

      You can filter the list by entering flow in the Search bar.

Network Availability Anomaly Detectors

Flow Analytics includes the following anomaly detectors for network availability:

These anomaly detectors are prefixed with flow_codex_avail.

Network Performance Anomaly Detectors

Flow Analytics includes the following anomaly detectors for network performance:

These anomaly detectors are prefixed with flow_codex_perf.

Network Security Anomaly Detectors

Flow Analytics includes the following types of anomaly detectors for network performance:

Network Security Access Anomalies

Brute force access attempt anomalies indicate potential brute force login attacks.

Flow Analytics detects fast and slow edge, inbound, outbound, and private brute force access attempts for:

These anomaly detectors are prefixed with flow_codex_netsec_bruteforce.

Network Security Activity Anomalies

Flow Analytics detects rarely occurring network traffic, which can indicate malicious activity, such as malware exfiltration or communication with a command and control server. Although it does not always indicate malicious activity, these anomalies warrant further investigation.

The following network security activity anomalies are detected:

These anomaly detectors are prefixed with flow_codex_netsec_rare.

Network Security Amplification Attack Anomalies

Flow Analytics detects reflection-based volumetric distributed denial-of-service (DDoS) attacks.

In this type of attack, an attacker sends requests to open services that act as reflectors, with the target IP address forged as the source. The reflector services send large responses to the target, resulting in amplified traffic to target servers or networks. The volume of data and traffic overwhelms the target, making the server and surrounding infrastructure unavailable.

Inbound and edge UDP amplification attacks are detected. These anomaly detectors are prefixed with flow_codex_netsec_ddos_udp_amplify.

Network Security Flood Attack Anomalies

Flow Analytics detects distributed and direct DOS flood attacks. In this type of attack, an attacker sends high volumes of requests directly to target servers. The volume of traffic overwhelms the target, making the server and surrounding infrastructure unavailable to legitimate traffic.

The following flood attacks are detected:

Network Security Reconnaissance Anomalies

Flow Analytics detects reconnaissance anomalies, which can indicate an attacker gathering network information to prepare for subsequent attacks. Detecting this kind of attack can give you an early warning of potential threats before a full attack occurs.

The following reconnaissance anomalies are detected: