Skip to main content

Explore Flows

Explore Flows is a powerful, fast, and general-purpose search tool designed for in-depth inspection and analysis of network traffic flows. This comprehensive feature enables users to scrutinize individual network flows, examine packet-level and netflow data, and identify potential security threats or performance issues.

How to Search for Flows

Search Criteria in Trisul allows you to specify filters and conditions to narrow down network traffic data and focus on specific aspects of interest.

To specify a search criteria to explore flows,

navigation

👉 Go to Tools→ Explore Flows

You have two ways to enter the search criteria

  1. Quick search a search expression directly like destip=twitter.com,port=ssh
  2. Advanced search use a form to enter individual fields

Quick Search: Enter Search Terms Directly

Quick Search allows for quick filtering of network traffic data that includes only two essential fields. Suitable for straightforward searches.


Figure: Quick Search

With quick search you can explore flows simply in two steps.
Step 1: Select a time frame from the Time Selector to narrow down the flow data to the relevant time interval.
Step 2: Just enter Search query in the form of search expression like field=value,field=value,... The supported fields include srcip,destip,ip,net16,net24. The complete list of supported fields can be obtained by clicking on the question mark icon against the Search query field.

Some common examples of search expressions are :

FieldDescription
srcip=208.219.88.129,destip=119.10.181.22All flows between two ips
ip=208.219.88.129Match both source and destination ip
port=5700Port 5700
proto=gre,ip=208.219.88.129GRE protocol and IP
tag=UAFlow tag has UA (Ukraine) if you’ve set up Flow Taggers
net24=208.219.88All flows in the /24 subnet
net16=208.219,port=smtpAll smtp flows in the /16 subnet
ippair=192.168.1.8,59.92.15.145 (pipe separated IPs)All flows between the two IP pairs
router=10.0.17.180All router flows
ifin=1872All the ingress flows in an Netflow Interface
ifout=1872All the egress flows in a Netflow Interface.Combine with router= or specify router along with the interface in interface key format such as ifout=10.0.17.180_1872 to see egress flows.
interface=1872All flows in an Interface

Advanced Search : Use a Form

Flip to the Advanced Search tab suitable for in-depth analysis. Offers a wide range of search criteria enabling complex searches with multiple conditions.

Fill in the following fields for a flexible search.

Figure: Advanced Search

FieldDescription
IP AddressEnter an IP or host name
PortEnter an application name or port number "Port-80 or http example"
IP PairEnter two IPs separated by a comma eg 192.168.1.2,209.216.249.58
ProtocolTCP UDP GRE IPSEC etc
Flow TagsEnter the tag name

Click on the advanced search options in the advanced search to get more search criteria including the following fields.


Figure: Advanced Search Options

FieldDescription
Source IP AddressEnter the source IP eg 192.168.1.2
Destination IP AddressEnter the Destination IP eg 209.216.249.58
RoutersSelect a router from the list of available routers
InterfaceSelect an interface from the list of availbale interfaces
Display Flow CountDisplays only specified number of flows eg 500
Source PortEnter the value of the source port
Destination PortEnter the value of Destination port
Cull CountLeave out the top ‘n’ flows from analysis
Search Flow CountStops search if flows match this count eg 2000
Show Router InterfacesShows router interfaces for each flow

Explore Flows: Results Summary

The Search results for Flows are presented in terms of,

  1. Parallel Co-ords: An interactive visualization based on parallel co-ordinates
  2. Activity Details: A summary of hosts and application by upload/download, peers
  3. Top Conversations: A table showing top conversations
  4. Top 100 Matching Flows: A table of raw flows

Only the first matching Max Flows (default 10K) are retrieved. Please narrow down your query to within this limit. Also see the Export Flows and Aggregate Flows tools which work with larger matches and provide different functionality.

Using the Interactive Visualization

Trisul features a streaming flow visualization based on the popular parallel co-ordinates paradigm. Search results are automatically streamed into the viz.

Figure: Parallel Co-ords- Visualization of flow data

This is how you interpret the visualization

  1. Each vertical axis represents a tuple
  2. Within each vertical axis the height of each bar is proportional to a particular aggregate value
  3. By default, the height of each bar is proportional to the volume of data through that item
  4. Trisul uses an intelligent logic to display thousands of items on each vertical line
  5. The most important ones, picked out by an algorithm, get their own bar
  6. The other items considered less important are grouped together
  7. Each line represents a flow with some or all control points through groups
  8. Flows are colorized by groups in a control tuple

Available controls include,

FeatureLocationDescription
Toggle LabelsTop leftShow or hide labels
Labels to front/backTop leftPosition labels on the backside of the lines so you can view the flows better
Toggle StatsTop LeftShow or hide Statistics
Stats to front/backTop leftPosition Stats on the backside of the lines so you can view the flows better
Weight BytesTop LeftExpands the flow details
Weight FlowsTop LeftCollapses the flow details
OptionsTop LeftSelect the data items to display on the Parallel Co-ords
Lock/ReleaseBelow each vertical axisClick on release under a vertical axis to ignore the corresponding tuple
ColorizeBelow each vertical axisFlows are colorized by source ip. You can change it to get a dramatically different view by looking at different angles

Export as Report

You can click on the “Download” button to download the report into a PDF or XLSX to Excel spreadsheet. The downloaded report contains,

  • Parallel Co-ords
  • Top Peers
  • Top Apps
  • Internal Hosts
  • External Hosts
  • Flow Taggers
  • Routers
  • Interfaces In
  • Interfaces Out
  • Top Conversations
  • Top Matching Flows (100)

Activity Details

This section provides an overview of the network activity related to a searched IP address, including top communication partners, applications, internal and external hosts, flow tags, routers, and network interfaces used for incoming and outgoing traffic.

Figure: Different tabs of flow activity details

  1. Top peers: Peers (hosts) involved at either end of the flow. Shows the top IP addresses that have communicated with the searched IP address. This helps identify frequent communication partners.
  2. Top Applications: Displays the most commonly used applications or protocols (e.g., HTTP, FTP, SSH) associated with the searched IP address.
  3. Internal hosts: Lists internal IP addresses that have communicated with the searched IP address.
  4. External hosts: Shows external IP addresses that have communicated with the searched IP address.
  5. Flow taggers: Displays tags or labels assigned to flows related to the searched IP address, helping identify specific types of traffic. (see Flow Taggers )
  6. Routers: Shows the routers through which traffic to/from the searched IP address has passed.
  7. Interfaces In: Displays the network interfaces (e.g., Ethernet, Wi-Fi) used for incoming traffic related to the searched IP address.
  8. Interfaces Out: Displays the network interfaces (e.g., Ethernet, Wi-Fi) used for outgoing traffic related to the searched IP address.

Top Conversations

A conversation represents a set of related flows between two devices (example, a series of requests and responses). Top Conversations shows the most significant network conversations involving the searched IP address.

Figure: Top Conversations

This section displays the top conversations that involve the searched IP address, including:

  • Source IP
  • Destination IP
  • Application
  • NBAR/APPID if any
  • Volume

You can click on the Toggle button on the upper right hand side to show or hide labels in the search results table.

Top Matching Flows

A flow represents a single connection or session between two devices (example, a client-server interaction). Top Matching Flows contains a table of top raw flows (by volume) that matched your criteria.

Figure: Top 100 Matching Flows

This section shows the top flows that involve the searched IP address, including:

ColumnsDescription
ProtocolThe network protocol used for the flow (example, TCP, UDP, ICMP, etc.)
Source IPThe IP address of the device that initiated the connection
Source PortThe port number used by the source device to establish the connection
Destination IPThe IP address of the device that received the connection
Destination PortThe port number used by the destination device to receive the connection
RouterThe router or network device that forwarded the traffic
Interface InThe network interface on the router where the traffic entered
Interface OutThe network interface on the router where the traffic exited
VolumeThe total amount of data transferred in bytes (or bits) for the flow
Start TimeThe timestamp when the flow started
DurationThe length of time the flow was active
ProbeThe probe or sensor that collected the network traffic data
TagsCustom tags applied to the flow for filtering, categorization, or analysis (example, "malware", "file-transfer", etc.)

Flow Options

You can drill down further in the following manner by clicking on the Options button on the right hand side against each flow.

Figure: Options for each Top flow

FeatureDescription
Flow detailsMore details about the flow
URLs in flowURL resources for this flow (HTTP only)
Quick PCAP viewView first 50K bytes of PCAP in hex and text format
Download PCAPDownload all the flows shown as a single PCAP
In this conversationGet all flows between these two hosts
New search for Src IPGet all flows from and to the Source IP
New search for Dest IPGet all flows from and to the Dest IP
Add filter Src IPFilters flows only from source IP
Add filter Dest IPFilters flows only from destination Ip
Add filter Src PortFilters flows only from source port
Add filter Dest port(http,https)Filters flows only from destination port

Per Hop Flow Analysis

By instrumenting your traffic analysis layer to collect packets from various points in your network, you can debug connection problems.

The following diagram shows two Trisul-Probes collecting data from two locations in the network

  1. probe-FW : collects packets from the firewall
  2. probe-LB : collects from load balancer


Figure: Instrument from different spots

Now when you search for flows in Explore Flows, you will see the same from two vantage points. This helps you spot connection problems in the link between the two points. You can compare the TCP State, Round Trip Time, Number of packets, retransmissions as observed by the probes. The display is shown as below.


Figure: View flow hops, notice the table rows and the diagram

How to Enable

This feature is automatically enabled when the system detects identical flows from multiple probes.

Trisul scans the search results, reassembles the flows, and presents them in a Hop-by-hop format. You can visually analyze the flow details instantly.

This display is shown in the following cases

  1. the same flow identified by tuples is seen from more than one probe
  2. there are a maximum of 10 flows matching, for a maximum of 10 probes