TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Stenographer – A full-packet-capture utility

61 pointsby dionyzizabout 10 years ago

5 comments

dryicerxabout 10 years ago
A bit surprised to see no support for DPDK. While using AF_PACKET makes the project a bit more portable, you'll be able to save a lot of cycles by using skipping the kernel all together.
评论 #9096242 未加载
评论 #9097769 未加载
micheloosterhofabout 10 years ago
Interesting!<p>An open source high performance rolling packet dump with packet index for incident response.<p>To be honest, I had imagined Google already had solutions like this internally :)<p>These have been commercially available for a few years, look at RSA Security Analytics (formerly NetWitness), or BlueCoat Security Analytics (formerly Solera). Or the (open source) Bro Time Machine. I used to work with one of these products in the past.<p>What make systems like this a lot more powerful is more and easier search and retrieval. While indexing IP numbers and port numbers is good, it will get much more useful if you can connect it to something like &#x27;bro&#x27; and get session level data and then index filenames, user-agents, file hashes, and others pieces of information. I&#x27;m sure you can see the use cases.<p>Having an easy way to query &#x27;all traffic with this particular user agent&#x27;, together with the full packet capture, which allows you to write new rules, can significantly increase the efficiency of a security team.<p>Apart from the streaming analytics, once the PCAP data is stored, you can use mapreduce type operations on them to search through yesterday&#x27;s data with today&#x27;s IDS signatures (look at PacketPig&#x2F;what Packetloop does). Maybe a lambda architecture is the way to go, or just reprocess old data through the same stream processing.<p>Cool work though! I&#x27;m curious where this will go next.
mlacitationabout 10 years ago
The design document is a good read and includes high-level details of how they&#x27;re grabbing packets (AF_PACKET), the packet index format (leveldb), and defensive action they took (fuzz testing via AFL, setcap, setcomp):<p><a href="https://github.com/google/stenographer/blob/master/DESIGN.md" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;google&#x2F;stenographer&#x2F;blob&#x2F;master&#x2F;DESIGN.md</a>
评论 #9095312 未加载
评论 #9095612 未加载
e28etaabout 10 years ago
They probably don&#x27;t want to give away too much (like security details of their network), but I think it&#x27;d be more compelling with some examples of how to use this for Intrusion Detection.<p>It&#x27;s a topic I don&#x27;t know much about, and I think it&#x27;d reinforce the claim this isn&#x27;t for user monitoring.
评论 #9095184 未加载
warmwafflesabout 10 years ago
What does this offer that tcpdump doesn&#x27;t?
评论 #9095145 未加载