ntop / ntopng

Web-based Traffic and Security Network Traffic Monitoring
http://www.ntop.org
GNU General Public License v3.0
6.32k stars 658 forks source link

Suspicious DGA and file transfer - exclude domain and file names #5947

Closed martinscheu closed 2 years ago

martinscheu commented 3 years ago

Hello ntop Team! The two alerts suspicious DGA domain and file transfer are very noisy. To reduce false positives alerts, it would be helpfull to exclude domains in the DGA alert, including the possibility of wildcards * examples:

lucaderi commented 3 years ago

I have update nDPI to take into account most of the requests you have made. The only one that is not handled is *e5.sk at nDPI level. You can exclude hosts in ntopng from triggering alerts but this is not the same as the above request. What do you think?

martinscheu commented 3 years ago

issue is, that e5.sk is the antivirus, I would need to exclude all hosts, means the alert doesn't help me. and sub domain is not static. but half good solution would be to be able besides hosts IPs to exclude domains.

lazyandproud commented 3 years ago

If thats hardcoded, maybe it's a good idea to also add the Antimalware Updates an Exchange Server 2016 > CU4 pulls constantly. It's annoying ;)

As far as I found out so far it's amupdatedl.microsoft.com and amupdatedl[1-9].microsoft.com

image

ref from ms: https://social.technet.microsoft.com/Forums/office/en-US/c3d71596-8ea9-479d-8f09-4d07cbc6ff2b/antimalware-updates-fipfs-produce-huge-network-traffic-ex-2016-cu5-cu3?forum=Exch2016SD

lucaderi commented 2 years ago

Please see https://www.ntop.org/ndpi/howto-define-ndpi-risk-exceptions-for-networks-and-domains/

lucaderi commented 2 years ago

Fixed by https://github.com/ntop/nDPI/commit/6679453d8601b7116534558097aaffc2bda14963