Online / 6 & 7 February 2021

visit

Community ID Flow Hashing

Simple flow tuple correlation for Zeek, Suricata, and beyond


Network security practitioners frequently need to correlate logs and alerts produced by the systems installed in their networks. For example, a Suricata alert might require the context of Zeek's connection logs for the alert to become actionable. Normally the best way to make such correlations is by manually identifying the flow tuple involved, in each of the monitor outputs involved, around the timestamps in question -- a tedious and error-prone task.

To simplify this process we're standardizing a straightforward algorithm, dubbed "Community ID" (https://github.com/corelight/community-id-spec), that produces short textual hashes that reliably identify network flows directly at the source. Flow correlation then becomes a straightforward string comparison operation. Popular open-source network monitoring solutions now include support for this emerging standard, including Suricata, Wireshark, and Zeek, and there's a growing library of reusable implementations in various common programming languages.

In this talk we will motivate the Community ID standard, report on its current implementation status, and demonstrate it to the community.

Speakers

Photo of Christian Kreibich Christian Kreibich

Attachments

Links