2.1. GCap
2.1.1. GCap functions
The functions of the GCap include:
Connecting to the TAP and retrieving duplicate packets from the network flow seen by the TAP
Rebuilding the files from the corresponding packets using a detection engine, also referred to as Sigflow
Intrusion detection (vulnerabilities...) is performed by several detection engines:
The first is the Sigflow engine. It is located in the GCap
- The others are located in GCenter.It recovers the network flow sent by the GCap to perform this analysis:
Shellcode et Malicious Powershell Detect
Malcore and Retroanalyzer
Beacon Detect
Dga Detect
Ransomware Detect
Retrohunt (optional)
Active CTI (optional)
The transmission of files, codes and events to GCenter
Communication between GCap and GCenter including receiving configuration files, rulesets, and the like
2.1.2. The Sigflow engine
Sigflow performs:
The recovery of network flows entering the Gcap via the
`monx`capture interfacesIntrusion detection, statistical analysis of network flows to reduce the number of false positives and identify possible protocol malformations, SQL injection attempts, and so on.
The creation of alerts or log files
2.1.2.1. Filtering of the captured flow
Note
`GCaps profiles` menu of GCenter.2.1.3. Counters of GCap activity
In order to view this information, the show eve-stats command enables the following counters to be viewed:
counter
`Alerts`- Number of Sigflow alerts foundcounters
`Files`- Files extracted by SigflowCounters
`Codebreaker samples`- Files analyzed by CodebreakerCounters
`Protocols`- List of protocols seen by SigflowCounters
`Detection Engine Stats`- Sigflow statistics (monitoring-engine)
For more information, please refer to the table Monitoring the GCAP.