-
Notifications
You must be signed in to change notification settings - Fork 8
Proxy Storyboard
###Walk-through
- Select the option Proxy > Storyboard from Open Network Insight Menu.

- Your view should look something like this, depending on how many threats you have analyzed and commented on the Threat Analysis for that day. You can select a different date from the calendar.

Executive Threat Briefing
Data source file: threats.csv
Executive Threat Briefing frame lists all the incident titles you entered at the Threat Investigation notebook. You can click on any title and view the additional comments at the bottom area of the panel.

Incident progression
Data source file: incident-progression-{id}.json
Incident progression frame is located on the right side of the Web page.
Incident Progression displays a tree graph (dendrogram) detailing the type of connections that conform the activity related to the threat. It presents the following fields:
- Referer – URLs that refers to the Suspicious Proxy Record
- IP – All ip addresses connecting to the Suspicious Proxy Record
- Method – Proxy methods used to communicate in between the IP addresses and the Proxy Record
- ContentType – HTTP MIME Types
- Threat – Represents the Suspicious Proxy Record
- Referred – URLs that the Suspicious Proxy Record referred to

If multiple IP Addresses connects to a particular Proxy Threat (URL) you can scroll down/up, arrows indicate that there are more elements in the list.

Timeline
Data source file: timeline-{id}.tsv
Timeline is created using the connections found during the Threat Investigation process. It will display 'clusters' of IP connections to the Proxy Record (URL), grouped by time; showing an overall idea of the times during the day with the most activity. You can zoom in or out into the graphs timeline using your mouse scroll. The number next to the IP Address represents the quantity of connections made from that particular IP to the Proxy Record in the displayed time.

Input files
threats.csv
incident-progression-{id}.json
timeline-{id}.tsv
- Home
- [Overview of Open Network Insight](Overview of Open Network Insight)
- [Technical Overview](Technical Overview)
- [Planning Guide](Planning Guide)
- [Deployment Option 1: Pure Hadoop](Pure Hadoop)
- [Deployment Option 2: Hybrid Hadoop / Virtual](Hybrid Hadoop)
- [Deployment Guide](Deployment Guide)
- [Installation & Configuration Guides](Installation & Configuration Guides)
- Initial Configuration
- [Configure User Accounts](Configure User Accounts)
- [Edit Solution Configuration](Edit Solution Configuration).
- [Setup HDFS](Setup HDFS)
- Ingest Component
- Machine Learning
- [Install Prerequisites](Install ML Prerequisites).
- [Installation & Configuration Guide](Install and Configure ML)
- [Running ML](Running ML)
- Operational Analytics & User Interface
- Initial Configuration
- [User Guide](User Guide)
- Flows
- [Suspicious Connects – Analyst View](Suspicious Connects)
- [Threat Investigation – Analyst View](Threat Investigation)
- Storyboard
- [Ingest Summary – Analyst View](Ingest Summary)
- DNS
- [Suspicious DNS – Analyst View](Suspicious DNS)
- [Threat Investigation – Analyst View](DNS Threat Investigation)
- [Storyboard](DNS Storyboard)
- Proxy
- [Suspicious Proxy - Analyst View](Suspicious Proxy)
- [Threat Investigation - Analyst View](Proxy Threat Investigation)
- [Storyboard](Proxy Storyboard)
- Flows
- ONI Demo