Skip to main content
Version: 6.4

ASN Traffic Volume

Unusual ASN Traffic Volume

Detecting an unusual volume of traffic to or from an Autonomous System (AS) is crucial for maintaining the integrity and performance of network infrastructures. An Autonomous System is a collection of IP routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the internet. Unusual traffic patterns involving an AS can be indicative of several issues, such as targeted cyber attacks, network hijacking, or unintentional misconfigurations leading to traffic floods or leaks. Identifying these anomalies promptly is essential for preventing potential network disruptions, mitigating security risks, and ensuring efficient network operation. Early detection allows network operators to take swift corrective actions to address the underlying causes and maintain the stability of their networks.

ElastiFlow provides a collection of anomaly detection jobs designed to identify unusual volumes of traffic to or from an Autonomous System comprises various tools and techniques focused on monitoring and analyzing network traffic patterns.

Attributes

AttributeInformation
Analysistemporal

Downloads

SchemaEndpointMetricLink
CODEXsourcebyteselastiflow_codex_perf_asn_src_thruput_bytes
CODEXsourcepacketselastiflow_codex_perf_asn_src_thruput_packets
CODEXsourceflowselastiflow_codex_perf_asn_src_thruput_flows
CODEXdestinationbyteselastiflow_codex_perf_asn_dst_thruput_bytes
CODEXdestinationpacketselastiflow_codex_perf_asn_dst_thruput_packets
CODEXdestinationflowselastiflow_codex_perf_asn_dst_thruput_flows
ECSsourcebyteselastiflow_ecs_perf_asn_src_thruput_bytes
ECSsourcepacketselastiflow_ecs_perf_asn_src_thruput_packets
ECSsourceflowselastiflow_ecs_perf_asn_src_thruput_flows
ECSdestinationbyteselastiflow_ecs_perf_asn_dst_thruput_bytes
ECSdestinationpacketselastiflow_ecs_perf_asn_dst_thruput_packets
ECSdestinationflowselastiflow_ecs_perf_asn_dst_thruput_flows

By implementing this suite of anomaly detection jobs, network administrators and security professionals can quickly identify unusual traffic patterns involving an Autonomous System. Early identification of these anomalies is key to taking timely actions to investigate and resolve potential issues, whether they are security-related, operational, or configuration-based. This proactive approach is vital for ensuring the ongoing security, performance, and reliability of network operations in the complex and dynamic environment of internet routing and traffic management.