Argus-188.8.131.52 is now available for testing from the developers site. Because of a fatal bug report, we are hoping to release argus-184.108.40.206 as the current stable version of Argus, ASAP!!! This is a major bug fix release of argus, a companion argus-clients-220.127.116.11 will be available for testing in a week or so. Please consider grabing this version to test, and THANKS for all the support.
Release candidate available for testing
This release candidate version of argus has been tested out quite a bit, and has been in production in a few sites for weeks. The principle changes are a fix for a fatal bug that was reported by one of the national labs, better Debian package support, fixes for idle timers, polling interface changes, and VmWare packet capture processing (enhance GRE tunnel support).
Currently, the set of stable source code can be grabbed from these links:
Argus FloCon 2014 presentations are now available from FloCon Proceedings. Be sure and checkout the Argus PCR presentation, as we show the new Producer / Consumer Ratio metric and how it can be used to detect exfiltration, even DNS convert channel based exfiltration.
Argus-3.0.8 is now being used in production to drive some really great network visualizations for GLORIAD, the advanced science interent network that connects US, Russia, China, Korea, Canada, The Netherlands, India, Egypt, Singapore and Nordic scientists with Advanced Cyberinfrastructure. Checkout the various visualizations, including GLORIAD Earth.
Welcome to Argus, the network Audit Record Generation and Utilization System. The Argus Project is focused on developing all aspects of large scale network activity audit. Argus, itself, is next-generation network flow technology, going from packets on the wire to advanced network flow data, to network forensics data; all in support of Network Operations, Performance and Security Management. If you need to know what is going on in your network, right now or historically, you will find Argus a useful tool.
Argus is composed of an advanced comprehensive network flow data generator, the Argus sensor, which processes packets (either capture files or live packet data) and generates detailed network flow status reports of all the flows in the packet stream. Argus captures much of the packet dynamics and semantics of each flow, with a great deal of data reduction, so you can store, process, inspect and analyze large amounts of network data efficiently. Argus provides reachability, availability, connectivity, duration, rate, load, good-put, loss, jitter, retransmission, and delay metrics for all network flows, and captures most attributes that are available from the packet contents, such as L2 addresses, tunnel identifiers (MPLS, GRE, ESP, etc...), protocol ids, SAP's, hop-count, options, L4 transport identification (RTP, RTCP detection), host flow control indications, etc...
Argus is used by many sites to generate network activity reports for every network transaction on their networks. The network audit data that Argus generates is great for security, operations and performance management. The data is used for network forensics, non-repudiation, network asset and service inventory, behavioral baselining of server and client relationships, detecting covert channels, and analyzing Zero day events.
Argus is an Open Source project, currently running on Mac OS X, Linux, Solaris, FreeBSD, OpenBSD, NetBSD, AIX, HP-UX, VxWorks, IRIX, Windows (under Cygwin) and OpenWrt, has been ported to many hardware accelerated platforms, such as Bivio, Pluribus, Arista, and Tilera, and embedded in network adapters. The software should be portable to many other environments with little or no modifications. Performance is such that auditing an entire enterprise's Internet activity can be accomplished using modest computing resources.
Page Last Modified: 11:53:27 EDT 27 Apr 2015 © Copyright 2000 - 2015 QoSient, LLC. All Rights Reserved.