Network Analytics
Analyze NetFlow, DNS query, and connection event streams from Kafka continuously using SQL. RisingWave surfaces traffic anomalies, command-and-control indicators, and data exfiltration signals within milliseconds, without batch network monitoring delays.
Why Streaming Analysis
Traditional network monitoring tools aggregate NetFlow data in 5 to 10 minute bins before running anomaly detection queries. In that window, a malware beacon can complete its first command-and-control checkin, a data exfiltration can transfer gigabytes, or a scanning attack can map an entire subnet. Streaming traffic analysis evaluates anomaly rules against every flow record as it arrives, detecting deviations within milliseconds of the first anomalous packet.
| Factor | Traditional Tools | RisingWave |
|---|---|---|
| Detection Latency | 5 to 10 minutes (flow aggregation) | Milliseconds (per-flow streaming) |
| Baseline Updates | Hourly or nightly batch | Per-event incremental update |
| Coverage | High-volume flows only (sampling) | All flows with configurable sampling |
| Rule Language | Proprietary threshold configuration | Standard SQL |
Detection Patterns
Network anomalies range from subtle beaconing patterns to high-volume exfiltration events. SQL window aggregations over flow and DNS streams can detect each category because they evaluate network state continuously rather than on scheduled queries, maintaining the per-host and per-connection context required to distinguish anomalies from normal traffic variation.
Detect malware C2 communication by analyzing the periodicity and regularity of outbound connections per internal host using SQL window aggregations over NetFlow streams. Regular connection intervals at unusual hours to low-reputation external IPs surface as beaconing candidates within the first beacon cycle
Identify DNS tunneling by aggregating query volumes per internal resolver, query length distributions, and unique subdomain counts per queried domain from DNS log streams. Tunneling traffic produces query patterns that SQL aggregations distinguish from legitimate DNS resolution within seconds of the first tunnel session
Detect scanning and lateral movement within the internal network by counting unique destination IPs contacted per source host per time window from internal NetFlow streams, flagging hosts that contact significantly more internal endpoints than their rolling baseline
Surface large outbound data transfers by aggregating bytes per source host and destination subnet from NetFlow streams, comparing current transfer rates against per-host baselines and flagging sessions that exceed expected thresholds for the time of day and destination category
How It Works
RisingWave ingests NetFlow and DNS event streams from Kafka and maintains per-host and per-connection behavioral baseline materialized views that update incrementally with each flow record. Anomaly detection rules compare current traffic window aggregations against baseline views in SQL. When a deviation crosses a configured threshold, the anomaly surfaces in the detection output view with enriched context for analyst review.
Analyze NetFlow and DNS streams in SQL and detect beaconing, lateral movement, and exfiltration signals within milliseconds of the first anomalous packet.
Start Free