Hamburger Icon
  • Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

Anomaly Detection in Network Traffic

In this lab, you’ll practice analyzing network traffic to identify suspicious activities and data theft. When you’re finished, you’ll have the skills to detect anomalies and document findings to support incident response and defense strategies.

Google Cloud Platform icon
Labs

Path Info

Rating
(18 reviews)
Level
Clock icon Beginner
Duration
Clock icon 40m
Published
Clock icon Jan 03, 2025

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Detecting Suspicious Login Activity

    Globomantics Intrusion Detection System (IDS) flagged unusually high-rate traffic to the HTTP File Server. You have to analyze the network traffic to identify patterns of suspicious login attempts, determine whether unauthorized access occurred, and review additional details, such as the brute force transfer rate, to understand the attack pattern better.

  3. Challenge

    Tracing Sensitive File Access and Data Exfiltration

    Globomantics HTTP File Server logs show requests for specific files containing sensitive information, such as FTP credentials. Your task is to analyze the network traffic, locate the request for the file, and extract its contents to confirm if sensitive data was accessed.

  4. Challenge

    Investigating Bypassed Restrictions and Unauthorized FTP Access

    Globomantics IDS detected anomalous ICMP and SSH activity, followed by FTP transfers. Your task is investigating the ICMP pings, analyzing SSH traffic, and identifying FTP data transfers that indicate successful unauthorized access. Using the FTP credentials discovered earlier, the attacker downloaded sensitive files, which you must uncover and analyze.

  5. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.

Sahil Gupta is highly skilled in Product Security, specializing in DevSecOps and Application Security. They are passionate about enhancing security posture & delivering robust and secure solutions.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.