ntop started as an opensource project in 1998 whose goal was to create a simple yet effective web-based traffic monitoring platform. Many things have changed since then, including the nature of the traffic being analyzed, operating systems being run, and the way users interact with technologies. During this time, ntop has evolved into a fully-fledged research company with many opensource projects whose main spirit is still the original one, namely, to innovate network monitoring using commodity hardware and freely available operating systems.
ntop features many opensource projects freely available on GitHub. This stand wants to showcase one of the most popular opensource software developed by ntop, namely, ntopng. ntopng is a web-based traffic monitoring software that combines and correlates raw traffic data with other information to effectively provide network intelligence an actionable insights.
ntopng can be used in heterogeneous environments, ranging from homes and small offices, to large distributed enterprise and research networks. Just to give an example, a real-world use case of ntopng to monitor a large research network was presented at FOSDEM 2020.
ntopng integrates the opensource Deep Packet Inspection library nDPI to inspect the whole protocol stack, up to the layer-7. This allows ntopng to provide intelligence and insights both on traditional network metrics as well as on security-specific metrics such as indicators of compromise.
If you visit our stand, you will have to opportunity to see quick demonstrations of ntopng in action and learn how to deploy it.
Since our last FOSDEM, ntopng has evolved along key dimensions:
For this year, we expect ntopng to keep growing and becoming more open to other opensource projects. Strong focus will be kept on the security aspects of network monitoring, including behavioral and encrypted traffic analyses. Finally, small agents are being built under the hood to be used in combination with ntopng and to leverage its intelligence to block suspicious traffic and prevent malicious activities to disrupt the whole network.