Skip to content

NDR — Network Detection & Response

NDR — Network Detection & Response

The KYRA MDR collector agent includes built-in Network Detection and Response (NDR) capabilities. The same collector binary that handles log collection also performs deep packet inspection, flow tracking, behavioral baselining, and threat detection — no separate NDR sensor deployment required.


Architecture

Processing Pipeline

Network traffic passes through a six-stage analysis pipeline:

┌─────────┐ ┌─────────┐ ┌─────────┐ ┌──────────┐ ┌──────────┐ ┌──────┐
│ Capture │───>│ Parse │───>│ Flow │───>│ Baseline │───>│ Detect │───>│ Emit │
│ TAP/ │ │ L3-L7 │ │ 5-tuple │ │ rolling │ │ rule │ │alert │
│ SPAN │ │ protocol│ │ bidir │ │ hourly │ │ engines │ │ │
│ mirror │ │ parsers │ │ tracker │ │ stats │ │ │ │ │
└─────────┘ └─────────┘ └─────────┘ └──────────┘ └──────────┘ └──────┘
  1. Capture — Raw packets from TAP/SPAN/mirror port in promiscuous mode
  2. Parse — Protocol parsing for DNS, TLS, HTTP, SMB, SSH, RDP, Kerberos, DHCP
  3. Flow Tracking — Bidirectional flow assembly with 5-tuple identification
  4. Baselining — Rolling hourly statistics for behavioral anomaly detection
  5. Detection — Multiple detection engines including signature, behavioral, and threat intel matching
  6. Alert Emission — Detection alerts flow through the same collector pipeline as log events

Protocol Support

ProtocolAnalysis Capabilities
DNSQuery/response logging, DGA detection, tunneling detection, suspicious domain resolution
TLS/SSLJA3/JA3S fingerprinting, certificate validation, expired/self-signed cert detection
HTTPURL analysis, user-agent profiling, suspicious download detection
SMBFile share access monitoring, lateral movement detection
SSHSession tracking, brute force detection, unusual key exchange
RDPRemote access monitoring, brute force detection
KerberosAuthentication monitoring, golden/silver ticket detection
DHCPDevice discovery, rogue DHCP detection

Detection Capabilities

Signature-Based Detection

  • Known malware communication patterns
  • Command & Control (C2) beacon detection
  • Exploit kit traffic identification
  • Known bad IP/domain matching

Behavioral Detection

  • Traffic volume anomalies (bytes, packets, connections per host)
  • Unusual protocol usage (DNS over non-standard ports, encrypted traffic on unusual ports)
  • Lateral movement patterns
  • Data exfiltration indicators (large outbound transfers, unusual upload ratios)
  • Beaconing detection (periodic outbound connections)

MITRE ATT&CK Mapping

All NDR detections are mapped to MITRE ATT&CK techniques:

TacticExample Detections
Initial AccessExploit public-facing application, phishing link click
ExecutionSuspicious script download, malware fetch
PersistenceC2 beacon establishment
Lateral MovementSMB/RDP pivoting, pass-the-hash
ExfiltrationDNS tunneling, large data transfer to external IP
Command & ControlBeaconing, DGA domains, encrypted C2 channels

Deployment

Network Requirements

  • TAP, SPAN, or mirror port configured on network switch
  • Dedicated network interface on the collector host for traffic capture
  • Minimum 1 Gbps interface (10 Gbps recommended for high-traffic environments)

Performance

MetricCapability
ThroughputUp to 1 Gbps sustained traffic analysis
Flow Tracking500,000+ concurrent flows
Memory~200 MB additional for NDR module
LatencySub-millisecond packet processing

Feature Gating

NDR is an add-on capability enabled per tenant. When NDR is not enabled:

  • NDR events are rejected at the ingestion layer
  • NDR traffic is tracked separately and does not count against log ingestion quotas
  • The collector reports NDR capability status so the platform can display appropriate configuration options