I'm looking for a program which tracks data usage.

A network of 4 PC, including a file server, has recently had issues with maxing out their ISP's internet cap. Even after 'upping' to a current package almost 10x in size, they are still finding they're having problems (in fact, the phantom usage seems to have increased to accommodate the increase in cap - that's stumped me entirely!). Wi-Fi security has been checked and updated, but this has made no change.

Multiple MBAM & NOD32 scans have been run on all systems, on a few different days - nothing found. Zemana antilogger has been placed onto the (file) server, but nothing has been picked up as yet.

Still, the increased traffic appears, even when only one user is there (and he's the business owner, and has told me exactly what he is running).

Any ideas on (free) tracking software which I can install on each system which would allow me to at very least isolate which PC/s contain the software causing the problem (as I suspect it is some sort of malicious software on the given PC/s which we haven't yet detected but which is causing these problems)?
Servant-LeggieAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Burns1978Commented:
I suggest to increase outgoing network security by enabling
security rules in your router. Most of router allows to make access control list(acl).
in addition, you must log the packet that was rejected by your firewall.
That way, you will find which device is spamming your ISP...
common port to enable are
tcp 80-443-25
UDP 53
Block and log everything else.

the other approach is the packet sniffing.
you can download Wireshark software, and sniff the pack flow
between your LAn switch and your routeur.


good luck
0
Servant-LeggieAuthor Commented:
Burns1978, I'm not sure that the Optus wireless VoIP modem installed has these options - I can check. I did drop in to set up Wireshark on all their PCs, but had some issues regarding an 'Out of Memory' error - seems to have been resolved by deactivated real-time display and setting it up to store multiple files once certain size thresholds are met.
0
Servant-LeggieAuthor Commented:
Burns1978, thanks, I made the adjustments to the VoIP modem (IAD), but no change was seen. The issue definitely appears to be from the Server because we were finally able to turn off and the usage has gone back to normal. Now, all I need to do is trawl through GBs of Wireshark data.

Any idea what I'm looking for - haven't used Wireshark before?
0
10 Tips to Protect Your Business from Ransomware

Did you know that ransomware is the most widespread, destructive malware in the world today? It accounts for 39% of all security breaches, with ransomware gangsters projected to make $11.5B in profits from online extortion by 2019.

pand0ra_usaCommented:
Start with the DNS. Look for the most common IP. Check protocols used (FTP, HTTP, torrent, etc). Look for anything fishy.

I'm wondering if someone has hijacked the server and is using it as a Warez server.
0
Servant-LeggieAuthor Commented:
pand0ra_usa, warez server?
0
pand0ra_usaCommented:
Warez is a term for pirated software, porn and malware infected files.
0
Servant-LeggieAuthor Commented:
pand0ra_usa, I suppose that could account for the higher than usual traffic! I'll see if there's anything strange on the wireshark logs, but I hope I am able to pick up whatever fishy activity is going on! I'll keep you posted (it will probably be a few days until I can get back to you on this- sorry).
0
pand0ra_usaCommented:
So, using wireshark capture everything then start by setting up some display filters. Actually, start by sorting by protocol first. See which protocol you have the most of (HTTP, FTP, SSH, etc). Then maybe start reassembling some of the packets to get an idea of what files are going out. PAy attention to any image files (gif, jpg, bmp, etc), executables  (.exe), and audio/video files (.mp3, .mp4, .mov, etc).

Can you tell us the amount of bandwidth that is being used? 10GB? 100GB? And the rate (per hour, per day, etc).
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Servant-LeggieAuthor Commented:
Thanks, pand0ra_usa, you seem to have picked up the tone of my feeling as though syphoning through wireshark data files was more than a little daunting, especially given the gigabytes of them. I appreciate the tips!

We'd be talking about anywhere from 1-5GB per day, sometimes more.

I'll set up those filters and get back to you ASAP on the results.
0
Servant-LeggieAuthor Commented:
This information was helpful and allowed us to isolate unauthorised traffic.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows 7

From novice to tech pro — start learning today.