Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing.

Slides:



Advertisements
Similar presentations
Multicast Traffic Monitoring on a Nationwide Backbone Network Tao He New Generation Network (NGN) Lab. Department of Electronic and Engineering Tsinghua.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Merit Network: Connecting People and Organizations Since 1966 CALEA Compliance – A Feasibility Study October 25, 2006 Mary Eileen McLaughlin Director –
Internet Inter-Domain Traffic 生機四 謝宗廷 歷史三 胡秩瑋. Introduction  Internet is always changing dramatically.  In the new Internet economy, content providers.
PROMISE: Peer-to-Peer Media Streaming Using CollectCast Mohamed Hafeeda, Ahsan Habib et al. Presented By: Abhishek Gupta.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Chapter 1 Read (again) chapter 1.
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
1 Last Class! Today: r what have we learned? r where is the networking world going? r question and answers r evaluation.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Licentiate Seminar: On Measurement and Analysis of Internet Backbone Traffic Wolfgang John Department of Computer Science and Engineering Chalmers University.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
A fast identification method for P2P flow based on nodes connection degree LING XING, WEI-WEI ZHENG, JIAN-GUO MA, WEI- DONG MA Apperceiving Computing and.
Towards Modeling Legitimate and Unsolicited Traffic Using Social Network Properties 1 Towards Modeling Legitimate and Unsolicited Traffic Using.
Communications Recap Duncan Smeed. Introduction 1-2 Chapter 1: Introduction Our goal: get “feel” and terminology more depth, detail later in course.
DPNM, POSTECH 1/23 NOMS 2010 Jae Yoon Chung 1, Byungchul Park 1, Young J. Won 1 John Strassner 2, and James W. Hong 1, 2 {dejavu94, fates, yjwon, johns,
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
What IS the Web? Mrs. Wilson Internet Basics & Beyond.
Internet Traffic Management. Basic Concept of Traffic Need of Traffic Management Measuring Traffic Traffic Control and Management Quality and Pricing.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
Network Hardware (I) Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
MonNet – a project for network and traffic monitoring Detection of malicious Traffic on Backbone Links via Packet Header Analysis Wolfgang John and Tomas.
6/1/991 Internetworking connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Polytechnic UniversityBell Laboratories
Wire Speed Packet Classification Without TCAMs ACM SIGMETRICS 2007 Qunfeng Dong (University of Wisconsin-Madison) Suman Banerjee (University of Wisconsin-Madison)
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Module 10: How Middleboxes Impact Performance
ECEN “Internet Protocols and Modeling”, Spring 2012 Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Class.
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
1. Layered Architecture of Communication Networks: TCP/IP Model
Local Area Networks Honolulu Community College
Analysis of UDP Traffic Usage on Internet Backbone Links* Min Zhang Maurizio Dusi Wolfgang John *This study was performed while authors visited CAIDA at.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
 1DT014 Datakommunikation I › (Thur) 9-14 › Polacksbacken, Skrivsal  9 Questions › 5 Short questions › 4 Long questions.
Performance Limitations of ADSL Users: A Case Study Matti Siekkinen, University of Oslo Denis Collange, France Télécom R&D Guillaume Urvoy-Keller, Ernst.
Transport layer identification of P2P traffic Victor Gau Yi-Hsien Wang
1 Internet Traffic Measurement and Modeling Carey Williamson Department of Computer Science University of Calgary.
6/1/991 Internetworking connectionless and connection-oriented networks Malathi Veeraraghavan Mark Karol Polytechnic UniversityBell Labs.
CSCD 433/533 Advanced Computer Networks Lecture 1 Course Overview Spring 2016.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
U Innsbruck Informatik - 1 Specification of a Network Adaptation Layer for the Grid GGF7 presentation Michael Welzl University.
For more course tutorials visit NTC 406 Entire Course NTC 406 Week 1 Individual Assignment Network Requirements Analysis Paper NTC 406.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
CompTIA Security+ Study Guide (SY0-401)
Chapter 5 Network and Transport Layers
Due: a start of class Oct 12
Local Area Networks Honolulu Community College
Lightweight Application Classification for Network Management
CompTIA Security+ Study Guide (SY0-401)
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
CPSC 641: WAN Measurement Carey Williamson
Computer Networking A Top-Down Approach Featuring the Internet
Carey Williamson Department of Computer Science University of Calgary
Realistic and Responsive Network Traffic Generation
2017 session 1 TELE3118: Network Technologies Week 13 Review
Transport Layer Identification of P2P Traffic
Intelligent Network Services through Active Flow Manipulation
Presentation transcript:

Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing Jiaotong University, China Maurizio Dusi Università degli Studi di Brescia, Italy kc claffy, Nevil Brownlee CAIDA, SDSC, UCSD, USA

TrefPunkt 20 Introduction ? ? ? ? ? HTTP Bittorrent SMTP ? Traffic classification (TC) ?

TrefPunkt 20 Introduction (cont.) Why traffic classification? –Network design and provisioning –QoS assignment and traffic shaping –Accounting –Security monitoring: IDS/IPS –Network Forensics –Trends and changes in network applications

TrefPunkt 20 Introduction (cont.) Today’s Internet –evolving in scope and complexity –applications adapt rapidly to detection attempts –emerging obfuscation techniques Many classification approaches in literature –using whatever traffic samples available –no systematic integration of results

TrefPunkt 20 Outline Classification Methods –Research review and taxonomy Survey analysis: P2P Pitfalls –Systematic shortcomings –Re-validate assumptions UDP rising Routing (a)symmetry on backbone links

TrefPunkt 20 Research Review and Taxonomy Research review –create a structured taxonomy of traffic classification papers and their datasets –help to answer popular questions –reveal open issues and challenges

TrefPunkt 20 Research review and taxonomy: Overview 64 papers published between 1994 and 2008 Definition: traffic classification “Methods to classify traffic data sets based on features passively observed in the traffic, according to specific classification goals.”

TrefPunkt 20 Research review and taxonomy: Datasets and Goals Data sets: >80 data sets used for 64 papers! –Time of collection, link type, capture environments, geographic location, (payload, anonymization), etc. Classification goals: –Coarse or fine-grained classification –Applications or protocols

TrefPunkt 20 Research review and taxonomy: Features Features –Reacting on application development

TrefPunkt 20 Research review and taxonomy: Methods Methods –exact matching port number, payload, etc –heuristic methods e.g. on connection patterns –machine learning methods supervised and unsupervised

TrefPunkt 20 Survey analysis: P2P How much P2P? 1.3% to 93% across the 18 (out of 64) papers

TrefPunkt 20 Survey analysis: P2P (contd.) So how much of modern Internet traffic is P2P? "there is a wide range of P2P traffic on Internet links; see your specific link of interest and classification technique you trust for more details."

TrefPunkt 20 Survey analysis: P2P (contd.) SUNET: April till Nov. 2006

TrefPunkt 20 Outline Methods –Research review and taxonomy Survey analysis: P2P Pitfalls –Systematic shortcomings –Re-validate assumtions UDP rising Routing (a)symmetry on backbone links

TrefPunkt 20 Systematic Shortcomings Poor comparability of results!!! –80 data sets by 64 papers → lack of shared, modern data sets as reference data –no clear definitions (P2P or file-sharing …) → lack of standardized measures → lack of defined classification goals

TrefPunkt 20 Assumption: TCP dominates traffic Current TC approaches consider mainly TCP –Assumptions TCP is dominating traffic Bulk (data) transfer is done via TCP –Advantage TCP has a clear notion of “sessions”

TrefPunkt 20 Assumption: TCP dominates traffic (cont.) There might be a shift (soon): –IPTV applications PPLive, PPStream: switched to UDP in Oct VA (Video Accelerator): UDP for data transfer –P2P applications uTP: Micro Transport protocol, based on UDP –Part of uTorrent 1.9 beta, expected during 2010 All on high, random ports (of course …)

TrefPunkt 20 Assumption: TCP dominates traffic (cont.)

TrefPunkt 20 CDF of UDP flows per Port number Assumption: TCP dominates traffic (cont.) Indeed, high ephemeral ports are common today!

TrefPunkt 20 Avg. Packets/Flow for top 10 UDP ports Assumption: TCP dominates traffic (cont.) No substantial data portions carried (on these links - yet)

TrefPunkt 20 Assumption: TCP dominates traffic (cont.) Current situation (on the links measured) –TCP dominating pkts (bytes), UDP dominating flows UDP for P2P overlay signaling This might change soon: –UDP based IPTV already common in China, uTP … UDP for bulk and streaming data transfer → TC methods can no longer ignore UDP?

TrefPunkt 20 Assumption: routing symmetry Current approaches consider bidirectional traffic –Assumption Traffic is routed symmetrically –Same path for forward and backward direction –Advantage Bi-directional information offers more features for classification For TCP, bi-directional information allows easier inference of sessions (connections)

TrefPunkt 20 Assumption: routing symmetry (cont.) Degree of symmetry –4 link locations (Sweden and USA) –2 samples each

TrefPunkt 20 Assumption: routing symmetry (cont.) Beyond Intranets and access links (edge networks), there is little symmetry Degree of symmetry decreases with level of “coreness” of the link → TC methods for backbone links need to master unidirectional data flows

TrefPunkt 20 Summary Research review –structured taxonomy of traffic classification papers Current systematic shortcomings → lack of shared, modern data sets as reference data → lack of standardized measures → lack of defined classification goals Upcoming technical challenges → TC methods can no longer ignore UDP → TC methods should handle unidirectional flows

Traffic classification overview: Observations on UDP traffic on Internet backbone links: soon to be published on (“News” section) Estimation of routing asymmetry on Internet links: or