Coarse-Grained Traffic Analysis in ISP Networks A Router-Based Approach Christian Martin Verizon.

Slides:



Advertisements
Similar presentations
Routing Basics.
Advertisements

OpenSketch Slides courtesy of Minlan Yu 1. Management = Measurement + Control Traffic engineering – Identify large traffic aggregates, traffic changes.
Network Layer: Internet-Wide Routing & BGP Dina Katabi & Sam Madden.
© J. Liebeherr, All rights reserved 1 Border Gateway Protocol This lecture is largely based on a BGP tutorial by T. Griffin from AT&T Research.
Fundamentals of Computer Networks ECE 478/578 Lecture #18: Policy-Based Routing Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
By Hitesh Ballani, Paul Francis, Xinyang Zhang Slides by Benson Luk for CS 217B.
1 Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Jian Wu (University of Michigan) Z. Morley Mao (University.
Traffic Engineering With Traditional IP Routing Protocols
1 Traffic Engineering for ISP Networks Jennifer Rexford IP Network Management and Performance AT&T Labs - Research; Florham Park, NJ
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 4: IP Routing (RIP) Jong Yul Kim
The Sprint IP Monitoring Project and Traffic Dynamics at a Backbone POP Supratik Bhattacharyya Sprint ATL
Impact of BGP Dynamics on Intra-Domain Traffic Patterns in the Sprint IP Backbone Sharad Agarwal, Chen-Nee Chuah, Supratik Bhattacharyya, Christophe Diot.
User-level Internet Path Diagnosis R. Mahajan, N. Spring, D. Wetherall and T. Anderson.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
04/05/20011 ecs298k: Routing in General... lecture #2 Dr. S. Felix Wu Computer Science Department University of California, Davis
Performance Management (Best Practices) REF: Document ID
Computer Networks Layering and Routing Dina Katabi
TUNDRA The Ultimate Netflow Data Realtime Analysis Jeffrey Papen Yahoo! Inc.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
TCOM 515 Lecture 6.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Lecture 4: BGP Presentations Lab information H/W update.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks BGP.
Geneva, 24 March 2011 Flow-based Traffic Accounting at SWITCH Simon Leinen Team Leader LAN, SWITCH ITU-T Workshop on IP Traffic Flow Measurement (Geneva,
More on Internet Routing A large portion of this lecture material comes from BGP tutorial given by Philip Smith from Cisco (ftp://ftp- eng.cisco.com/pfs/seminars/APRICOT2004.
Vytautas Valancius, Nick Feamster, Akihiro Nakao, and Jennifer Rexford.
© 2004 AARNet Pty Ltd Measurement in aarnet3 4 July 2004.
DoS attacks on transit network - David Harmelin ( ) Denial of Service attacks on transit networks David Harmelin DANTE.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Inter-domain routing Some slides used with.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
1 Version 3.1 Module 6 Routed & Routing Protocols.
An internet is a combination of networks connected by routers. When a datagram goes from a source to a destination, it will probably pass through many.
Evolving Toward a Self-Managing Network Jennifer Rexford Princeton University
Advanced Technology Laboratories 8 December 2000 page 1 Characterization of Traffic at a Backbone POP Nina Taft Supratik Bhattacharyya Jorjeta Jetcheva.
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
Peer Policy Policing with NETFLOW NANOG 25 June 9, 2002.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
1 Monitoring: from research to operations Christophe Diot and the IP Sprintlabs ipmon.sprintlabs.com.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
1 Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO PathSolutions.
By: Yaron Levy Supervisors: Dr. Shlomo Greenberg Mr. Hagai David.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Working at a Small-to-Medium Business or ISP – Chapter 6
Jian Wu (University of Michigan)
Border Gateway Protocol
COS 561: Advanced Computer Networks
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Routing.
CS 31006: Computer Networks – The Routers
Software Defined Networking
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
COS 561: Advanced Computer Networks
Working at a Small-to-Medium Business or ISP – Chapter 6
COMP/ELEC 429/556 Introduction to Computer Networks
BGP Interactions Jennifer Rexford
BGP Instability Jennifer Rexford
Routing.
Presentation transcript:

Coarse-Grained Traffic Analysis in ISP Networks A Router-Based Approach Christian Martin Verizon

Traditional ISP Traffic Analysis Resource Utilization CPU, port utilization, memory Traffic Characterization Flow information (src prt, dst if, src addr, etc) What kind of traffic is flowing across my network? In what ratios and magnitudes? How do new application phenomena affect traffic dynamics (eg. Napster, Everquest) Network Performance RTT, Packet Loss Are there problem areas in my network that I should be addressing?

Modern ISP Traffic Analysis Node-Node coarse-grained volumetric statistics. Traffic Engineering, metric assignment, billing ISP ISP and ISP {ISP i,ISP i+1,…, ISP n } traffic volumes Peerseeking Traffic characterization Topological and routing data correlation Need routing table to really understand traffic patterns. Otherwise all we know is what, not why or how. Network Performance Temporal Analysis – (Jitter, convergence times, etc) SLAs This analysis is hard!

Modern Traffic Analysis (cont’d) Traditional Analysis is denotative (literal) The information we gather has little to no implied meaning  Bits/sec on this interface  Flows/sec of http between these IPs In order to infer meaning, we need one or more heuristics One such heuristic is the routing table Modern Analysis is connotative (implied) The information we need to gather has lots of implied or inferred meaning  Traffic between POP-A and POP-B  Relative increase in ICMP echo-reply traffic between two ASNs

Routing Data As a Heuristic Modern Analysis requires an understanding of the routing state of a network Otherwise, the empirical data has no meaning (connotation) Gathering routing information offline and then correlating it to traffic data: Difficult (sensor fusion) Costly (high speed interfaces not cheap) Disruptive (need to insert probes) Inaccurate in the temporal dimension (export) The router has all the ‘information’ that is needed to perform the analysis in real-time

The Router as a Traffic Analyzer Modern routers forward data using advanced hardware Legacy software routers were smart, but slow Original ASIC technology was dumb and fast Newer ASICs/PPEs are becoming smart and fast Forwarding engines are derived from routing data While programming the FIB, we may be able to store additional heuristics  Who (Next Hop), What (POP, peer, cust), When (timestamp), Where (AS, router), How much (volume), Why (is my policy accurately applied?) Create buckets, match flags, and increment counters Store in memory for SNMP/other processing, rather than costly export to spinning media for analysis

Applicability Coarse-Grained Node-to-Node Analysis How much traffic of a certain class to a certain class, derived from BGP (or other) information Peer-Seeking How much traffic to and from a set of AS-PATHs, with additional flags if needed Fine Grained Analysis (future)? Real-time analysis of data patterns, router-based heuristics, inferencing, reacting? Anything that requires routing information for correlation Match BGP info and port (NNTP between a set of AS’s)

Coarse-Grained Node-Node Analysis Here, a node is a router, or cluster, or POP, or an entire AS Use BGP Next-Hop or AS-PATH to define class Program FIB with class, increment when a match occurs Can be done for source match or destination match Simple way to derive arbitrary demand matrices Aggregate Volume Nodes

Peerseeking Determine heuristically (or thru flow info) what ASNs you are interested in Create AS-PATH matches, bucketize and count Netflow processing for AS information is expensive Must Sample - sampling accuracy is questionable Aggregate Volume Potential Peer Transit Providers Potential Peer’s other ASNs, customers, etc My ASN

Fine Grained Analysis With new imbedded hardware being developed, much of our analysis will be performed on the router Similar to Aggregated Netflow With real time data and robust inferencing software, we may have: Anomaly detection (DoS Attack) Traffic pattern recognition and adjustment By offloading analysis to hardware in the router, we ensure temporal accuracy and reduce the system processing and storage burden on offline tools Data is transient and self-similarities exist. Why store it?

Caveats BGP Asymmetry Intradomain should not be a problem Interdomain is a problem, particularly as connectivity becomes rich More useful for transit buyers looking to offload some transit expense No a priori approach to rule setting Need to know what to look for beforehand Requires hardware/software upgrades Ask your vendor when/where this capability is supported

Conclusion Routers have all the data in real time ASICs/PPEs are advancing along with traffic volume on (most) networks Inline probes are intrusive and expensive Offline collection and analysis of large data sets is costly and difficult Features are available today on modern hardware Complimentary to flow-based tools, and of course, MIB-II and ifMIB polling