Network Monitoring System In CSTNET Long Chun China Science & Technology Network.

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Improvement of TCP Packet Reassembly in Libnids
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Addition Facts
Communicating over the Network
© 2012 Gigamon. All rights reserved. The Dynamic World of Threat Detection, Containment & Response 1.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Zhiyun Qian, Z. Morley Mao (University of Michigan)
Chapter 1: Introduction to Scaling Networks
Access Control Lists. Types Standard Extended Standard ACLs Use only the packets source address for comparison 1-99.
ABC Technology Project
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing the MPLS VPN Routing Model.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
powerful network monitoring & management solution
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
Configuring and Troubleshooting ACLs
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
ICmyNet.Flow Network Traffic Analysis System If You Want to See Your Net
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—5-1 MPLS VPN Implementation Configuring BGP as the Routing Protocol Between PE and CE Routers.
Week 1.
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
INDIANAUNIVERSITYINDIANAUNIVERSITY TransPAC2 Security John Hicks TransPAC2 Indiana University 22nd APAN Conference – Singapore 20-July-2006.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Current Practice for Network Analysis in CSTNet Chunjing Han CSTNET, CNIC
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Chapter 5: Implementing Intrusion Prevention
FOR INTERNAL USE ONLY [Your business] exceeds with COLT Network Response to DDoS attacks – TNC 2006 Nicolas FISCHBACH Senior Manager, Network Engineering.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Security Management Process 1. six-stage security operations model 2 In large networks, the potential for attacks exists at multiple points. It is suggested.
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
High Performance Research Network Dept. / Supercomputing Center 1 DDoS Detection and Response System NetWRAP : Running on KREONET Yoonjoo Kwon
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
Chapter 8: Monitoring the Network
Presentation transcript:

Network Monitoring System In CSTNET Long Chun China Science & Technology Network

2 Agenda Introduction of Peakflow SP 1 Basic Traffic Analysis 2 BGP Analysis Function Role of Peakflow SP in Security Area 4 4

3 Peakflow SP Platform Infrastructure Security DoS/worm detection Traceback Analysis Mitigation Infrastructure Security DoS/worm detection Traceback Analysis Mitigation Traffic and Routing Routing management Transit/peering mgmt Customer accounting Backbone mgmt Traffic and Routing Routing management Transit/peering mgmt Customer accounting Backbone mgmt Converged Platform Device Infrastructure Security Traffic and Routing Analysis Converged Platform Device Infrastructure Security Traffic and Routing Analysis Managed Services Device Customer facing DoS detection and mitigation Managed Services Device Customer facing DoS detection and mitigation

4 Intel 2U Servers Peakflow Network Appliances Measurement Collect Netflow, Cflow, Sflow, SNMP and optionally BGP information from network routers/devices Deployment Monitor up to 5 routers per Peakflow Device Up to 15 devices managed by controller Reporting Reports available on controller through CLI or GUI Notifications via , snmp, or syslog Collector – collect data from routers, baseline traffic, detect anomalies. Controller –aggregate data from other devices; create a central network-wide view

5 Netflow Peakflow examines NetFlow packets that are generated by the router or switch as traffic is forwarded. The NetFlow is analyzed to benchmark network behavior and identify anomalies.

6 Topology

7 Agenda Introduction of Peakflow SP 1 Basic Traffic Analysis 2 BGP Analysis Function Role of Peakflow SP in Security Area 4 4

8 Traffic Analysis Automatically Configured Analysis Objects: Network Router Peer Interface No Complex Configuration Objects Customized by User: Customer Profile Flexibly customize objects we need

9 Traffic Analysis User define objects: Profile Include 1 IP Address or Block of IP Addresses 2 AS Path Regular Expressions 3 Local AS/Sub AS 4 BGP community 5 Peer ASN 6 TCP/UDP port 7 Interface Boolean Operation AND OR NOT We can define analysis objects flexibly: community '2:20'and not /25 aspath ^23849 and not aspath ^23849_9800 community 2:20 and aspath ^4134

10 Traffic Summary

11 Traffic Analysis Base on TCP/UDP Port (1)

12 Traffic Analysis Base on TCP/UDP Port(2)

13 Top Talkers

14 Agenda Introduction of Peakflow SP 1 Basic Traffic Analysis 2 BGP Analysis Function Role of Peakflow SP in Security Area 4 4

15 Transit Traffic Analysis Object Network Router Peer Customer Profile Interface Operation Network BGP Attribute ASxAS

16 Traffic Analysis Base on AS

17 Traffic Analysis Base on AS Path

18 Peering Evaluation and Visualization

19 Agenda Introduction of Peakflow SP 1 Basic Traffic Analysis 2 BGP Analysis Function Role of Peakflow SP in Security Area 4 4

20 Peakflow SP Anomaly Reporting Profiled Anomalies – deviations from normal traffic levels on the network Misuse Anomalies – Traffic towards specific hosts that exceed what should normally be seen on a network Fingerprint/Worm Anomalies – Traffic that fits a user specified signature

21 Detect Attack - Profiled Anomalies A baseline of normal behavior leveraging flow data available from the routers deployed on the network would be built. In real-time, the system compares traffic against the baseline. Detects network-wide anomalies such as DDoS attacks and worm outbreaks in non-intrusive data collection methods.

22 Detection Classes: Misuse Detected independently from the established baselines, on a set of known attack signatures. Traffic of specific types exceeding what should be normal for a network. Misuse anomalies cover the following types of traffic: ICMP Anomaly TCP NULL Flag Anomaly TCP SYN Flag Anomaly TCP RST Flag Anomaly IP NULL (Proto 0) Anomaly IP Fragmentation Anomaly IP Private Address Space Anomaly

23 Misuse Anomalies - Dark IP

24 Fingerprint/Worm Anomalies(1)

25 Tracing Anomalies Automatically trace the source and destination IP/Port, TCP Flag of abnormal traffic. Distribution of attack traffic by source and destination IP/Port. Trace the network device that the abnormal traffic pass through.

26 Prevent/Mitigate Network-wide Anomalies System can recommend appropriate mitigation measures to mitigate anomalies such as DoS attack and worm outbreaks. Generate recommended ACLs or rate limit commands. Blackhole routing Sinkhole routing

27 Alert BGP BGP Instability BGP Route Hijacking Data Source BGP Down Flow Down SNMP Down DoS Alert Interface Usage: traffic exceeded configured baseline Use , SNMP Traps, Syslog etc to notify network administrators.

Thank you !