POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.

Slides:



Advertisements
Similar presentations
Network Monitoring and Security Nick Feamster CS 4251 Spring 2008.
Advertisements

Overview of IETF work on IP traffic flow measurement and current developments Dr. Jürgen Quittek General Manager Network Research Division, NEC Europe.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
1 © 2000, Cisco Systems, Inc _05_2000_c3 Netflow Michael Lin.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
Flow tools APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Fraunhofer FOKUSCompetence Center NET T. Zseby, CC NET1 IPFIX – IP Flow Information Export Overview Tanja Zseby Fraunhofer FOKUS, Network Research.
Software Defined Networking: Traffic Monitoring and Analysis
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 IP : Internet Protocol Computer Network System Sirak Kaewjamnong.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
24/10/2015draft-novak-bmwg-ipflow-meth- 03.txt 1 IP Flow Information Accounting and Export Benchmarking Methodology
1 Network Layer Lecture 13 Imran Ahmed University of Management & Technology.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Real-time Flow Management 2 BOF: Remote Packet Capture Extensions Jürgen Quittek NEC Europe Ltd, Heidelberg, Germany Georg Carle GMD.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
William Stallings Data and Computer Communications
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
Project Requirements (NetFlow Generator) 정승화 분산 처리 및 네트워크 관리 연구실 포항 공과 대학교
Open-Eye Georgios Androulidakis National Technical University of Athens.
Standards Activities on Traffic Measurement. 2 Outline Applications requiring traffic measurement Packet capturing and flow measurement Existing protocols.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Net Flow Network Protocol Presented By : Arslan Qamar.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
1 CSE 5346 Spring Network Simulator Project.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
Sem1 - Module 10 Routing Fundamentals and Subnets
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
POSTECH DP&NM Lab Detailed Design Document NetFlow Generator 정승화 DPNM Lab. in Postech.
IETF 62 NSIS WG1 Porgress Report: Metering NSLP (M-NSLP) Georg Carle, Falko Dressler, Changpeng Fan, Ali Fessi, Cornelia Kappler, Andreas Klenk, Juergen.
Multi-protocol Label Switching
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
Introduction to Networks
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Working at a Small-to-Medium Business or ISP – Chapter 6
Instructor Materials Chapter 6: Network Layer
Distributed Systems.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 6: Network Layer
Network and Services Management
Flow tools APRICOT 2008 Network Management Taipei, Taiwan
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 6: Network Layer
Chapter 8: Monitoring the Network
Working at a Small-to-Medium Business or ISP – Chapter 6
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (2) 5. Passive Monitoring - Packet Capturing  Packets can be captured using Port Mirroring or Network Splitter (Tap) Mirroring Probe system Splitting Probe system Port MirroringNetwork Splitter How it works- Copies all packets passing on a port to another port - Splits the signal and send a signal to original path and another to probe Advantage- No extra hardware required - No processing overhead on router/switch Disadvantage- Processing overhead on router/switch - Splitter hardware required

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (3) 5. Passive Monitoring - Packet Capturing  Difficulties in packet capturing  Massive amount of data  How much packet data is generated from 100 Mbps network in an hour?  Port speed ⅹ In&Out ⅹ Link Utilization ⅹ sec/hour = throughput 100 Mbps ⅹ 2 ⅹ 0.5 ⅹ 3600 = 360 Gbps  Throughput / avg. packet length ⅹ bytes of packet data = data size 360 Gbps / (1500 ⅹ 8) ⅹ 30 = 1 Gbyte  Processing of high-speed packets  Processing time for 100 Mbps network  Port speed ⅹ In&Out ⅹ Link Utilization / average packet length = 8333 packets/sec => 0.12 msec/packet 100 Mbps1 Gbps1 Tbps Data size per hour (assume 0.5 link util)1 Gbyte10 Gbyte10 Tbyte Processing Time per packet0.12 msec0.012 msec0.012 μsec

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (4) 5. Passive Monitoring - Sampling  If the rate is too high to capture all packets reliably, there is no alternative but to sample the packets  Sampling algorithms: every Nth packet or fixed time interval (a) 2:1 sampling (b) 1 msec sampling 0 msec1 msec2 msec3 msec4 msec

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (5) 5. Passive Monitoring - Flow Generation  Flow is a collection of packets with the same {SRC and DST IP address, SRC and DST port number, protocol number, TOS}  Flow data can be collected from routers directly, or standalone flow generator having packet capturing capability  Popular flow formats  NetFlow (Cisco), sFlow (sFlow.org), IPFIX (IETF)  Issues in flow generation  What information should be included in a flow data?  How to generate flow data from raw packet information efficiently?  How to save bulk flow data into DB or binary file in a collector?  How long should the data be preserved? flow 4flow 1flow 2flow 3

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (6) 5. Passive Monitoring - Flow Technology: NetFlow  Cisco NetFlow  is an option configurable in Cisco routers that exports data on each IP flow passed through an interface  Cisco IOS NetFlow technology  is an integral part of Cisco IOS software that collects and measures data as it enters specific routers or switch interfaces  enables to perform IP traffic flow analysis without custom probes  3 key components in a NetFlow system  Flow Exporter  Flow Collector  Network Data Analyzer (Flow Analyzer)

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (7) 5. Passive Monitoring - Flow Technology: NetFlow  NetFlow Export Datagram  Version 1, Version 5, Version 7, Version 8  Version 1: original format supported in the initial Cisco IOS software releases.  Version 5: Source IP Address Destination IP Address Source IP Address Destination IP Address Next Hop Address Source AS Number Dest. AS Number Source Prefix Mask Dest. Prefix Mask Next Hop Address Source AS Number Dest. AS Number Source Prefix Mask Dest. Prefix Mask Input Interface Port Output Interface Port Input Interface Port Output Interface Port Type of Service TCP Flags Protocol Type of Service TCP Flags Protocol Packet Count Byte Count Packet Count Byte Count Start Timestamp End Timestamp Start Timestamp End Timestamp Source TCP/UDP Port Destination TCP/UDP Port Source TCP/UDP Port Destination TCP/UDP Port Usage QoS Time of Day Application Routing and Peering Port Utilization From/To Header · Sequence number · Record count · Version number Flow Record Flow Record Flow Record Flow Record Flow Record

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (8) 5. Passive Monitoring - Flow Technology: NetFlow  Version 7  Enhancement that supports Cisco Catalyst 5000 Series switches equipped with NetFlow Feature Card (NFFC).  Version 8  developed mainly to MINIMIZE output size from exporter by adding Router-Based Aggregation schemes type UDP datagram records/datagram max udp pktsize ASMatrix ProtocolPortMatrix SourcePrefixMatrix DestPrefixMatrix PrefixMatrix  available on Cisco routers from IOS release 12.0(3)T

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (9) 5. Passive Monitoring - Flow Technology: sFlow  sFlow is described in RFC 3176: “InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks”  sFlow is a monitoring technology that gives visibility into the use of networks, enabling performance optimization, accounting/billing for usage, and defense against security threats  sFlow provides an effective means of embedding traffic monitoring in high-speed switches and routers  sFlow samples packets using statistical sampling theory

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (10) 5. Passive Monitoring - Flow Technology: sFlow  sFlow Datagram Format  is specified using the XDR standard  XDR is a standard for the description and encoding of data. (eXternal Data Representation Standard, RFC1014)  version 4  Packet Header Data  Header Protocol (Format of sampled header)  Frame_length  Header bytes  Packet IP v4 Data  Length  Protocol (IP Protocol Type)  src_ip / dst_ip  src_port / dst_port  TCP flags  tos  Packet IP v6 Data  Length  IP next Header  src_ip / dst_ip  src_port / dst_port  TCP flags  IP priority

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (11) 5. Passive Monitoring - Flow Technology: sFlow  Equipment Supporting sFlow  Foundry Networks  BigIron, FastIron, NetIron Series  InMon’s sFlow Probe  By attaching to a monitor/SPAN port  Gathers mirrored or tapped (using a splitter) traffic data  The resulting data is forwarded in sFlow datagrams to a central sFlow collector (for example InMon Traffic Server) for analysis. Source: InMon

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (12) 5. Passive Monitoring - Flow Technology: IPFIX  IPFIX (IP Flow Information eXport) Working Group   Background  There are a number of IP flow export systems in common use  These systems differ significantly, even though some have adopted a common transport mechanism  such differences make it difficult to develop generalized flow analysis tools  Goal  To produce a standard method for exporting flow info from network devices, as an eventual replacement for the various proprietary methods in use now

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (13) 5. Passive Monitoring - Flow Technology: IPFIX  IPFIX Internet Drafts  Requirements for IP Flow Information Export  J. Quittek et al., Jan 2003 (work in progress)  Architecture Model for IP Flow Information Export  K.C. Norseth, G. Sadasivan, June 2002 (work in progress)  Early stage of work….

POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (14) 5. Passive Monitoring - Traffic Analysis  Spatial aspect  The patterns of traffic flow relative to the network topology  Important for proper network design and planning  Identification of bottleneck & avoidance of congestion  Example: Flow aggregation by src, dst IP address or AS number  Temporal aspect  The stochastic behavior of a traffic flow, usually described in statistical terms  Important for resource management and traffic control  Important for traffic shaping and caching policies  Example: Packet or byte per hour, day, week, month  Composition of traffic  A breakdown of traffic according to the contents, application, packet length, flow duration  Helps to explain its temporal and spatial characteristics  Example: game, streaming media traffic for a week from peer ISP