1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.

Slides:



Advertisements
Similar presentations
CCNP Network Route BGP Part -I BGP : Border Gateway Protocol. It is a distance vector protocol It is an External Gateway Protocol and basically used for.
Advertisements

Chapter 22 Network Layer: Delivery, Forwarding, and Routing.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
Routing: Exterior Gateway Protocols and Autonomous Systems Chapter 15.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Mini Introduction to BGP Michalis Faloutsos. What Is BGP?  Border Gateway Protocol BGP-4  The de-facto interdomain routing protocol  BGP enables policy.
Mod 10 – Routing Protocols
CCNA 2 v3.1 Module 6.
CS335 Networking & Network Administration Tuesday, May 18, 2010.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
Graphs and Topology Yao Zhao. Background of Graph A graph is a pair G =(V,E) –Undirected graph and directed graph –Weighted graph and unweighted graph.
Routing and Routing Protocols
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network Considering the Advantages of Using BGP.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
1 Study on Adaptation of CDN Request-Routing to Scalable Conference System Toshiyuki KAWASAKI* Koji OKAMURA** * Graduate School of Information Science.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Each computer and router interface maintains an ARP table for Layer 2 communication The ARP table is only effective for the broadcast domain (or LAN)
Lecture 1 Internet CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger and Daniel Zappala Lecture 1 Introduction.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
1 Analysis and Study on BGP Routing Information and Flow Data Yoshiaki HARADA Graduate School of Information Science and Electrical Engineering (ISEE)
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Routing and Routing Protocols Routing Protocols Overview.
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Chapter 9. Implementing Scalability Features in Your Internetwork.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
I-Path : Network Transparency Project Shigeki Goto* Akihiro Shimoda*, Ichiro Murase* Dai Mochinaga**, and Katsushi Kobayashi*** 1 * Waseda University **
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Routing Overview.
Routing and Routing Protocols
CS 4396 Computer Networks Lab BGP. Inter-AS routing in the Internet: (BGP)
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
Routing protocols. 1.Introduction A routing protocol is the communication used between routers. A routing protocol allows routers to share information.
Routing and Routing Protocols PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—1-1 Course Introduction.
Introduction to Telecommunications, 2/e By M.A.Rosengrant Copyright (c) 2007 by Pearson Education, Inc. All rights reserved. Figure 12–1 IP packets arrive.
Routing Protocols COSC 541 Data Commun. System & Networks Yue Dou.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
Network Layer IP Address.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Routing Working at a Small-to-Medium Business or ISP – Chapter 6.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
Routing and Routing Protocols CCNA 2 v3 – Module 6.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Kapitel 19: Routing. Kapitel 21: Routing Protocols
Working at a Small-to-Medium Business or ISP – Chapter 6
Routing and Routing Protocols: Routing Static
COMP 3270 Computer Networks
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
RESOLVING IP ALIASES USING DISTRIBUTED SYSTEMS
Intra-Domain Routing Jacob Strauss September 14, 2006.
Working at a Small-to-Medium Business or ISP – Chapter 6
Routing and Routing Protocols: Routing Static
Working at a Small-to-Medium Business or ISP – Chapter 6
Visualization of Temporal Difference of BGP Routing Information
Multicasting Unicast.
CCNA 2 JEOPARDY Module 6.
Presentation transcript:

1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical Engineering (ISEE) Kyushu University

2 Contents Background Purpose Background Knowledge  AS and Internet routing  Property of Internet Flow Analysis method Progress of this research Conclusion and Future Work

3 Background Internet is growing as a Global Information Infrastructure  always-on connection by laptop PC, cellular, etc.  many service as music and video delivery  distance medicine and learning reliable Internet system are required We should grasp tendency of flows in Internet to manage reliable Internet infrastructure

4 Background It is difficult to grasp the tendency of Internet flows  Amount of flow are increasing with development of Internet  A lot of Garbage such as DDos Attack and illegal accesses are flows in Internet.  Physical hazard such as electrical power failure and router failure Expert engineers are requires to manage Internet system  It take a great deal of time and effort

5 Purpose It is required that the method to detecting anomaly and tendency in Internet flow automatically  There are many research of macro analyzing research in Internet flow It is difficult to grasp detail bias and anomaly because Internet flow are complicated I suggest that micro analyzing method by segment Network Flows in port number, AS number,area information and country etc. I can analyze Flow Data in detail  The drop of false alarm can give reduce managing cost I suggest that detecting anomaly in Network traffic, and visualize

6 Background knowledge AS(Autonomous system)  Collection of IP networks and routers under the control of one entity (or sometimes more) that presents a common routing policy to the Internet. An Internet Service Provider (ISP) A very large organization  AS numbers are currently 16-bit integers, which allow for a maximum of assignments. AS:1 AS:2 AS:3 AS:4 Router

7 BGP table BGP  BGP is the core routing protocol in Internet  It works by maintaining a table of IP networks or 'prefixes' which designate network reachability among autonomous systems (AS).  We find out the destination AS number by referring to the prefix Network Next Hop Metric LocPrf Weight Path *>i i *>i i *>i / i *>i / i reachable prefix (IP address) destination AS number

8 Flow-Data  is the collection of unidirectional packets which used in same application  is exported by router  include the information that source (destination) IP address, port number, number of packet, etc.  are enormous quantity, so we use sampling data The example of Flow Data (of Kyushu University)

9 Analysis method We propose that hierarchically building of database to enhance scalability I export Flow Data and BGP routing information maintained in server, and calculate AS number from Flow Data. I make database which include necessary data (AS number, port number, number of packets, etc..). I categorize database as country, area, and port number. I sort database and calculate correlation for each data which we want to see tendency. I refer to the categorized database, and visualize. I calculated the database and detect anomaly. analyzing traffic categorize visualize anomaly detection

10 Analysis method – BGP table and Flow Data I use the collecting BGP table exported from QGPOP and the collecting Flow Data exported from Kyushu University Flow Data  I analyze the sampled day’s data which is collected at 0-5 minutes in every hour Sampling rate is 10% KOREN SINET QGPOP Information communication network dedicated to academic research Korea Advanced Research Network BGP table IIJ Internet Initiative Japan Kyushu University Universities Research institutes Universities and research institutes Flow Data

11 Analysis method 1 Detailed Analysis and Categorize  I assign AS number to IP address with reference BGP table and Flow Data.  I categorize Flow Data as port number (communicative purpose), country, area information (Asia, Europe, etc.).  I analyze the distribution of the port number in each country. The distribution of port number may be nonbiased in the countries which frequently accesses with illegal port number  illegal accesses use various (random) port number.

12 Time change of number of flows in Asia Almost of traffic flew with Japan, and number of flows in Japan is increasing for a year. This figure shows time change of number of flows of top 5 country in decreasing order of amount

13 Time change of number of flows in Asia This figure shows time change of number of flows of top 4 country in decreasing order of amount, except Japan. The number of flows in China is increasing for a year.

14 Analyzing distribution of port number I analyze the distribution of port number used with port 53 flows. I analyze the destination of port number accessed by the host which accessed the DNS server  The host is determined by the IP address on Flow Data port:53 port:?? port:XX DNS server host database port number well – known registratedprivate and dynamic 2007/ ・・・

15 The distribution of port 53 flows and port 25 flows 2007/01/04 ~ 02/22 every Wednesday’s Flow data (every one hours) Horizontal axis show the number of flows in port 25 Vertical axis show the number of flows in port 53 The number of port 53 flows is increasing with the number of port 25 flows (positive correlation)

16 Analysis method 2 Anomaly detection  We handle the database compiled from Flow Data We smooth the database to make data visualizing easier by adopting exponential smoothing method Flow Data have periodicity (daily, or weekly), so we use Holt-Winters method

17 Anomaly detection Data smoothing  When I analyze long term in Flow Data, I use Exponentially Weighted Moving Average (EWMA) method. applies weighting factors which decrease exponentially. The weighting for each older data point decreases exponentially  Flow Data have periodicity property, so we adopt Holt-Winters method in short term analysis. Holt-Winters method is expanded EWMA method for the periodicity data Y t+1 = a t + b t + c t+1-m Y i = α * Y i ( 1 - α ) * Y i - 1 a t = α( Y t + c t-m ) + ( 1 - α)( a t-1 + b t-1 ) b t = β( a t - a t ) + ( 1 - β) b t-1 c t = γ( Y t - a t ) + ( 1 - γ) c t-m

18 Anomaly detection I smooth Flow Data by using EWMA or Holt-Winters method, and calculate threshold.  When the value exceed the threshold, I consider this point as anomaly 0 time Number of flows 1 cycle (one day) anomaly high threshold level low threshold level threshold area

19 Visualization I develop the tool which detect anomaly and visualize  The tool should analyze only specific Flow Data which is selected by user (port number, country etc.) In Internet traffic, there are communication data which have large amount of packets, such as port 8000 (DVTS) We want to grasp the tendency not only All Flow Data but also the Flow Data restricted to certain country, AS or port number.  It should be versatile tool.

20 Conclusion and future work Implementation of analyzing Flow Data  The program that categorize Flow Data as country, AS number, and port number are completed  I will develop the program to find out the correlation between each port number. Anomaly detection and visualization  I smooth the Database made by analyzing program, and calculate the threshold and detect anomaly in Flow Data  I develop the tool to visualize not only all data and anomaly, but also the data which is selected by user.  I conduct verification experiment for Flow Data include electrical power failure.