CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Intrusion Detection System(IDS) Overview Manglers Gopal Paliwal Gopal Paliwal Roshni Zawar Roshni Zawar SenthilRaja Velu SenthilRaja Velu Sreevathsa Sathyanarayana.
Anomaly Detection Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
School of Computer Science and Information Systems
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Dividing the Pizza An Advanced Traffic Billing System An Advanced Traffic Billing System Christopher Lawrence Burke The University of Queensland.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
Module 3: Designing IP Addressing. Module Overview Designing an IPv4 Addressing Scheme Designing DHCP Implementation Designing DHCP Configuration Options.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 8: Virtual LAN (VLAN)
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Detection and Prevention of SIP Flooding Attacks in Voice over IP Networks Jin Tang, Yu Cheng and Yong Hao Department of Electrical and Computer Engineering.
Chapter 5: Implementing Intrusion Prevention
Othman Othman M.M., Koji Okamura Kyushu University 1.
Module 7: Advanced Application and Web Filtering.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Network Security & Accounting
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Improving Network Management with Software Defined Network Group 5 : z Xuling Wu z Haipeng Jiang z Sichen Wu z Aparna Sanil.
ICS-FORTH WISDOM Workpackage 3: New security algorithm design FORTH-ICS Update and plans for the next six months Heraklion, 4 th June 2007.
Role Of Network IDS in Network Perimeter Defense.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
K. Salah1 Security Protocols in the Internet IPSec.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP & CERN OPENLAB an R&D Partnership.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
SIEM Rotem Mesika System security engineering
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Security Methods and Practice CET4884
Virtual LANs.
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Intrusion Prevention Systems
Transport Layer Identification of P2P Traffic
Presentation transcript:

CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN

Outline  Introduction to CERN network  CINBAD project and its goals  Data - sources, collection and analysis  Results and conclusions 2

3 Simplified overall CERN campus network topology Numbers: Gb routers Gb ports 2’200+switches 50’000active user devices 70’0001Gb user ports 140 GbpsWAN connectivity 4.8 TbpsLCG Core

CINBAD codename deciphered C ERN I nvestigation of N etwork B ehaviour and A nomaly D etection Project Goal “To understand the behaviour of large computer networks (10’000+ nodes) in High Performance Computing or large Campus installations to be able to:  Detect traffic anomalies in the system  Be able to perform trend analysis  Automatically take counter measures  Provide post-mortem analysis facilities “

What is anomaly? (1)  Anomalies are a fact in computer networks  Anomaly definition is very domain specific:  But there is a common denominator:  “Anomaly is a deviation of the system from the normal (expected) behaviour (baseline)”  “Normal behaviour (baseline) is not stationary and is not always easy to define”  “Anomalies are not necessarily easy to detect” 5 Network faultsMalicious attacksViruses/worms Misconfiguration……

What is anomaly? (2)  Just a few examples of anomalies:  The network infrastructure misuse unauthorised DHCP/DNS server (either malicious or accidental) network scans worms and viruses  Violation of a local network/security policy NAT, TOR usage (not allowed at CERN) 6

CINBAD project principle data sources collectors storage analysis

sFlow – main data source  Based on packet sampling (RFC 3176)  on average 1-out-of-N packet is sampled by an agent and sent to a collector packet header and payload included (max 128 bytes) –switching/routing/transport protocol information –application protocol data (e.g. http, dns)  SNMP counters included  low CPU/memory requirements – scalable  For more details, see our technical report 8

sFlow data usage  Typically: traffic accounting (e.g. for billing, network planning, SLA etc.)  Useful for post-mortem network analysis  CERN-wide network tcpdump access to the whole CERN sampled network traffic information where and when the traffic has been seen particularly useful in detecting packets ‘that should not be there’ (policy violation)  Rare examples of sflow usage for anomaly detection 9

Other data sources  Packet sampling data is not enough!  Data is partial, cannot provide 100% accuracy  Not always easy to identify the anomaly  More data to understand flow of data in the network  External sources provide useful information and time triggers  Correlation between various data sources  Example:  Central Antivirus Service at CERN 10

CINBAD sFlow data collection Current collection based on traffic from ~1000 switches ~6000 sampled packets per second ~ 3500 snmp counter sets per second

Multistage data storage  Stage 1  sFlow datagram tree-like format unpacked into CINBAD file format to enable fast direct access  Minimal space overhead introduced  Stage 2  Oracle DB as a long-term storage  data aggregation tradeoff between sFlow randomness and space, data lifetime and anomaly detection requirements –e.g. number of destination IPs for a given source IP 12

Data analysis  Various approaches are being investigated  Statistical analysis methods detect a change from “normal network behaviour” –selection of suitable metrics is needed can detect new, unknown anomalies poor anomaly type identification  Signature based we ported SNORT to work with sampled data performs well against know problems tends to have low false positive rate does not work against unknown anomalies 13

Synergy from both detection techniques 14 Sample-based SNORT evaluation engine Rules Translation Statistical Analysis engine Traffic Profiles Anomaly Alerts Incoming sflow stream New baselines New Signatures

Current results  Campus and Internet traffic analysis  Identified anomalies which went undetected by the central CERN IDS  Detected number of misbehaviors both statistical and pattern matching approaches used TOR, DNS abuse, Trojans, worms, network scans, p2p applications, rogue DHCP servers, etc.  Findings reported to the CERN security team  Security team adapted their policies 15

Achievements and next steps  It has been demonstrated that pattern matching for anomaly detection is possible with sflow data  Payload data is a key advantage of sflow  sflow allows distributed detection at the edge of the network  Combining statistical analysis with pattern matching is providing encouraging initial results  Integration of the two mechanisms holds promise for zero-day detection 16