-1- Wise* TrafView Wise * TrafView ETRI’s Content-aware Internet Application Traffic Measurement and Analysis System APAN Network Technology WS January.

Slides:



Advertisements
Similar presentations
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
Advertisements

Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
Protocols and the TCP/IP Suite
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Mid-Semester Presentation Spring 2005 Network Sniffer.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 9 Classification And Forwarding. Outline.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Sepehr Firewalls Sepehr Sadra Tehran Co. Ltd. Ali Shayan December 2008.
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
COEN 252 Computer Forensics
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Chapter 6: Packet Filtering
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Vladimír Smotlacha CESNET Full Packet Monitoring Sensors: Hardware and Software Challenges.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
William Stallings Data and Computer Communications
Wise* TrafView Flow-based Measurement and Analysis System Pipefilters BOF, TIP2004 Jan. 27, 2004 Hyungseok Chung ETRI.
Workpackage 3 New security algorithm design ICS-FORTH Ipswich 19 th December 2007.
CHAPTER 4 PROTOCOLS AND THE TCP/IP SUITE Acknowledgement: The Slides Were Provided By Cory Beard, William Stallings For Their Textbook “Wireless Communication.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
“OpenCALEA” Pragmatic Cost Effective CALEA Compliance Manish Karir, Merit - Research and Development.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Per-Packet Record Export Proposal draft-kim-ipfix-ppr-00.txt Chang H. Kim, Taesang Choi {kimch,
Sven Ubik, Aleš Friedl CESNET TNC 2009, Malaga, Spain, 11 June 2009 Experience with passive monitoring deployment in GEANT2 network.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Computer Networking A Top-Down Approach Featuring the Internet Introduction Jaypee Institute of Information Technology.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Snort – IDS / IPS.
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
OSI Protocol Stack Given the post man exemple.
Computing Over Distance
Firewalls.
Computer Networking A Top-Down Approach Featuring the Internet
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Firewall Installation
Transport Layer Identification of P2P Traffic
Presentation transcript:

-1- Wise* TrafView Wise * TrafView ETRI’s Content-aware Internet Application Traffic Measurement and Analysis System APAN Network Technology WS January 29, 2004 IP Networking Technology Team, ETRI {jungsp, chunghs, choits,

-2- Wise* TrafView Contents ▣ Current Internet Application Traffic Characteristics ▣ Wise* TrafView : Our Approach ▣ Wise* TrafView : Implementation and Deployment Experiences ▣ Summary

-3- Wise* TrafView Measurement Application Areas ▣ Network Problem Determination and Analysis ▣ Traffic Report Generation ▣ Intrusion & Hacking Attack (e.g., DoS, DDoS) Detection ▣ Service Level Monitoring (SLM) ▣ Network Planning ▣ Usage-based Billing/Accounting (both between SPs and SP- and-Customer) ▣ Customer Relationship Management (CRM) ▣ Marketing

-4- Wise* TrafView 2. CURRENT INTERNET APPLICATION TRAFFIC CHARACTERISTICS

-5- Wise* TrafView Current Internet Traffic Characteristics ▣ High-speed networks (Mbps  Gbps  Tbps) ▣ High-volume traffic ▣ Variety of Applications ◈ Streaming media (Windows Media, Real Media, Quicktime) ◈ P2P traffic ◈ Network Games ◈ Network Security Attacks ◈ Etc.

-6- Wise* TrafView Application Recognition(1) ▣ Limitations of port-based recognition ◈ The port database maintained by IANA doesn’t reflect the real-world situation –Most newer applications simply do not register their ports –Sometimes they even invade well-known port area to pass thorough firewalls ◈ Most bandwidth hogs, nowadays, dynamically allocate ports –They are not linked up with any fixed ports!

-7- Wise* TrafView Port/Application Port-based Accounting Contents-aware Accounting 80/HTTP67 GB 59.1 GB (11.8% reduced) 21/FTP_CTRL0.29 GB0.28 GB 20/FTP_DATA43 GB42 GB ?/FTP_DATA_PASSIVEn/a 6 GB (14.3% of FTP_DATA, 2% of the total volume) 5003/?692 MB HTTP: 13.2 MB BUGS_MUSIC: MB EDONKEY: MB etc.: 85.7 MB PosTech Traffic Breakdown - PosTech Campus Network (24h sum in May, 304GB total volume) Application Recognition(2) : Trend in Internet Application Traffic Characteristics

-8- Wise* TrafView Application Recognition(3) ▣ Many applications require to be identified by payload inspection ▣ Why is payload inspection necessary? ◈ Several applications can use the same port number ◈ Identification error can be occurred by ephemeral port number ◈ Some applications can use a dynamic port number ◈ Etc.

-9- Wise* TrafView ▣ Application example : Passive FTP Application Recognition(4) client.1302 server.21 (FTP_CTRL_REQ) server.21 (FTP_CTRL_REP) client.1302 client.1303 server.20 (FTP_DATA_DOWN) server.20 (FTP_DATA_UP) server (FTP_DATA_PSV_UP) client.1306 server (FTP_DATA_PSV_DOWN) % ls % passive % get wmggw.mp3 % quit % ftp server 49152

-10- Wise* TrafView Why Port-based Approach is not enough? ▣ Non-flow based measurement ◈ Not enough for the above requirements ▣ Typical Flow-based Measurement (like NetFlow TM, cflowd, LFAP) ◈ Typically a flow is defined as a set of packets passing an observation point in the network during a certain time interval and having a set of common properties ◈ 5-tuple packet header fields are used for this ◈ New applications such as P2P, streaming and network games have characteristics of dynamic port allocation ▣ More Detailed Analysis is needed!! ◈ Typical Flow-based Measurement is not enough ◈ Need more detailed analysis depending on applications –It may require content filtering

-11- Wise* TrafView 3. Wise* TrafView : OUR APPROACH

-12- Wise* TrafView Motivation ▣ Develop precise Internet application traffic measurement and analysis system ◈ Precise application analysis ◈ Passive flow-based measurement ◈ Sub-transaction(flow) level detailed application analysis ◈ Pseudo-realtime analysis ◈ No loss capture and analysis ◈ No sampling but capturing all ◈ For various Internet measurement purposes

-13- Wise* TrafView Flow Concept ▣ A “flow” is ◈ a sequence of packets whose are all identical ▣ Why flow? ◈ The size of entire raw packet streams for a given unit time are prohibitively enormous to be analyzed in time ◈ Each individual packets in a flow contain duplicate information ◈ Packets in the same flow are correlated; we can identify more packets which were previously categorized as unknown application a packet a distinctive signature of application “X” a flow generated by application “X” Now, these pkts can also be identified as “X”

-14- Wise* TrafView Internet Application Classification ▣ Type S: Simple Application Type ◈ for an application which uses a well-known port number or which uses a registered port number but is popularly used ◈ Applications : WWW, FTP, SMTP, BGP, etc. ▣ Type P: Payload Application Type ◈ for an application which uses a registered port number but requires payload inspections for precise classification ◈ Applications : HTTP_ALT(8080,8081,9000), MSNMessenger( ), KAZZA(1214), … ▣ Type R: Reverse Application Type ◈ for an application which uses a registered but requires comparison with a correlated reverse flow for the precise classification ◈ Applications : eDonkey down, WINMX down, GuruGuru BBS(9999)… ▣ Type C: Co-related Application Type ◈ for an application which uses a dynamic port number assignment ◈ Applications : Passive FTP, RTSP, Windows Streaming, …

-15- Wise* TrafView Capture Agent Analysis Server Database GUI... NIC IPCAP Card... NIC IPCAP Card splitter flow and packet records (NFS) recognition and analysis results (ODBC) ARCL Config-File... System Architecture Overview

-16- Wise* TrafView Agent : Generating Flow & Packet Records ▣ Carries on simple filtering and signature matching functions ▣ Generates flow records & packet records ◈ Flow record –For flow information –Fields : IP addr, port, protocol, flow duration, packets, bytes, … ◈ Packet record –for individual packet –Fields : timestamp, TOS, TTL, TCP flags, payload, … –Important for analysis server’s precise application identification ◈ This procedure aggregates and organizes the traffic information and reduces the amount of traffic volume transferred to the server

-17- Wise* TrafView Analysis Server : Enhanced Application Recognition ▣ Wise* TrafView utilizes some enhanced proprietary recognition mechanisms in a comprehensive way ◈ Application specific signature matching, ◈ temporal and spatial flow correlation, ◈ dynamic port recognition and utilization, and ◈ some heuristics ▣ Not only capable of discriminating applications, but also their sub-flows ◈ e.g., HTTP  HTTP_REQ, HTTP_REP, HTTP_REQACK, etc.

-18- Wise* TrafView Analysis Server : AS and Country Mapping ▣ Identifying flow sources and destinations ◈ Both source and destination IP address of a flow are mapped to ASes and finally to country codes ◈ This helps to locate the source and the sink of a flow –enables discrimination among transit, inbound, and outbound traffic flows

-19- Wise* TrafView Application Recognition Configuration Language (ARCL) ▣ Configurability and Adaptability ▣ Why adaptability so important? ◈ The highly frequent nature of Internet applications’ appearance and disappearance ◈ Swift mutation of applications ◈ Localization of the use patterns of applications ▣ Wise* TrafView copes with the problem by introducing ARCL (Application Recognition Configuration Language) ▣ By taking advantage of ARCL, Wise* TrafView ◈ doesn’t need to be re-built or re-installed by any module for extending or modifying recognition coverage; editing the configuration in ARCL and re-enforcing suffices

-20- Wise* TrafView Config-file by ARCL application WWW { port_rep_name HTTP port 80 protocol TCP{ // S type decision_group HTTP_REQ_REP_ACK { src_port >= 1024 dst_port == 80 } decision_group HTTP_REP_REQ_ACK { src_port == 80 dst_port >= 1024 } port_rep_name HTTP_ALT port 8080 protocol TCP{ // P type src_disc_pattern=="HTTP" in pkt 0-2 at byte ( dst_disc_pattern=="GET" in pkt 0-3 at byte || dst_disc_pattern=="POST" in pkt 0-3 at byte ) decision_group HTTP_ALT_REQ_REP_ACK { src_port >= 1024 dst_port == 8080 } decision_group HTTP_ALT_REP_REQ_ACK { src_port == 8080 dst_port >= 1024 } application EDONKEY { // R type port_rep_name EDONKEY_DOWN port 4662 protocol TCP{ dst_disc_pattern=="0xe33d000000" in pkt 2-3 at byte decision_group EDONKEY_DOWN_REQ_REP_ACK { src_port >= 1024 dst_port == 4662 ~ 4666 || 4242 || 4224 || 4660 || 5555 } decision_group EDONKEY_DOWN_REP_REQ_ACK { src_port == 4662 ~ 4666 || 4242 || 4224 || 4660 || 5555 dst_port >= 1024 } …… } application FTP { // C type port_rep_name FTP port 21 protocol TCP{ src_ref_pattern=="r/227 Entering Passive Mode \(\d{1,3},\d{1,3},\d{1,3},\d{1,3},(\d{1,4}),(\d{1,4})\)/$src_port = atoi($1)* atoi($2)" in pkt any at byte 0-35 induce FTP_DOWN_P decision_group FTP_REQ_REP_ACK { src_port >= 1024 dst_port == 21 } decision_group FTP_REP_REQ_ACK { src_port == 21 dst_port >= 1024 }

-21- Wise* TrafView 4. Wise* TrafView : IMPLEMENTATION & DEPLOYMENT EXPERIENCES

-22- Wise* TrafView Deployment Experiences ▣ ETRINet ◈ Link speed : 100Mbps FastEthernet, using libpcap ◈ Traffic volume : 70Mbps ◈ Period : May 2003 – Current ◈ Analysis result : S(52.83%), P(9.99%), R(2.38%), C(4.92%), Unknown(28.88%) ▣ Postech ◈ Link speed : 1Gbps Ethernet, using libpcap ◈ Traffic Volume : 60 – 70Mbps ◈ Period : May 2003(1week) ▣ Univ. of Andong ◈ Link speed : FastEthernet, using capturing card developed by ETRI ◈ Traffic volume : 60-70Mbps ◈ Period : Oct Current ▣ Other experiences ◈ Deployment on the International link of one of Korean Internet Exchange point using OC-3 POS card developed by ETRI

-23- Wise* TrafView Port/Application Port-based Accounting (A) Contents-aware Accounting (B) Accuracy (A/B) 80/HTTP67 GB 59.1 GB (11.8% reduced) 0.882/1.0 21/FTP_CTRL0.29 GB0.28 GB0.965/1.0 20/FTP_DATA43 GB42 GB0.977/1.0 ?/FTP_DATA_PAS SIVE n/a 6 GB (14.3% of FTP_DATA, 2% of the total volume) 0.0/ /?692 MB HTTP: 13.2 MB0.0/1.0 BUGS_MUSIC: MB0.0/1.0 EDONKEY: MB0.0/1.0 etc.: 85.7 MB0.0/1.0 - PosTech Campus Network (24h sum in May, 304GB total volume) PosTech Traffic Analysis Result

-24- Wise* TrafView ▣ Hardware ◈ For lower speed links (<= 622Mbps) –Capture agent –high performance PC: Zeon 2.4GHz * 2 + CPU, 2GB+ RAM –Analysis server –high performance PC: Zeon 2.8GHz * 2 + CPU, 1GB+ RAM, 100GB+ HDD ◈ For Higher speed links ( > 1 Gbps, under developing) –Clustered capture system –Hardwired logic for supporting wire-speed processing ▣ Software ◈ Capture agent –Linux ◈ Analysis server –Linux, MySQL System Spec.(1)

-25- Wise* TrafView System Spec.(2) ▣ Link Signal Splitters ◈ Electrical –Ethernet tap, DS-3 tap, etc. ◈ Optical –ordinary optical splitter –independent of physical and data-link layer protocols ▣ High Performance Packet Capture Cards ◈ Model A: for lower speed links –Ethernet, FastEthernet, DS-3/(E3) ◈ Model B: for middle speed links –ATM at OC-3, and POS at OC-3, OC-12 (622Mbps)

-26- Wise* TrafView User Interface ▣ Web-based Interface ◈ simple ◈ easy to use ◈ intuitive ◈ portable ▣ A web site for each measurement site can be easily established ◈ Autonomous authentication and authorization can be supported

-27- Wise* TrafView GUI (Traffic Report)

-28- Wise* TrafView

-29- Wise* TrafView GUI (Traffic Matrix)

-30- Wise* TrafView 5. SUMMARY

-31- Wise* TrafView The Merits of Wise* TrafView ▣ Transparent Packet Capture ◈ Complete independence of the existing networking equipment ▣ Flow-based Measurement and Analysis ◈ Reduced load ◈ Higher degree of recognition ▣ Understanding Application Specific Contexts ◈ By means of enhanced application recognition algorithms, sub-flows can be detected ▣ Scalable ◈ Can scale up from tens of Mbps to Gbps ◈ Supports various physical and data-link layer technologies ▣ Highly Extensible and Adaptable ◈ Easy configuration with ARCL

-32- Wise* TrafView Thank you! Q&A Contact: