Taming Internet Traffic Some notes on modeling the wild nature of OD flows Augustin Soule Kavé Salamatian Antonio Nucci Nina Taft Univ. Paris VI Sprintlabs.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Routing System Stability draft-dimitri-grow-rss-01.txt IETF71 - Philadelphia.
Traffic Dynamics at a Commercial Backbone POP Nina Taft Sprint ATL Co-authors: Supratik Bhattacharyya, Jorjeta Jetcheva, Christophe Diot.
New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
Advanced Technology Laboratories Traffic Matrix Estimation in Non- Stationary Environments Presented by R. L. Cruz Department of Electrical & Computer.
Detecting DDoS Attacks on ISP Networks Ashwin Bharambe Carnegie Mellon University Joint work with: Aditya Akella, Mike Reiter and Srinivasan Seshan.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
1 BGP Anomaly Detection in an ISP Jian Wu (U. Michigan) Z. Morley Mao (U. Michigan) Jennifer Rexford (Princeton) Jia Wang (AT&T Labs)
1 EL736 Communications Networks II: Design and Algorithms Class8: Networks with Shortest-Path Routing Yong Liu 10/31/2007.
Infocom 2003 An Approach to Alleviate Link Overload as Observed on an IP Backbone Tuesday, April 1 st Infocom 2003 Sundar Iyer 1,2, Supratik Bhattacharrya.
1 Measurement of Highly Active Prefixes in BGP Ricardo V. Oliveira, Rafit Izhak-Ratzin, Beichuan Zhang, Lixia Zhang GLOBECOM’05.
Dynamic routing – QoS routing Other approaches to QoS routing Traffic Engineering Practical Traffic Engineering.
Trajectory Sampling for Direct Traffic Observation Matthias Grossglauser joint work with Nick Duffield AT&T Labs – Research.
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
Observed Structure of Addresses in IP Traffic CSCI 780, Fall 2005.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Traffic Engineering With Traditional IP Routing Protocols
Fernando Paganini ORT University, Uruguay (on leave from UCLA) Congestion control with adaptive multipath routing based on optimization Collaborator: Enrique.
Katz, Stoica F04 EECS 122: Introduction to Computer Networks Performance Modeling Computer Science Division Department of Electrical Engineering and Computer.
Network Protocols Designed for Optimizability Jennifer Rexford Princeton University
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
The Sprint IP Monitoring Project and Traffic Dynamics at a Backbone POP Supratik Bhattacharyya Sprint ATL
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Traffic Matrix Estimation: Existing Techniques and New Directions A. Medina (Sprint Labs, Boston University), N. Taft (Sprint Labs), K. Salamatian (University.
Measurement and Monitoring Nick Feamster Georgia Tech.
Network Monitoring for Internet Traffic Engineering Jennifer Rexford AT&T Labs – Research Florham Park, NJ 07932
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
EL 933 Final Project Presentation Combining Filtering and Statistical Methods for Anomaly Detection Augustin Soule Kav´e SalamatianNina Taft.
TRIP ASSIGNMENT.
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Traffic Matrix Estimation for Traffic Engineering Mehmet Umut Demircin.
On a New Internet Traffic Matrix (Completion) Problem
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
A Signal Analysis of Network Traffic Anomalies Paul Barford with Jeffery Kline, David Plonka, Amos Ron University of Wisconsin – Madison Summer, 2002.
A Calibration Procedure for Microscopic Traffic Simulation Lianyu Chu, University of California, Irvine Henry Liu, Utah State University Jun-Seok Oh, Western.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
Authors Renata Teixeira, Aman Shaikh and Jennifer Rexford(AT&T), Tim Griffin(Intel) Presenter : Farrukh Shahzad.
Shannon Lab 1AT&T – Research Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
Traffic Engineering for ISP Networks Jennifer Rexford Internet and Networking Systems AT&T Labs - Research; Florham Park, NJ
Using Measurement Data to Construct a Network-Wide View Jennifer Rexford AT&T Labs—Research Florham Park, NJ
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
Connect. Communicate. Collaborate Experiences with tools for network anomaly detection in the GÉANT2 core Maurizio Molina, DANTE COST TMA tech. Seminar.
Measurement and Modeling of Packet Loss in the Internet Maya Yajnik.
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
A Light-Weight Distributed Scheme for Detecting IP Prefix Hijacks in Real-Time Lusheng Ji†, Joint work with Changxi Zheng‡, Dan Pei†, Jia Wang†, Paul Francis‡
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
By, Matt Guidry Yashas Shankar.  Analyze BGP beacons which are announced and withdrawn, usually within two hour intervals.  The withdraws have an effect.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC.
Advanced Technology Laboratories 8 December 2000 page 1 Characterization of Traffic at a Backbone POP Nina Taft Supratik Bhattacharyya Jorjeta Jetcheva.
Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other.
The New Policy for Enterprise Networking Robert Bays Chief Scientist June 2002.
Error Modeling Thomas Herring Room ;
Development of a QoE Model Himadeepa Karlapudi 03/07/03.
1 CS 268: Lecture 14 Internet Measurements Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Network Anomography Yin Zhang Joint work with Zihui Ge, Albert Greenberg, Matthew Roughan Internet Measurement.
1 Effective Diagnosis of Routing Disruptions from End Systems Ying Zhang Z. Morley Mao Ming Zhang.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1 Monitoring: from research to operations Christophe Diot and the IP Sprintlabs ipmon.sprintlabs.com.
CSci5221: Intra-Domain Traffic Engineering 1 Intra-Domain Traffic Engineering Traffic Engineering (TE) – MPLS and traffic engineering (will go over very.
Constraint-Based Routing
Network and Services Management
Data collection methodology and NM paradigms
Impact of Packet Sampling on Anomaly Detection Metrics
Routing: Distance Vector Algorithm
Challenges in Network Troubleshooting In big scale networks, when an issue like latency or packet drops occur its very hard sometimes to pinpoint.
Latent Space Model for Road Networks to Predict Time-Varying Traffic
Dynamic Routing and OSPF
Presentation transcript:

Taming Internet Traffic Some notes on modeling the wild nature of OD flows Augustin Soule Kavé Salamatian Antonio Nucci Nina Taft Univ. Paris VI Sprintlabs Intel Berkeley

What’s next  Definition of the problem  Overview of the approach  Study of the modeling part  Study of the Tracking part

Network monitoring (1)  Network state results from  Traffic demand  OD matrix  Capacity offer  Routing matrix, link capacity, traffic engineering, etc…  Objective of the network operator  To drive the equilibrium point to the most beneficial  By managing the capacity offer  Traffic engineering is the art of managing capacity offer

Network monitoring (2)  Monitoring  Capacity offer  Pings, failure monitoring, SNMP reports  Traffic demand ?  Is not observable per se  At least in real time  Have to infer it indirectly  Traffic counts

Network monitoring (3)  Monitoring ?  Being able to separate  What is predicted  Expected, under control, normal, …  What is unpredicted  Unexpected, Out of range, abnormal, …  Occam razor view  Express what is predictable by a short model  Describe fully what is unpredictable  Interpretation view  Only what is unpredictable have to be given a sense  What is predictable give no information

Architecture of a network monitoring system

Overview of the solution  Model the normal behavior of traffic demand  At sufficient granularity level  Relevant granularity for operator ?  Compare observation with prediction made by model  Rise an alarm if a divergence is seen  Wow, I just rediscovered Kalman Filter!

What’s a traffic matrix?  Can define variety of matrices  Select timescale  Select node granularity: router, prefix, POP, etc.  Application wise ! City A City B City C City A City B City C origin destination 25 Mbps

Notation: Problem Formulation Link1 Link2 Link3. Link L = OD AB OD AC OD AD / routing matrix Y = A X Have linear system: YA X from SNMP link counts from IGP link weights issue: # links underconstrained system => infinite # of solutions

OD Traffic Dynamics (1)

OD traffic dynamics (2)  Temporal correlations  Diurnal, weekly, monthly, etc..  Spatial correlation  Same Origin Pop  Same destination PoP  Create a dynamic LTI model for OD flows capturing temporal and spatial dependences  X(t+1) = C*X(t)+W(t)  W(t) account for model unprecision

Traffic Model  State space model :  How to calibrate C, Q and R?  EM method  Find the value of C, Q and R such that the observations are most likely to be observed  Observations might be OD traffic itself or the link count  OD traffic is better, Sometimes no other choice   Good initial point are needed.  Use OD traffic first, link count next  Multi-linear Method  X(t+1) is expressed as a multi-linear relation of X(t)  Lead to a diagonal matrix Q

Raw data  Let’s suppose we have gathered over one day the full OD matrix  Sampled Aggregate NetFlow (Cisco) used on all routers inside Sprint’s European network.  Flow = 5-tuple src, port dst, proto)  Each flow is sampled every 250th packet.  Downloaded BGP tables and configuration files from all routers: Used to determine egress points within Sprint’s AS => yielding the FULL traffic matrix.  Three weeks of data from August  Many thanks to Anukool Lakhina to collect/process the raw data :)

Inside the model Impulse response of the filter At time t=1 OD 1 is set to 1 See the propagation of this impulse on all the other OD pairs  24 h Periodicity  Exponentially decreasing Sinusoid

Inside the model Radius : Amplitude of the eigenvalue Angle : Frequency of the eigenvalue Pole diagram  r

Inside the model Filtering the eigenvalues Filter out the over learning -Remove small timescale fluctuations -Remove Fast oscillations  Keep the White area

Kalman filtering  Filter out what is compatible with the model from what is incompatible  Do it by comparing what is predicted by the model with what is observed  Innovation process:  two steps  Prediction  Correction

Example of fitting

Monitoring information  Confidence interval can be made on innovation process  If then something out of prediction has happened  Raise an alarm !  Is every change a problem ?  Same approach for OD pairs  Ability to track changes on each OD  Might be useful for DDoS attack detection and management

Innovation on the link

Innovation on the OD Need to recalibrate the model For these OD pairs

Recalibration !  Need to find out the new model !  Several way  Do a netflow acquisition for all changing OD flows. Mix with previous OD flow. Recalibrate the model  Use traffic count for recalibrating the model using EM method with previous model as starting point  Develop a continuous time adaptive mechanism  Use LMS or RMS algorithm  Use a sliding windows

Example of fitting After recalibrations

Innovation After Recalibrations

L2-Norm over time

Contributions  New tracking approach for network monitoring  Using Time and Spatial correlation  OD flows model  Able to detect deviations from the model  Thanks to Kalman Filter  Really Fast and Scalable.  Whole process in less than 2 minutes for 14 days  Validated using real Traces.