Download presentation
Presentation is loading. Please wait.
1
Ourmon and Network Monitoring Performance Jim Binkley jrb@cs.pdx.edu Bart Massey bart@cs.pdx.edu Portland State University Computer Science
2
2 ourmon introduction ourmon is an open-source statistic gathering network monitoring system with some similarities/differences to traditional SNMP RMON II name is a take off on this (ourmon is not RMON) Linux ntop is somewhat similar, Cisco netflow, features different we deployed it in the PSU DMZ a number of years ago (2001) first emphasis on network stats how many packets, how much TCP vs UDP, etc. what the heck is going on out there? recent emphasis on detection of network anomalies post SQL slammer, Welchia worm, botnets
3
3 ourmon architectural overview a simple 2-system distributed architecture front-end probe computer – gather stats back-end graphics/report engine front-end depends on Ethernet switch port- mirroring like Snort does NOT use ASN.1/SNMP summarizes/condenses data for back-end intermediate data is ASCII cp summary file via out of band technique micro_httpd/wget, or scp, or rsync, or whatever
4
4 the Tao of ourmon more information less data summarization in probe OR back-end 2.5 G packets (more later) means you need to summarize no standards please other than probe talks to back-end graphics/report makers in a shared language probe and back-end always released together we can change our intermediate data for the next release new tuples of interest at any time
5
5 ourmon architectural breakdown probe box/FreeBSDgraphics box/BSD or linux ourmon.conf config file runtime: 1. N BPF expressions 2. + topn (hash table) of flows and other things (tuples or lists) 3. some hardwired C filters (scalars of interest) pkts from NIC/kernel BPF buffer mon.lite report file outputs: 1. RRDTOOL strip charts 2. histogram graphs 3. various ASCII reports, hourly summaries or report period tcpworm.txt etc. filters: BPF expressions, lists, some hardwired C filters
6
6 features N concurrent BPFs grouped into RRDTOOL graphs (about 80 expressions in DMZ now) say 3-6 related BPF expressions per RRD graph top-N tuples of various sorts: traditional flows including flow counts, key is flow ID top ports, key is TCP/UDP port (surprise) TCP syn tuple: key is IP src scanners/worms/P2P/IRC users, port report, tworm ICMP/UDP error tuple: key is IP src new IRC tuples (channels, per host stats) IP and port scanning
7
7 BPF filter set: - TCP control pkts question: does your network syn curve match your fin curve?
8
8 tworm filter - DDOS/botnet-related attack ip src: flags work sa/s dst/s dst port/% 24.205.*.* (20) WOR 100 0 30/30 [30108,100]
9
9 UDP error filter - attack on single PSU media server err… attack is so large suppressed all other bars to < 1 pixel
10
10 test setup for ourmon/bpf measurement ixia 1600 gE packet generator 1. min-sized pkts. 2 max-sized pkts 1.7 ghz AMD 2000 UNIX/FreeBSD 64-bit PCI/syskonnect + ourmon/packet tap ixia Packet Engines line-speed gigabit ethernet switch UNIX pc ixia sends/recvs packets port-mirror of IXIA send port
11
11 ixia vs ourmon test summary 1. 64 byte min packets bad; max large packets good on ~2Ghz PIV, with no real work start losing min pkts at 80 mbits. if you have real work (imagine snort with 1000’s of signatures) you may be 10 mbits 2. big packets need bigger kernel buffers, say 8 megabytes, not 4k bytes 3. actually dual box with NO software work is somewhat better
12
12 more ourmon information ourmon.cat.pdx.edu/ourmon - PSU stats and download page ourmon.cat.pdx.edu/ourmon/info.html - how it works (2 pages, 1 for current release and one for next release) current release is 2.4 next release will have more anomaly detection features including an automated trigger mechanism for pkt capture during “interesting” events (large attacks, UDP anomalies)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.