Download presentation
Presentation is loading. Please wait.
Published byStewart Hines Modified over 9 years ago
1
Is Sampled Data Sufficient for Anomaly Detection Ip Wing Chung Peter (05133660) Ngan Sze Chung (05928650)
2
Abstract Traffic Measurement in Network is important Network management Anomaly detection for security analysis Detect all packet trace? The most accurate Consume network resources Affect normal traffic Router ARouter B Monitor Sampling a point-to-point link
3
Abstract Sampling Technique Conserve network resources How many samples? Sampling techniques vs Anomalies detection algorithm
4
Abstract Introduction Background and Methods Impact of Sampling on Volume Anomaly Detection Impact of Sampling on Portscan Detection Conclusion and Future Work
5
Introduction Aim To study the impact of sampling on anomaly detection Objective To study 4 existing sampling techniques To study 3 common anomaly detection algorithm To simulate the result by inputting the sampled data to detect the anomalies To evaluate the impact of sampling on anomaly detection algorithm
6
Background and Methods Sampling Volume Anomaly Detection Portscan Detection Trace Data Methodology
7
Sampling Random packet sampling Sample a packet with a small probability r < 1 Classify sampled packets into flows based on source/destination, IP/port, protocol Flow terminated by timeout (1 min), or explicit TCP semantics (FIN)
8
Sampling Random packet sampling Simple to implement Low CPU power and memory requirement Inaccurate for flow statistic
9
Sampling Random flow sampling Sample a flow with a small probability p < 1 Improve accuracy for flow statistic Classifies packet into flows first Prohibitive memory and CPU power
10
Sampling Smart sampling Sample a flow of size x with a probability p(x) Determined by threshold z (e.g. z = 40000) Bias towards large flows Flow 1, 40 bytes Flow 2, 15580 bytes Flow 3, 8196 bytes Flow 4, 5350789 bytes Flow 5, 532 bytes Flow 6, 4000 bytes sample with 100% probability sample with 0.1% probability sample with 10% probability Where z is a threshold that trades off accuracy
11
Sampling Sample-and-hold (S&H)
12
Sampling Sample-and-hold (S&H) Flow table lookup If found, flow entry gets updated by all the subsequent packets once it is created in S&H table If not found, flow entry created with a probability p (e.g. p = 1/3 on previous case) Sampling biased toward “elephant” flows
13
Volume Anomaly Detection Detect Network traffic anomalies (e.g. DoS attack) Abrupt changes in packet or flow count measurements Induces volume anomalies Discrete wavelet transform (DWT) based detection Proved to be effective at detecting volume anomalies
14
DWT-Based Detection Applies wavelet decomposition on packet or flow time series Detect volume change at various time scale 3 steps Decomposition Re-synthesis Detection
15
DWT-Based Detection Decomposition Decompose original signal to identify changes DWT calculate wavelet coefficient high pass filter low pass filter original signal
16
DWT-Based Detection Re-synthesis Aggregated into high, mid and low bands Low-band signal slow-varying trends High-band signal highlight sudden variations Mid-band sum of the rest
17
DWT-Based Detection Detection Compute variance of high and mid-band signals over a time interval Deviation score = If deviation score is higher than a predefined threshold are marked as volume anomalies local variance global variance
18
Portscan Dectection 2 online portscan detection techniques Threshold Random Walk (TRW) Time Access Pattern Scheme (TAPS)
19
Threshold Random Walk (TRW) 2 Hypothesis H 0 : a source is a “normal” host H 1 : a source is a scanner Rationale: A normal host is far more likely to have successful connection than a scanner which randomly probes address space.
20
Threshold Random Walk (TRW) Hypotheses testing on sequence of events To determine which hypothesis is more likely let Y = {Y 1, Y 2,..., Y i } represent the random vector of connections observed from a source, where Y i = 0 if the i th connection is successful and Y i = 1 otherwise
21
Threshold Random Walk (TRW) Likelihood Ratio: When the Likelihood Ratio crosses either one of two predefined thresholds, the corresponding hypothesis is selected as the most likely. requires ~6 observed events to detect scanners successfully
22
Threshold Random Walk (TRW) TRWSYN - backbone adaptation of TRW Backbone traffic usually uni-directional Difficult to predict “failed” / “succeeded” connection TRWSYN oracle: Marks single SYN-packet flows as failed connection Detect TCP portscan ONLY
23
Time Access Pattern Scheme (TAPS) Access Pattern Observation:Scanner initiates connections to a larger spread of destination IP addresses (horizontal scan) port numbers (vertical scan) That means, ratio γ between distinct IP addresses and port number is larger for scanner.
24
Time Access Pattern Scheme (TAPS) Hypotheses test, similar to TRW. Single packet flow failed connection Each time bin (say i), for each source, compute ratio γ, compare with predefine threshold k. Event variable Yi = 0 if γ<k 1 if γ>=k Update Likelihood Ratio
25
Trace Data 2 Links in Tier-1 ISP’s Backbone network 2 OC-48 links between backbone routers on West Coast and East Coast BB-West: Large percentage of scanning traffic BB-East: Large Volume Collected by IPMON
26
Methodology 4 sampling schemes use different parameters Require common metric for fair comparison We choose: Different in: Memory requirement CPU utilization Percentage of sampled flows
27
Methodology Note: Although fixed percentage of sampled flows Smart sampling & Sample-and-Hold bias towards Large flows
28
Impact of Sampling on Volume Anomaly Detection Volume Anomaly Detection Result Feature Variation Due to Sampling
29
Detection from the original trace
30
Total 21 abrupt changes from original trace No. of detection ↓ as sampling interval ↑ Random flow sampling performs the best Smart sampling & Sample-and-hold drops much faster No false positive in detection
31
Feature Variation Due to Sampling Difference in performance on detection Most volume spikes caused by a sudden increase in small packet flows Random flow sampling is unbiased by flow size Others are biased by large flows Smart sampling and Sample-and-hold designed to track heavy hitters Poor performance compare to packet sampling
32
Feature Variation Due to Sampling No false positives Simply, spike in samples must have existed in the original trace Not an artifact of sampling Sampling only ↓ no. of detection and not cause any false detection
33
Feature Variation Due to Sampling No. of detection ↓ as sampling interval ↑ even in random flow sampling Technique based on no. of sampled event and local variance Hypothesize sampling introduces distortion in variance Success Fail
34
Feature Variation Due to Sampling Sampling introduce distortion in variance Sampling scale down original time series by a fraction of p Assume variance = and average rate = New scaled-down variance Sampling involves removal of discrete point i.e. Sample original point process binomially Total variance Binomial random var.
35
Feature Variation Due to Sampling Total variance removal of discrete pt. scaled-down variance > 70% when N = 500 Affect Detection !
36
Impact of Sampling on Portscan Dectection Metrics Desirable to have HIGH R s and LOW R f+ Focus on Success and False Positive Ratio (because R s +R f- =1)
37
Impact of Sampling on Portscan Dectection Challenge: Determine true scanners Final list of scanners manually generated by Sridharan (in Impact of Packet Sampling on Portscan Detection) as the ground truth Less interested in absolute accuracy Relative performance as a function of sampling scheme and sampling rate
38
TRWSYN under Sampling R s and R f+ ratios for the BB-West trace as functions of effective sampling interval for all four sampling schemes
39
TRWSYN under Sampling Random Packet Sampling As base case for comparison Success Ratio R s Initially increases slightly for small N (seems advantageous) Drop off for Large N
40
TRWSYN under Sampling False Positive Ratio R f+ Follows similar behaviour as Rs but Larger scale Increases 3 times when N from 1 to 10 Random Packet Sampling As base case for comparison
41
TRWSYN under Sampling 2 key effects of packet sampling Flow-reduction Number of flows observed reduced Flow-shortening Multi-packet flows reduced to single packet flows Recall: TRWSYN algorithm Single SYN packet flow connection failure potential scanner
42
TRWSYN under Sampling Small sampling interval Flow-reduction slight impact High R s Flow-shortening substantial impact ↑single packet flow Impact: Scanners’ multi-packet flows initially missed shortened Detected Increase R s Regular multi-packet flows shortened “Detected” Increase R f+
43
TRWSYN under Sampling Large sampling interval Flow-reduction dominates Fewer decisions (detections) R s and R f+ decrease
44
TRWSYN under Sampling 3 Flow sampling schemes Decision based on entire flow No Flow-shortening Flow- Reduction dominates the impact Exception: Sample-and-Hold Mid-Flow-Shortening Decision only made on SYN packet flows Introduce NO False Positive
45
TRWSYN under Sampling Both R s and R f+ decrease almost monotonically as N increases R f+ lower than packet sampling
46
TRWSYN under Sampling In terms of R f+ Flow sampling >> Packet sampling In terms of Rs, Random Flow Sampling > Random Packet Sampling > Smart Sampling > Sample-and- Hold Cause: Bias towards Large Flows Suffer more from Flow-reduction
47
TAPS under Sampling Critical parameter: Time Bin For each sampling scheme, each sampling rate, Use Optimal Time Bin Maximize R s Increasing function of sampling interval True for both Packet sampling and Flow sampling schemes
48
TAPS under Sampling Results of portscan detection with TAPS for Trace BB-West
49
TAPS under Sampling R s decreases as sampling interval increases Random Flow Sampling performs the best Random Packet Sampling performs as well as the remaining 2 Flow sampling schemes Cause: Bias towards Large Flows Tend to miss small (critical) flows
50
TAPS under Sampling Random Packet Sampling R f+ intially increases due to Flow-shortening Then drop off at large sampling interval due to Flow-reduction Flow Sampling schemes No/Minor Flow-shortening Low R f+ Monotonically decreases with sampling interval
51
TAPS under Sampling TAPS uses address range distribution for detection Insensitive to the 4 schemes No distortion introduced Low R f+ e.g. Random Packet Sampling yields 1/10 of R f+ by TRWSYN
52
Conclusion Random Flow Sampling Performs the best Prohibitive resource requirement Random Packet Sampling Suffers from Flow-shortening Smart Sampling & Sample-and-Hold Bias towards large flows Perform poorer than Random Packet Sampling in volume anomaly detection
53
Conclusion All 4 sampling schemes Degrade all 3 anomaly detection algorithms In terms of R s and R f+ Sampled Data Sufficient for Anomaly Detection? Remains an Open Question
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.