Network Traffic Characterization using Energy TF Distributions

Similar documents
Dimitrios P. Pezaros Department of Computer Science University of Glasgow Glasgow, UK David Hutchison

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Network Traffic Classification under Time-Frequency Distribution

An apparatus for P2P classification in Netflow traces

Address Resolution Protocol (ARP)

modeling Network Traffic

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent

Keywords Attack model, DDoS, Host Scan, Port Scan

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Classifying P2P Activities in Netflow Records: A Case Study (BitTorrnet & Skype) Ahmed Bashir

IP address format: Dotted decimal notation:

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

How is SUNET really used?

Analysis of Communication Patterns in Network Flows to Discover Application Intent

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Detecting Network Anomalies. Anant Shah

Statistical Protocol IDentification with SPID: Preliminary Results

Traffic Classification with Sampled NetFlow

KEITH LEHNERT AND ERIC FRIEDRICH

Computer Networks and the Internet

Malware Analysis in Cloud Computing: Network and System Characteristics

Cisco IOS Flexible NetFlow Technology

Protocols. Packets. What's in an IP packet

A Multilevel Approach Towards Challenge Detection in Cloud Computing

Research on Errors of Utilized Bandwidth Measured by NetFlow

MULTI-LEVEL NETWORK RESILIENCE: TRAFFIC ANALYSIS, ANOMALY DETECTION AND SIMULATION

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Encrypted Internet Traffic Classification Method based on Host Behavior

Monitoring of Internet traffic and applications

Network congestion control using NetFlow

Transport and Network Layer

Short-time FFT, Multi-taper analysis & Filtering in SPM12

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Time Series Analysis of Network Traffic

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic

CISC 1600 Introduction to Multi-media Computing

CSE 473s Introduction to Computer Networks

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Overview of Computer Networks

How To Block A Ddos Attack On A Network With A Firewall

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

CMPSCI 453 Computer Networking. Professor V. Arun Department of Computer Science University of Massachusetts Amherst

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

Two State Intrusion Detection System Against DDos Attack in Wireless Network

4 Internet QoS Management

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

An Aggregation Technique for Traffic Monitoring. Kenjiro Cho, Ryo Kaizaki, and Akira Kato

TRACING OF VOIP TRAFFIC IN THE RAPID FLOW INTERNET BACKBONE

Internet Infrastructure Measurement: Challenges and Tools

A Preliminary Performance Comparison of Two Feature Sets for Encrypted Traffic Classification

Internet Traffic Measurement

Hadoop Technology for Flow Analysis of the Internet Traffic

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Burst (of packets) and Burstiness

Computer Networks & Security 2014/2015

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Distributed monitoring of IP-availability

Network TrafficBehaviorAnalysisby Decomposition into Control and Data Planes

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Identification of Network Applications based on Machine Learning Techniques

HTTPS Traffic Classification

Network Performance Monitoring at Small Time Scales

Network Traffic Invariant Characteristics:Metering Aspects

Network Traffic Classification and Demand Prediction

Per-Flow Queuing Allot's Approach to Bandwidth Management

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Towards Streaming Media Traffic Monitoring and Analysis. Hun-Jeong Kang, Hong-Taek Ju, Myung-Sup Kim and James W. Hong. DP&NM Lab.

Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks

The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands

Obfuscation of sensitive data in network flows 1

IDENTIFYING NETWORK LOAD BALANCING REQUIREMENTS ON HISTORICAL TRAFFIC FLOW USING MACHINE LEARNING APPROACH FOR FLEXIBLE MULTIPATH NETWORKS

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Analysis of IP Network for different Quality of Service

z/os V1R11 Communications Server system management and monitoring

Improving Quality of Service

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Traffic Analysis of Mobile Broadband Networks

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Internet Performance

and reporting Slavko Gajin

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Analysis of Network Packets. C DAC Bangalore Electronics City

SNMP Simple Network Measurements Please!

CSE 3214: Computer Network Protocols and Applications

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Network Simulation Traffic, Paths and Impairment

What TCP/IP Protocol Headers Can Tell Us About the Web

Signal Processing Methods for Denial of Service Attack Detection

The Usage Analysis of Web and Traffic on the University Internet Backbone Links

Networking Basics and Network Security

Classifying Service Flows in the Encrypted Skype Traffic

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

How To Classify Network Traffic In Real Time

Transcription:

Network Traffic Characterization using Energy TF Distributions Angelos K. Marnerides a.marnerides@comp.lancs.ac.uk Collaborators: David Hutchison - Lancaster University Dimitrios P. Pezaros - University of Glasgow Hyun-chul Kim -Seoul National University

Motivation Outline Approach Data & Features Results Summary On-going & Future Work

Importance of Traffic Characterization & Classification Weakness of manual inspection by NOCs Pre-requisite for understanding the fluctuant network behavior Foundational element for Traffic Engineering (TE) tasks: - cost optimization,efficient routing, congestion management, availability, resilience, anomaly detection, traffic classification etc.. Application-based traffic Classification : a necessity - net neutrality debate, ISPs vs. Content providers - emergence of new applications, attacks etc.. - file sharing vs. intellectual property representatives

Motivation Traffic modeling assumptions not thoroughly investigated - Stationarity? Rapid growth of new Internet technologies and applications. Essence for new and adaptive traffic classification features.

Approach Volume-based analysis on real pre-captured network traces for characterizing the traffic s dynamics. Validation of stationarity under TF representations - Instantaneous frequency and group delay for stationarity. Volume decomposition for revealing protocol-specific dynamics and classify the volume-wise utilization (#bytes and #pkts) of the transport layer. Provision of application-layer characteristics based on the level of signal complexity using the Cohen-based Energy TF Distributions.

Data & Features 2 30min full pcap traces from a Gb Ethernet Link at Keio University, Japan (Keio-I, Keio-II) - extracted # of bytes & pkts for each unidirectional flow for TCP,UDP, ICMP Hour-long full pcap trace from a US-JP link (WIDE) 100 Mbps FastEthernet link (SamplePoint B MAWI Working group) - divided in 4, 13.75-min bins (WIDE-I,WIDE-II,WIDE- III,WIDE-IV) -employed the same feature extraction as in Keio-I/II

Data & Features (tables) * Kim et al. L., Internet traffic classification demystified: myths, caveats, and the best practices, ACM CoNEXT 2008

G (t) Computing a 1 d arg G a ( ) X G ( ) 2 d Stationarity Test A signal is stationary if the elements in its analytical form keep a constant instantaneous frequency and group delay respectively. Process g(t) (counts of bytes/packets), and after applying a Hilbert transformation and transform of G a (t) G a (t) F a ( ) its analytical form the Fourier 1 d arg Ga ( t) f ( t) Instantaneous Frequency 2 dt - f(t): amplitude of frequency we observe in 1 count of a packet/byte arrival at time t 1 d arg Fa ( ) tg( ) Group Delay 2 d - t G ( ): time distortion caused by the signal s instantaneous frequency

Stationarity analysis Validation of instantaneous frequency and group delay s behaviour in all datasets. Investigated stationarity on ithe original and differentiated traffic signal Conclusion : traffic in all traces is highly non-stationary and has the form of a multi-component signal (for all protocols).

Stationarity analysis (results) Before differentiation After 3 rd order differentiation

1 1 t, ) s *( t 2 2 j 1 WV ( ) e s ( t ) d 2 Traffic Classification with Cohenbased Energy TF distributions Suitable for characterizing highly non-stationary signals as the volume dynamics of the transport layer. - Overcome limitations by other techniques (e.g. STFT, Wavelets) on the TF plane with respect to TF localization and resolution Particularly used *: -Wigner-Ville (WV) Distribution -Smoothed Pseudo Wigner-Ville (SPWV) Distribution - Choi-Williams (CW) Distribution Employment of Renyi Dimension for determining signal complexity (i.e. volume-wise intensity) on the TF plane used as the classification discriminative feature Simple Decision tree-based classification using MATLAB s classification utility functions Definitions provided in : Cohen, L., Time-Frequency Distributions: A Review, Proc IEEE Signal Processing, Vol. 77, 1989

Classification Performance Metrics Accuracy per-trace Accuracy # correcty _ classified # total _ flows _ per _ flows _ trace Per-Application - Recall : How complete is an application fingerprint? Recall True_ True_ positives positives False _ negatives

Pre-processing for Traffic Classification Extensive port and host-behaviour-based approach Usage of graphlets from BLINC

Pre-processing for Traffic Classification (cont..) Keio-I : training set, Keio-II : test set Computation of each energy distribution for every application protocol individually based on the packet and byte-wise utilization of TCP & UDP. Comparison between distributions. Extraction of the Renyi Dimension for every application protocol from the selected TF distribution.

Comparison of energy TF distributions (example : Keio TCP bytes for MSN)

Results (example: Classification of TCP bytes for Keio trace - SPWV )

Results (cont) Overall Accuracy Keio trace : 95%(pkts) 93%(bytes) WIDE trace : 92% (pkts) 88% (bytes) Traffic Cat. Recall% (bytes) Recall% (pkts) WWW >=90.4% >=95.8% FTP >=94.5% >=97.3% P2P >=84.8% >=91.9% DNS >=95.6% >=98.6% Mail/News >=93.3% >=97.8% Streaming >=81.3% >=92.2% Net. Ops. >=96.8% >=94.1% Encryption >=95.3% >=89.8% Games >=89.3% >=93.9% Chat >=82.1% >=92.7% Attack >=78.9% >=88.6%

Summary Backbone and Edge network link traffic is highly non-stationary. Suitability of Energy TF distributions for general traffic profiling. Practical usability presented particularly in the area of traffic classification. Introduction of complexity-based traffic classification based on the 3 rd order Renyi Dimension. Packet-based analysis indicated higher accuracy.

On going &Future Work New network-oriented features (e.g. 5 tuple) New Energy TF metrics (e.g. 1 st, 2 nd sequence) order moment Employment of Support Vector Machines. Full, comparison with BLINC on larger datasets. Thank you