Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool



Similar documents
How To Protect Gante From Attack On A Network With A Network Security System

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Cisco IOS Flexible NetFlow Technology

Service Description DDoS Mitigation Service

The Value of Flow Data for Peering Decisions

A BRAINSTORMING ON SECURITY FIRE DRILLS

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

Passively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Security Toolsets for ISP Defense

Cisco Network Foundation Protection Overview

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

How Cisco IT Protects Against Distributed Denial of Service Attacks

How is SUNET really used?

Radware s Attack Mitigation Solution On-line Business Protection

Using Lancope StealthWatch for Information Security Monitoring

CISCO IOS NETFLOW AND SECURITY

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

TELCO challenge: Learning and managing the network behavior

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand

Distributed Denial of Service protection

DANCERT RFC2350 Description Date: Dissemination Level:

NSC E

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

with NetFlow Technology Adam Powers Chief Technology Officer

Report of Independent Auditors

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Secure Networks for Process Control

Who is Generating all This Traffic?

Take the NetFlow Challenge!

Firewall on Demand Multidomain

Flow Analysis Versus Packet Analysis. What Should You Choose?

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

Bridging the gap between COTS tool alerting and raw data analysis

Flow Based Traffic Analysis

DDoS Overview and Incident Response Guide. July 2014

Cheap and efficient anti-ddos solution

and reporting Slavko Gajin

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Comprehensive IP Traffic Monitoring with FTAS System

Using NetFlow for Anomaly Detection in Operational Networks

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

RAVEN, Network Security and Health for the Enterprise

PROFESSIONAL SECURITY SYSTEMS

MANAGED SECURITY SERVICES : IP AGNOSTIC DDOS AN IP AGNOSTIC APPROACH TO DISTRIBUTED DENIAL OF SERVICE DETECTION AND MITIGATION

Conclusions and Future Directions

Analysis of Network Packets. C DAC Bangalore Electronics City

An Elastic and Adaptive Anti-DDoS Architecture Based on Big Data Analysis and SDN for Operators

Introduction. The Inherent Unpredictability of IP Networks # $# #

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Network Security Monitoring and Behavior Analysis Best Practice Document

CALNET 3 Category 7 Network Based Management Security. Table of Contents

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

Introduction to Network Discovery and Identity

DDoS attacks in CESNET2

STEALTHWATCH MANAGEMENT CONSOLE

How To Create Situational Awareness

Infrastructure for active and passive measurements at 10Gbps and beyond

Breach Found. Did It Hurt?

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Gaining Operational Efficiencies with the Enterasys S-Series

DEFENSE NETWORK FAQS DATA SHEET

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Automatic Network Protection Scenarios Using NetFlow

Software-Defined Traffic Measurement with OpenSketch

Network Visibility Guide

DDoS Detection and Alerting

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

How To Protect Your Network From Attack From A Hacker On A University Server

NfSen Plugin Supporting The Virtual Network Monitoring

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Name. Description. Rationale

Network provider filter lab

Network Monitoring and Management NetFlow Overview

How To Block A Ddos Attack On A Network With A Firewall

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

NetFlow Tips and Tricks

Detecting peer-to-peer botnets

NetFlow Performance Analysis

How NOC manages and controls inter-domain traffic? 5 th tf-noc meeting, Dubrovnik nino.ciurleo@garr.it

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Transcription:

Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool Wayne Routly, Maurizio Molina - (DANTE) Ignasi Paredes-Oliva - Universitat Politècnica de Catalunya (UPC) Ashish Jain - (Guavus) TNC, Vilnius, 2 nd June 2010 1

Content Introduction: The network and the service scenario The Tools The benchmarking process Deployment and initial usage of the selected tool Some recent enhancements (Apriori) Network Security Service The Objectives The Service Details Current Status Event Workflow Conclusion 2

The Network Scenario. A Transit Network with Global Visibility Up to 60 Gbit/s in peak times +/- 10 Million Speaking Hosts Per Day Unusual research Traffic Large FTP Transfers SSH Traffic Grid Traffic Bandwidth Testing Traffic Mixed with ordinary Internet Traffic (e.g. DWS) 3

The Service Elements 1- Periodic Summary Reporting Observe global security anomalies trends at the GÉANT boundary What are the most common attack types? What the potentially more harmful? Are some Networks heavy security anomalies sources or targets? Why? Can something be done about it? 2- Punctual Anomaly Notification Specific events can be reported to NREN CERTs that the NREN may not have noted due to lack of monitoring or noted but lacking metadata for root cause analysis 4

Pre-requisite: anomaly detectability in GÉANT backbone Both service elements require anomaly detectability in the GÉANT backbone With Sampled NetFlow only => no dedicated probes! Already proved with NfSen plugins (Molina: TNC 08) Decision to look at commercial tools for: Support Quick evolution to detecting new threats Anomaly origin/destination analysis 5

The benchmarked tools Three Distinct Tools Netreflex Guavus Fuses BGP & ISIS Data Creates an 18 x 18 Router Matrix Peakflow SP Arbor Uses BGP & SNMP Data Originally designed to pick large scale (D)DoS attacks Stealthwatch Lancope Per Host Behavioural Analysis Requires 1 anomaly end point to be part of prefix list 6

The benchmarking process Same data fed to tools 13 days of cross comparison 1066 anomalies in total Each anomaly Cross checked with NfSen and raw NetFlow Classified as True or False positive Some events forwarded to CERTs for further Confirmation & Discussion NetReflex Stealthwatch Flow fanout Peakflow SP 7

The benchmarking results: True and False Positives NeReflex PeakFlow Stealtwatch 8

The benchmarking results: source of anomalies NeReflex PeakFlow Stealtwatch 9

NetReflex vs Stealthwatch: more details Different scale! Stealthwatch Netreflex 10

Tool Selection - Netreflex Chose Netreflex as the Tool for anomaly detection More uniform detection of Anomalies across Types More uniform detection across Geant Peers Higher Cross Section Of Detected Anomalies Strengths Cover Scans & (D)Dos Origin of Anomalies Well Balanced NREN vs Non 11

Deployment and Initial Usage of NetReflex NetFlow is now 1/100 sampled (was 1/1,000 during trials) Better detection Lower false positives (below 8%) Anomalies can be exported via e-mail Anomaly database created Statistics & Reports Generated for Analysis Netreflex v2.5 Deployed in Production Environment Advanced Filtering Capabilities in Anomaly Analysis Updated Reporting 12

Early Results Anomaly Distribution Network Scans 79% DDos only 2% Anomaly Distribution 2% 8% 11% Network Scans a Precursor 40% of Network Scans from _Global Connectivity Providers Port Scan Network Scan Single Dos DDos Network Scan SRC IP s traced to _Port Scans & Dos Events 79% 13

Early Results Source & Destination Grouping NRENs target of attacks at 70% 56% of Events originating outside of GN 38% of Events originating from NRENs NREN to no NREN accounts for 21% NREN to NREN 17% 25% of Countries & Regions account for _77% of Attacks 14

Early Results, AS Pairs for Anomaly Distribution Global Connectivity Number of Anomalies _Providers 450 400 Greece & Portugal? 350 300 Israel & Estonia Small networks appear high 250 200 150 100 50 Number of Anomalies in the list of targets: why? 0 GBLX to ISRAEL TELIANET to ISRAEL GBLX to PORTUGAL TELIANET to GREECE GBLX to ESTIONIA 15

A (research) enhancement: apriori The manual validation of 1000+ anomalies via NetFlow record inspection stimulated us to explore automatic approaches Apriori : algorithm adapted from marked basked analysis to find association rules (*) If customer buys item X, what is he likely to buy as well? Analogy: if a flow is involved in an anomaly, what other similar flows may be involved? We refined the original algorithm and implemented a GUI (*) D. Brauckhoff, et al. - Anomaly extraction in backbone networks using association rules - IMC 09 - November 2009. 16

Apriori for mining anomalies: GUI Anomaly Investigation Anomaly detection 17

Apriori for mining anomalies: one example The Anomaly detection tool detected this port scan Portscans DDoS Apiori revealed another port scan can on the same target, and a DDoS as well 18

Network Security Service The Objectives The NSS is a service that will enhance backbone security and will extend the NRENs ability to protect their infrastructure. thereby assisting in reducing the network impact of security events on their networks provide additional security incident response to NRENs to extend to their customers and prevent attacks against the GN infrastructure thereby providing a safer GN network 19

Network Security Service Event Workflow 20

Network Security Service The Service Details Protect GEANT Infrastructure Identify Threats Identify Targets & Sources Identify Affected Peering s Protect NREN Access to the Backbone Collaborate with NRENs to mitigate threats affecting them Provide NREN s with additional network visibility Assist less advanced NREN s with security event notifications Provide reports on security events affecting NREN 21

Network Security Service Current Status Phase 1 Anomaly Detection Toolset Deployment, Selection & Tool Tuning Further Analysis & Reduction of FP rate Findings widely reported to community; TF-CSIRT; FIRST; Phase 2 - NREN Security Event reporting Reporting Security Events to NRENs Provide event evidence with notifications Collaborate with NREN s on events. Increase level of security monitoring for NREN s 22

Conclusion Proven detectability of Security Events in the Backbone Network Extensive Tool Comparison Trial Reduction in FP Ratio of Anomalies in Netreflex Automatic Anomaly Validation Network Security Service Provide NREN s with Additional Visibility Provide Security Event Notification and Reporting Phase Two of Deployment Targeted NREN Alerts Closer Security Interaction & Collaboration 23

Acknowledgements Daniela Brauckhoff & Xenofontas Dimitropoulos (ETH Zurich) for sharing their implementation of Apriori Domenico Vicinanza & Mariapaolo Sorrentino (DANTE) for the discussion on bandwidth test tools 24

Conclusion Thank-You wayne.routly@dante.net 25