Flow Based Traffic Analysis



Similar documents
NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Network Monitoring and Management NetFlow Overview

Cisco IOS Flexible NetFlow Technology

Introduction to Netflow

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Scalable Extraction, Aggregation, and Response to Network Intelligence

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Securing and Monitoring BYOD Networks using NetFlow

Flow Analysis Versus Packet Analysis. What Should You Choose?

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

From NetFlow to IPFIX the evolution of IP flow information export

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Wireshark Developer and User Conference

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Network congestion control using NetFlow

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

OpenDaylight Project Proposal Dynamic Flow Management

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Get Your FIX: Flow Information export Analysis and Visualization

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Take the NetFlow Challenge!

NSC E

Netflow Overview. PacNOG 6 Nadi, Fiji

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

NetFlow Tips and Tricks

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

Enhancing Flow Based Network Monitoring

NetFlow-Lite offers network administrators and engineers the following capabilities:

Internet Management and Measurements Measurements

Netflow For Incident Detection 1

Network Traffic Anomalies Detection and Identification with Flow Monitoring

Network Management & Monitoring

NfSen Plugin Supporting The Virtual Network Monitoring

A VoIP Traffic Monitoring System based on NetFlow v9

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

and reporting Slavko Gajin

Gaining Operational Efficiencies with the Enterasys S-Series

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

Analysis of Network Packets. C DAC Bangalore Electronics City

Lab Characterizing Network Applications

Traffic Monitoring using sflow

NetFlow The De Facto Standard for Traffic Analytics

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

Beyond Monitoring Root-Cause Analysis

Network Performance Monitoring at Minimal Capex

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

UltraFlow -Cisco Netflow tools-

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Security Toolsets for ISP Defense

NetFlow Configuration Guide, Cisco IOS Release 12.4

Netflow Collection with AlienVault Alienvault 2013

NetFlow Configuration Guide, Cisco IOS Release 15M&T

Overview of Network Traffic Analysis

Nemea: Searching for Botnet Footprints

[Optional] Network Visibility with NetFlow

Configuring NetFlow-lite

Introduction to Cisco IOS Flexible NetFlow

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

An overview of traffic analysis using NetFlow

Exercise 7 Network Forensics

NetFlow/IPFIX Various Thoughts

CISCO IOS NETFLOW AND SECURITY

Understanding Flow and Packet Deduplication

NetFlow Configuration Guide, Cisco IOS Release 12.2SR

The Value of Flow Data for Peering Decisions

How To Monitor Network Traffic On A Cell Phone

Beyond Monitoring Root-Cause Analysis

Characteristics of Network Traffic Flow Anomalies

Signature-aware Traffic Monitoring with IPFIX 1

Comprehensive IP Traffic Monitoring with FTAS System

Cisco Network Foundation Protection Overview

Usage of Netflow in Security and Monitoring of Computer Networks

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Networking for Caribbean Development

Research on Errors of Utilized Bandwidth Measured by NetFlow

Flow Monitor for WhatsUp Gold v16.1 User Guide

NetFlow Subinterface Support

}w!"#$%&'()+,-./012345<ya

SolarWinds Technical Reference

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Network Monitoring Based on IP Data Flows

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Network Monitoring Based on IP Data Flows Best Practice Document

Flow Monitor for WhatsUp Gold v16.2 User Guide

Configuring Flexible NetFlow

PANDORA FMS NETWORK DEVICES MONITORING

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Strategies to Protect Against Distributed Denial of Service (DD

Transcription:

Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City murali@ncb.ernet.in

Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode every packets for traffic analysis is one of the challenge in a high speed network In analysis point of view, the volume of data for analysis if huge. This will have an impact on performance of the analysis.

Introduction To Definition flow is a unidirectional series of IP packets of a given protocol travelling between a source and a destination IP/port pair within a certain period of time. Aggregate information from different packets in to a flow Different levels of analysis can be possible Compared to packet based analysis, volume of data is very less Suitable for high speed traffic analysis

Introduction Since flow is unidirectional every TCP connection will create at least two flows. Source to Destination Destination to Source

Flow Parameters Flow Parameters

Flow Parameters Flow can be definede using following parameters Source IP Address Destination IP Address Source Port Destination Port Protocol Other than these parameters flow contains Start and end time Duration Number of packet tramsferred Number of Bytes tramsferred TCP Flag Values

Flow Components

Flow Components

Flow Components Flow Probe Collects and decode packets from the network Aggregate packets in to flow using flow key Export flow data into flow collector Flow Collector Collects and decode flow packets Store Flow records for further analysis Provides data in to flow analyzer Flow Analyzer Doing analysis on flow records Performance Security QoS Visualize the Analysis Output

Flow Technologies Differnt vendor specific flow definitions and exporting mechanisms are available Netflow from Cisco Sflow from Inmon Jflow from Juniper

Netflow NetFlow is one of the most widely used flow measurement solution defined by cisco

Netflow Versions No Version PropertiesS 1 Version1 2 Version5 Commonly used 3 Version6 Encapsulation Information 4 Version7 Switch information 5 Version8 Many Aggregation functions 6 Version9 Template Based, Defined in RFC 3954

sflow Selects sampled packetsfor creating flows Using this method devices does not have to cache all flows. Mainly used for monitoring purpose. Can provide layer 2 parameters Based on the structure of probe and collector The probe only sends a sampled packet to the collector.

sflow

Flow Exporting methods Commonly uses UDP packet for exporting flow records Multiple flow record can be embedded in a single UDP packets

Flow Exporting methods The flow information collected from the device ( switch/router) has to send to the flow collector. IPFIX is a protocols which defines how IP flow information can be exported from routers, measurement probe or other devices

IPFIX IP Flow Information Export Provids a common standard for exporting flow Specified by IPFIX working group Supporting Cisco NetFlow version 9 IP Flow Information Export (IPFIX) Implementation Guidelines Defined in RFC 5153 Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information defined in RFC 5101

IPFIX - Advantages Supports user defined parameters Supports template based header Becoming a standard exporting protocol Application is not limited to flow

Behaviour Analysis Network Behaviour Application Behaviour Host behaviour Performance Analysis Security Analysis

Network Behaviour analysis What is the normal traffic pattern in the network At what time the network traffic is maximum / minimum How many machines are active in the network for a particular time Average connection duration Protocol and application distribution Flow Parameters date, time, duration,protocol, no of bytes, no of packets, No of flows

Performance Behaviour analysis Bandwidth usage for a particular time Incoming and Outgoing traffic Maximum /Average Link utilization Packet rate Number of connection request Who is generating and receiving more traffic

Application Behaviour analysis Behaviour of applications are differnt File transfer Web Application P2P Application Identify what is the application distribution of the network traffic Flow Parameters Port numbers,protocol,no of bytes, no of packets

Host Behaviour analysis How many incoming connection to a host for a particular time duration Number of outgoing connection from a host Commonly using application and protocols Flow Parameters Source and Destination IP Source and Destination port Flow Duration, Protocol No of Flows

Security analysis Scan Detection DoS / DDoS Detection Spreading of Malwares Botnet Detection Baseline Traffic Applicaion Usage Port level auditing Inappropriate Usage Free Data Hosting Remote Desktop Access

Security analysis Traffic analysis can be used to detect network traffic anomaly. Identify the normal traffic patterns in a network Any deviation from the normal traffic pattern can be considered as an anomaly Changes in the normal network pattern can be occur due to different attacks. These types of attacks cannot be detect using signature based detection techniques

Security analysis Different types of attacks identified by anomaly detection: Scan Network scanning is a procedure for identifying active hosts and services on a network or host. Flow Parameters. Number of flows Packet Size Duration Source and Destination Port Source and Destination IP

Security analysis Flooding Attacks In a flooding attack, the attacker sends large amounts of bogus traffic toward the victims network to consume its bandwidth, exploiting the lack of bandwidth resource management in IP networks. Denial of Service Attacks (DoS) Distributed Denial of Service (DDoS) Flow Parameters. Number of flows Source and Destination Port Duration Packet length Source and Destination IP

Flow Based Tools Flow Probe fprobe Open source tool for flow creation Flow Collector nfdump toolkit nfcapd - Netflow capture daemon netflow packet collector nfdump - Providing text data of flow records SiLk ( System for Internet Level Knowledge) tool kit Developed by CERT Network Situational Awareness Team YAF (Yet Another Flow meter)

Flow Based Libraries libfixbuf From CERT C Libraries are availabe libipfix Implementation of IPFIX C and Java Libraries are availabe Conference floconf by CERT

References I RFC 5101 - Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information. RFC3954 - Cisco Systems NetFlow Services Export Version 9 Traffic Monitoring using sflow - www.sflow.org/sflowoverview.pdf Introduction to Cisco IOS NetFlow - A Technical Overview - http://www.cisco.com/en/us/prod/collateral/iosswrel/ps6537/ps655

References II A parameterizable methodology fo Internet traffic flow profiling - KC Claffy, HW Braun, GC Polyzos,- Selected Areas in Communications, IEEE Journal - OCTOBER 1995