Advanced Computer Networks IN2097. 1 Dec 2015



Similar documents
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Internet Management and Measurements Measurements

Requirements of Voice in an IP Internetwork

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 9. IP Secure

Research on Errors of Utilized Bandwidth Measured by NetFlow

Simple Law Enforcement Monitoring

Cisco IOS Flexible NetFlow Technology

Master Course Computer Networks IN2097

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Security vulnerabilities in the Internet and possible solutions

Internet Infrastructure Measurement: Challenges and Tools

Network Intrusion Detection Systems. Beyond packet filtering

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE

Flow Analysis Versus Packet Analysis. What Should You Choose?

Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS

CS5008: Internet Computing

Internet Protocol: IP packet headers. vendredi 18 octobre 13

COSC 472 Network Security

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY

ACHILLES CERTIFICATION. SIS Module SLS 1508

RARP: Reverse Address Resolution Protocol

Intrusion Detection Systems

Network congestion control using NetFlow

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Networking for Caribbean Development

17: Queue Management. Queuing. Mark Handley

High Performance VPN Solutions Over Satellite Networks

Firewalls and Intrusion Detection

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Limitations of Packet Measurement

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Flow Based Traffic Analysis

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

NAT and Firewall Traversal with STUN / TURN / ICE

IP Network Monitoring and Measurements: Techniques and Experiences

Network Monitoring and Management NetFlow Overview

Encapsulating Voice in IP Packets

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Master Course Computer Networks IN2097

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Internet Architecture and Philosophy

Distributed monitoring of IP-availability

Protocols. Packets. What's in an IP packet

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Layer: Network Layer and IP Protocol

The ISP Column A monthly column on all things Internet

NETWORK LAYER/INTERNET PROTOCOLS

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Question: 3 When using Application Intelligence, Server Time may be defined as.

An Introduction to VoIP Protocols

Extracting Performance Metrics from NetFlow in Enterprise Networks

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Active Measurements: traceroute

Chapter 8 Security Pt 2

Enhancing Flow Based Network Monitoring

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Signature-aware Traffic Monitoring with IPFIX 1

Per-Flow Queuing Allot's Approach to Bandwidth Management

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Network Management & Monitoring

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Architecture of distributed network processors: specifics of application in information security systems

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

Receiving the IP packets Decoding of the packets Digital-to-analog conversion which reproduces the original voice stream

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Intrusion Detection Systems

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls Netasq. Security Management by NETASQ

Request for Comments: 1788 Category: Experimental April 1995

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Introduction to Netflow

IP addressing and forwarding Network layer

BITAG Publishes Report: Differentiated Treatment of Internet Traffic

TEIN2 Measurement and Monitoring Workshop.

Networks: IP and TCP. Internet Protocol

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

Barracuda Intrusion Detection and Prevention System

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

Analysis of Network Packets. C DAC Bangalore Electronics City

Introduction. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Network Address Translation (NAT) Good Practice Guideline

Guidance Regarding Skype and Other P2P VoIP Solutions

Transcription:

Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department of Computer Science Technische Universität München http://www.net.in.tum.de

Chair for Network Architectures and Services Technische Universität München Network Measurements

Network Measurements Introduction Architecture & Mechanisms Active Measurements Passive Measurements Scenarios 3

Why do we measure the network? Network Provider View Manage traffic Predict future, model reality, plan network Avoid bottlenecks in advance Reduce cost Accounting Service Provider View Get information about the client Adjust service to demands Reduce load on service Accounting Client View Get the best possible service Check the service ( Do I get what I have paid for?) Researcher View Performance evaluation (e.g., could our new routing algorithm handle all this real-world traffic? ) Security view Detect malicious traffic, malicious hosts, malicious networks, 4

But why should we do it at all? Do we really have to? The network is well engineered Well documented protocols, mechanisms, Everything built by humans ð no unknowns (compare this to, e.g., physics: is theory on cosmic inflation phase sound? etc.) In theory, we can know everything that is going on ð There should/might be no need for measurements But: Information in a distributed multidomain network only partly available Moving target: Requirements change Growth, usage, structure changes Highly interactive system Heterogeneity in all directions The total is more than the sum of its pieces And: The network is built, driven and used by humans Detection of errors, misconfigurations, flaws, failures, misuse, 5

Active Measurements Methodology Probe packets exchanged between specific nodes Measurement of packet loss, one-way delay, round-trip times, packet inter-arrival time Analysis Sender Complete packet loss ð link down, invalid route, router defect Partial packet loss ð available bandwidth, level of congestion Delay = propagation time + buffer time ð distance estimation, filling level of buffers Interarrival times of packet pairs/trains ð path capacity Network Receiver 6

Active Measurements - Assessment Active measurements Disadvantages intrusive Additional load Network traffic is affected by the measurement Measurements are influenced by (possibly varying) network load Measurement packets may be treated differently than packets of interest (e.g. ICMP frequently treated differently to TCP/UDP packets) Advantages Straightforward Does not depend on existing traffic by active applications Allows measurement of specific parts of the network Does not require access to internal network components 7

Active Measurement Example: Packet pair probing Packet Pair (P-P) technique c.f. work by Jacobson & Keshav Send two equal-sized packets back-to-back Packet size: L Packet Tx time at link i: L/C i P-P dispersion = time interval between last bit of two packets Without any cross traffic, the dispersion at receiver is determined by bottleneck link (i.e., slowest link): Δ out = max L Ci = max = R i= 1,..., H Δ C.f paper Nettimer: A Tool for Measuring Bottleneck Link Bandwidth in Usenix, Kevin Lai, Mary Baker, https://www.usenix.org/conference/usits-01/ nettimer-tool-measuring-bottleneck-link-bandwidth If two packets are sent close enough together in time to cause the packets to queue together at the bottleneck link, then the packets will arrive at the destination with the same spacing as when they exited. Δ L C in, L C i 8

Active Measurement Example: Traceroute Traceroute: possible anomalies due to load balancing Solution: Paris traceroute UDP TTL=3 UDP TTL=4 9

Recapitulation - Multipath routing: Solution Hash consistently and use packet headers as random values: Result: Packets from same TCP connection yield same hash value No reordering within one TCP connection possible 10

Paris Traceroute Paris traceroute Varying header fields that are within the first 28 octets TCP: sequence number UDP: checksum field This requires manipulating the payload to yield the desired checksum, as packets with an incorrect checksum are liable to be discarded. ICMP: combination of ICMP identifier and sequence number Experiment results: certain routers use first four octets after IP header combined with IP fields for load balancing http://www.paris-traceroute.net/ 11

Passive Measurements Methodology Observation of existing traffic using monitoring probes in the network Measurement of traffic volume, traffic composition, packet interarrival times Different levels of granularity: packet-level, flow-level, link-level Analysis Network Measurement of network utilization for accounting and traffic engineering Monitoring Probe Measurement of quality-of-service parameters (e.g., throughput, delay) Detection of failures, traffic anomalies, flooding attacks and scans Traffic characterization with deep packet inspection 12

Passive Measurements - Assessment Passive measurements (or Network Monitoring) Monitoring of existing traffic ð Requires installation of monitoring probes at appropriate locations in the network Advantages Non-intrusive ð Does not affect applications Does not modify the network behavior Disadvantages Requires suitable existing (active) network traffic Limited to analysis of existing / current network behavior, situations of high load, etc. cannot be simulated/enforced Does not allow the transport of additional information (time stamps, etc.) within measured traffic 13

Flow-Level Passive Measurements Flow-Collector Internal Network Flow Data (e.g. encoded in IPFIX) Internet Network devices create flow data Export them to some central collector You can look at communication patterns 14

Flow-Level Passive Measurements Data visualisation 15

Network Measurements Hybrid Measurements Hybrid measurements Modification of packet flows Piggybacking Header modification Advantages Same as for passive additional information can be included (time-stamps, etc.) Disadvantages Modifying of data packets may cause problems if not used carefully 16

Measurement types (summary) Active Measurements Intrusive Find out what the network is capable of Changes the network state Passive Measurements (or network monitoring) Non-intrusive Find out what the current situation is Does not influence the network state (more or less) Hybrid Alter actual traffic Reduce the impact of active measurements Might introduce new bias for applications 17

Network Monitoring Applications of network monitoring Traffic analysis Traffic engineering Anomaly detection Accounting Resource utilization Accounting and charging Security Intrusion detection Detection of prohibited data transfers (e.g., P2P applications) Research Issues Traffic Analysis Accounting Monitoring Protection of measurement data against illegitimate use (encryption, ) Applicable law ( lawful interception, privacy laws, ) Security applications 18

International Telecommunication Union - ITU Technical Aspects of Lawful Interception: Lawful Interception (LI) describes the lawfully authorized interception and monitoring of telecommunications pursuant to an order of a government body, to obtain the forensics necessary for pursuing wrongdoers. LI has existed from the times of shortrange telegraphy to today s worldspanning Next-Generation Networks (NGNs). http://www.itu.int/dms_pub/itu-t/oth/23/01/t23010000060002pdfe.pdf ð Basis: In accordance with local law reasonable suspicion of severe criminal offense 19

Lawful Interception Interfaces and Standards Vendor Specifications Cisco, others ETSI Standardisation Documents ETSI TS 101 331, Telecommunications security; Lawful Interception (LI); Requirements of law enforcement agencies ETSI TS 33.108 v6.7.0, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Handover Interface for Lawful Interception (Release 6) IETF Please note: RFC 1984, IAB and IESG Statement on Cryptographic Technology and the Internet, August 1996, http://tools.ietf.org/html/rfc1984 RFC 2804, IAB, IESG: IETF Policy on Wiretapping, May 2000, http://tools.ietf.org/html/rfc2804 RFC 3924, Fred Baker, Bill Foster, Chip Sharp, Cisco Architecture for Lawful Intercept in IP Networks, October 2004, http://tools.ietf.org/html/rfc3924 20

Vendor Specification on Lawful Interception Example: Cisco Service Independent Intercept (SII) Architecture 21

RFC 1984 Informational RFC by IAB and IESG, August 1996 The Internet Architecture Board (IAB) and the Internet Engineering Steering Group (IESG), the bodies which oversee architecture and standards for the Internet, are concerned by the need for increased protection of international commercial transactions on the Internet, and by the need to offer all Internet users an adequate degree of privacy.... The IAB and IESG are therefore disturbed to note that various governments have actual or proposed policies on access to cryptographic technology that either: (a) impose restrictions by implementing export controls; and/or (b) restrict commercial and private users to weak and inadequate mechanisms such as short cryptographic keys; and/or (c) mandate that private decryption keys should be in the hands of the government or of some other third party; and/or (d) prohibit the use of cryptology entirely, or permit it only to specially authorized organizations. We believe that such policies are against the interests of consumers and the business community, are largely irrelevant to issues of military security, and provide only a marginal or illusory benefit to law enforcement agencies,... 22

IETF Policy on Wiretapping RFC 2804, May 2000, by IAB and IESG The IETF has decided not to consider requirements for wiretapping as part of the process for creating and maintaining IETF standards. The IETF restates its strongly held belief, stated at greater length in [RFC 1984], that both commercial development of the Internet and adequate privacy for its users against illegal intrusion requires the wide availability of strong cryptographic technology. On the other hand, the IETF believes that mechanisms designed to facilitate or enable wiretapping, or methods of using other facilities for such purposes, should be openly described, so as to ensure the maximum review of the mechanisms and ensure that they adhere as closely as possible to their design constraints. The IETF believes that the publication of such mechanisms, and the publication of known weaknesses in such mechanisms, is a Good Thing. 23

Cisco Architecture for Lawful Intercept c.f RFC 3924 (Informational RFC) 24

RFC 3924 - Cisco Architecture for Lawful Intercept Published only for informational purposes IESG Note This RFC is not a candidate for any level of Internet Standard. The IETF disclaims any knowledge of the fitness of this RFC for any purpose, and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control or inappropriate interaction with deployed protocols. The RFC Editor has chosen to publish this document at its discretion. Readers of this document should exercise caution in evaluating its value for implementation and deployment. ð Analogy: Academic community would publish of known weaknesses in the view of known adversaries publish possible (and likely applied) attacks of known adversaries develop and provide solutions to improve privacy 25