Internet2 NetFlow Weekly Reports



Similar documents
Network Monitoring and Management NetFlow Overview

Introduction to Netflow

An overview of traffic analysis using NetFlow

Netflow Overview. PacNOG 6 Nadi, Fiji

Network Management & Monitoring

Get Your FIX: Flow Information export Analysis and Visualization

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

and reporting Slavko Gajin

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Firewall Firewall August, 2003

Chapter 11 Cloud Application Development

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Infrastructure for active and passive measurements at 10Gbps and beyond

Multicast vs. P2P for content distribution

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

Firewalls. Ahmad Almulhem March 10, 2012

The Bro Network Intrusion Detection System

Netflow For Incident Detection 1

Frequently Asked Questions

Protocols. Packets. What's in an IP packet

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Bro at 10 Gps: Current Testing and Plans

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Flow Analysis Versus Packet Analysis. What Should You Choose?

Peer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

WhatsUpGold. v15.0. Flow Monitor User Guide

Flow Monitor for WhatsUp Gold v16.2 User Guide

NetFlow The De Facto Standard for Traffic Analytics

Source-Connect Network Configuration Last updated May 2009

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Internet Privacy Options

[Optional] Network Visibility with NetFlow

Linux MDS Firewall Supplement

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Introduction to Passive Network Traffic Monitoring

Flow Monitor for WhatsUp Gold v16.1 User Guide

Bandwidth Management for Peer-to-Peer Applications

An apparatus for P2P classification in Netflow traces

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Cheap and efficient anti-ddos solution

Policy Based Forwarding

Radware s Multi-homing Solutions

Research on Errors of Utilized Bandwidth Measured by NetFlow

GregSowell.com. Mikrotik Security

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Ethernet. Ethernet. Network Devices

8 steps to protect your Cisco router

Introduction to Cisco IOS Flexible NetFlow

How to protect your home/office network?

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Building a better NetFlow

CSCE 465 Computer & Network Security

Monitoring high-speed networks using ntop. Luca Deri

HTGR- Netflow. or, how to know what your network really did without going broke

The OSI & Internet layering models

Cisco IOS Flexible NetFlow Command Reference

Using Netflow data for forecasting

Application Aware Traffic Engineering and Monitoring

Signature-aware Traffic Monitoring with IPFIX 1

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

Lab Characterizing Network Applications

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Securing Networks with PIX and ASA

Lab Testing Summary Report

Firewall Security: Policies, Testing and Performance Evaluation

Distributed Systems. 2. Application Layer

Scalable Extraction, Aggregation, and Response to Network Intelligence

TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Ranch Networks for Hosted Data Centers

Network Management Back to the Basics. Brad Hale

Open Source in Network Administration: the ntop Project

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

IPv6 network management. Where and when?

Challenges in NetFlow based Event Logging

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

Computer Networks and the Internet

02-QOS-ADVANCED-DIFFSRV

Stateful Inspection Technology

PANDORA FMS NETWORK DEVICES MONITORING

Network Simulation Traffic, Paths and Impairment

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Basic Network Configuration

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Exam Questions SY0-401

Comprehensive IP Traffic Monitoring with FTAS System

Transcription:

Internet2 NetFlow Weekly Reports Stanislav Shalunov Internet2 Fall Member Meeting, Indianapolis, 2003-10-13

What is NetFlow? Originally a Cisco proprietary technology Now supported by other vendors and being standartized in the IETF (ipfix WG) Used to be a method to speed up packet forwarding Cache the next interface for given src, dst, proto, ports, tos Look in the cache hash table before you consult the routing table It was realized it s useful for accounting purposes Not any longer used for optimization, but the accounting use is growing more widespread 1

NetFlow version 5 There are several versions of NetFlow (5, 7, 8 are widespread) Provide different fields and different levels of aggregation NetFlow v5 gives you records with the following: src ip, dst ip, packets, octets, start time, end time, src port, dst port, proto, tos, src as, dst as, if in, if out Can use for accounting purposes, but there s more 2

Methodology of Data Collection Collect 1% sampled NetFlow data from all core Abilene routers Collection done at ITEC-Ohio with flow-tools Throw away data coming from interfaces between core nodes flow-tools now include SNMP hooks for that Concatenate the rest of the data Ship the resulting files (5 25 GB) to our RAID array daily Resulting view treats Abilene as a single data-forwarding unit 3

Methodology of Data Processing The goal is to capture long-term trends Weekly averages for everything, hence weekly reports Daily averaging too volatile, monthly would take too long Two data sets: one the complete thing, one bulk TCP Bulk TCP is a TCP connection that transferred > 10 MB For full data set can do traffic composition For bulk TCP data set can do more, including throughput Traffic composition studies are routine (though most do not look at file sharing), but looking at bulk TCP is unique 4

Data Presentation Find it at http://netflow.internet2.edu/weekly/ Weekly: new report added, time-series graphs updated The heart: TCP throughput analysis (includes CDF) Time-series graphs Traffic composition: finally you know what uses Abilene Salient points: Median bulk TCP throughput is around 2.5 Mb/s 95th percentile is around 15 Mb/s A decreasing fraction of traffic is file sharing Bulk TCP throughput appears to be increasing 5

Top 10 Connections Top 10 bulk TCP performers Only a single connection from a given AS to a given AS can be listed Two independent table are produced: one for measurement flows and one for the rest If you are going for records, check if your flows show up Validation Independent verification 6

Costs, Tools Used Capacity overhead of data collection is negligible Need a machine with disk space ($100 for 40 GB now) FOTS (free off the shelf) flow-tools for collection Custom-written stuff for analysis (around 2 man-months) CWEB program to make a pass over complete data set Perl programs to post-process and handle presentation CWEB part is available as documentation of classification Perl part can be released if there s interest 7

8

Throughput Distribution of Bulk TCPs The shape of the curve mostly similar for different weeks. Sometimes one encounters unusual shapes. Denial of service attacks Sets of major demos The tail wiggles more than the body The virtually straight (on log-log scale) line from 0 to 130 Mb/s or so virtually every week No explanation No theoretic shape for this curve 9

10

Median, 5th, and 95th Percentile of Bulk TCP Throughput Good news: keeps increasing (generally) Higher percentiles go up more than median The high-end users had better luck than the masses The wizard gap is widening But: Impact of Cisco to Juniper change (different eviction timeouts) Mostly can be explained by changes in OS composition (newer OSes have larger window size) Impact of file-sharing decreases (file-sharing was always below median, so decreases of file-sharing translate to increases of the median) 11

12

Median of Bulk TCP Throughput Same as on previous plot, but less compressed Clearly the trend is up 13

14

Percentage of Data Transfer Traffic NNTP, HTTP, FTP, and Rsync Passive FTP not included (difficult to characterize) Goes up in summer and during winter break (because there s less file sharing and interactive use) Fairly stable otherwise 15

16

Percentage of File-Sharing Traffic The general trend is downwards A lot of shifting to new applications Some must have spilled over into unidentified Correlates well with political and legislative events 17

18

Percentage of Measurement Traffic Iperf, ICMP, IPMP A sizeable chunk of network capacity Probably more than desired 19

20

Percentage of Encrypted Traffic SSH, HTTPS, IPsec General trends seems to be up Looking at port numbers, so don t know what fraction of unidentified is encrypted 21

22

Percentage of Audio/Video Traffic Multicast, Real, Windows Media, etc. More volatile than other traffic categories Event-related Windows Media a minor (but increasing) fraction of Real 23

24

Percentage of Advanced Applications Traffic UNIDATA LDM, BBFTP, IBP, GsiFTP, McIDAS Mostly LDM with a smidgen of BBFTP Even more volatile than audio/video The fewer users, the more volatility, generally 25

26

Percentage of Games Traffic Not a big traffic source Games are generally design for the masses The masses have DSL or cable at best Most games are designed so that the bandwidth of dialup is enough Advanced application waiting to happen? 27

28

Percentage of Miscellaneous Traffic Mail, Port 0, AFS, DNS, X11, AIM, Telnet, MS Windows, Squid, NFS, SOCKS, IRC, IDENT, NTP, SNMP, Portmapper, RTIP Known traffic that doesn t fit other categories Quite stable 29

30

Percentage of Unidentified Traffic Quite smoothly changing Seems to be negatively correlated with file-sharing in winter Seems to be positively correlated with file-sharing in summer An unknown fraction might be file-sharing 31

32

Percentage of NNTP Traffic The most talkative single application on Internet2 Some percentage swings are related to file-sharing changes Most bytes are in binary groups 33

34

Percentage of HTTP Traffic Less on Internet2 than on commodity Internet Not a lot of traffic (in relative terms), huge utility Email has even less traffic and even more utility The upward trend is mostly just the decrease in other types of traffic Is likely to decrease over time (but likely retain the utility, if similar to email) 35

36

Percentage of FTP Traffic Active FTP only Passive FTP is a part of unidentified Peculiarly, percentage decreases during breaks Therefore, mostly used interactively 37

38

Percentage of BitTorrent Traffic A relatively new file-sharing application Open-source Originally developed for the distribution of Linux CD images Used for other kinds of files nowadays Seems to become more and more popular fast 39

40

Percentage of FastTrack Traffic The protocol used by KaZaa Was virtually gone in the end of summer Made a small comeback early fall Unlikely to come back big, at least in the original form 41

42

Percentage of edonkey2000 Traffic A second-tier file-sharing application Remarkably resilient and stable Other file-sharing applications come and go, but edonkey is still here 43

44

Percentage of Gnutella Octets A file-sharing application Used to be a KaZaa competitor Steadily losing popularity Unlikely to come back 45

Performance is going up Wizard gap is widening Summary Quantity of file-sharing is going down Top 10 tables can help in validation and verification of test results http://netflow.internet2.edu/weekly/ 46