Internet Management and Measurements Measurements



Similar documents
Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS

Flow Based Traffic Analysis

Advanced Computer Networks IN Dec 2015

Network Monitoring and Management NetFlow Overview

Flow Analysis Versus Packet Analysis. What Should You Choose?

Cisco IOS Flexible NetFlow Technology

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)

Network Management & Monitoring

A Review of the Measuring Platform

Application Latency Monitoring using nprobe

Research on Errors of Utilized Bandwidth Measured by NetFlow

Netflow Overview. PacNOG 6 Nadi, Fiji

Introduction to Netflow

How To Understand Network Performance Monitoring And Performance Monitoring Tools

Question: 3 When using Application Intelligence, Server Time may be defined as.

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

The ntop Project: Open Source Network Monitoring

Autonomous NetFlow Probe

Detecting UDP attacks using packet symmetry with only flow data

Network congestion control using NetFlow

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

NSC E

IPTV Traffic Monitoring System with IPFIX/PSAMP

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Scalable Extraction, Aggregation, and Response to Network Intelligence

Study of Network Performance Monitoring Tools-SNMP

Intrusion Detection Systems

Introduction of Intrusion Detection Systems

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Unified network traffic monitoring for physical and VMware environments

An Overview of the Bro Intrusion Detection System

TELE9752 Network Operations and Control Week 10p: Performance

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Monitoring Cloud Services using Flow-Based Measurements. Idilio Drago

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Beyond Monitoring Root-Cause Analysis

Wireshark Developer and User Conference

NetFlow-Lite offers network administrators and engineers the following capabilities:

NetFlow/IPFIX Various Thoughts

INTRUSION DETECTION SYSTEMS and Network Security

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

ΕΠΛ 674: Εργαστήριο 5 Firewalls

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

Observer Probe Family

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Qcast : IP Multicast Traffic Monitoring System with IPFIX/PSAMP

A Summary of Network Traffic Monitoring and Analysis Techniques

Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12

Lab Characterizing Network Applications

A Case Study in Testing a Network Security Algorithm

Attack and Defense Techniques 2

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Nemea: Searching for Botnet Footprints

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Beyond Monitoring Root-Cause Analysis

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Voice Over IP (VoIP) Denial of Service (DoS)

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Lab VI Capturing and monitoring the network traffic

H.323 Traffic Characterization Test Plan Draft Paul Schopis,

Challenges in NetFlow based Event Logging

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

How To Store Multi Format Data In A Network Security System

Measurement of IP Transport Parameters for IP Telephony

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

The University of Information Technology Management System

Intrusion Detection Systems

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

The ISP Column A monthly column on all things Internet

Enhancing Flow Based Network Monitoring

Requirements of Voice in an IP Internetwork

Internet Traffic Measurement

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Using Ranch Networks for Internal LAN Security

Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks

Traffic monitoring with sflow and ProCurve Manager Plus

Monitoring and analyzing audio, video, and multimedia traffic on the network

IP Network Monitoring and Measurements: Techniques and Experiences

Metroflux: a high performance system for very fine-grain flow analysis

1-800-CALL-H.E.P. - Experiences on a Voice-over-IP Test Bed.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How To Write A Blog Post On Dropbox

8. 網路流量管理 Network Traffic Management

Architecture Overview

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Comprehensive IP Traffic Monitoring with FTAS System

Packet Capture and Expert Troubleshooting with the Viavi Solutions T-BERD /MTS-6000A

Transcription:

Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010

Measurements What is being measured? Why do you measure? How do you do it?

Measurements What is being measured? Why do you measure? How do you do it?

What is being measured? Delay (one-way, round-trip) Delay variation (jitter) Throughput (average, peak, ) Packet loss Protocol/application usage Nature of data exchanged between hosts

Measurements What is being measured? Why do you measure? How do you do it?

Why do you measure? Traffic engineering Intrusion detection Accounting Lawful interception

Why do you measure? Traffic engineering Intrusion detection Accounting Lawful interception

Traffic Engineering Predict, plan, understand the behavior of the network Link usage (bottlenecks?) Packet losses Delays Goal: optimize Quality of service provided to customers Costs

Traffic Engineering In general, you can not just try with the real network Needed: Formal models that describe the (future) behavior of the network Tools to evaluate the models by analysis or simulation Measurement data! Create and parametrize the models Validate the results

Example: Dimensioning Router Buffers What is the packet loss L for a buffer size S? Router port can be modeled as a queueing station Traffic input process?

Modeling Traffic Processes What kind of modeling techniques do we need? Traditional formal approaches based on Markovian behavior (Poisson distributions, ) Measurements since the 1980s have shown that network traffic has non-markovian properties: Self-similarity Long-range dependence Heavy-tailed distributions Requires new models and tools

Self-similarity (from: Traffic Characterisation for Telecommunication Networks, 1999)

Heavy-tailedness WWW min Max mean median 2000 17 B 0.23 GB 12 KB 2.4 KB 2007 85 B 2.15 GB 68 KB 2.7 KB

Why do you measure? Traffic engineering Intrusion detection Accounting Lawful interception

Intrusion Detection Number of reported incidents (CERT):

Intrusion Detection

Intrusion Detection: Classification Main classification criteria: Location of observation Host-based: only observe traffic from/to a particular host Network-based: observe the traffic in a whole (sub)network Detection method: Misuse-based: look for known patterns of misuse Anomaly-based: everything that deviates from normality is suspicious Two reasons to measure: 1. Learn from traffic measurements how good/bad traffic looks like 2. Protect the network

Intrusion Detection: Other Criteria Analyzed data: Log files Packet payload Only packet-headers Data collection From multiple locations Only one location Adaptation Static: has to be configured by user Self-adapting: adapts automatically to changes in the network...

Internet Background Radiation Idea: measure all traffic destined for unused IP addresses in a network Study at Lawrence Berkeley National Laboratory Characteristics of Internet Background Radiation. R. Pang, V. Yegneswaran, P. Barford, V. Paxson, L. Peterson. Proc. of the ACM Sigcomm Internet Measurement Conference, Taormina, Sicily, Italy 2004 Background radiation of the Internet consists of: Non-productive traffic (misconfigurations) Malicious traffic (scans, worms, )

Measurement Results at LBL TCP Port 445 80 135 1025 2745 # Source IP (%) 43.40% 28.70% 19.10% 4.30% 3.20% # Packets (%) 19.70% 7.30% 30.40% 5.80% 3.60%

Why do you measure? Traffic engineering Intrusion detection Accounting Lawful interception

Accounting Who uses what, when, how often? Reasons: Billing Limit resource usage Security Can be done at different levels: Authentication services Applications Observe the traffic generated by the user

RADIUS RFC 2866 Logout: NAS sends stop record Session time Packets transfered Octets transfered Disconnect reason

Traffic-based Accounting: Example IsarFlow (IsarNet, Germany) (from: isarflow.de)

Why do you measure? Traffic engineering Intrusion detection Accounting Lawful interception

European Directive Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006: 1. Member States shall ensure that the following categories of data are retained under this Directive: (a) data necessary to trace and identify the source of a communication: (1) concerning fixed network telephony and mobile telephony: (i) the calling telephone number; (ii) the name and address of the subscriber or registered user; (2) concerning Internet access, Internet e-mail and Internet telephony: (i) the user ID(s) allocated; (ii) the user ID and telephone number allocated to any communication entering the public telephone network; (iii) the name and address of the subscriber or registered user to whom an Internet Protocol (IP) address, user ID or telephone number was allocated at the time of the communication; (b) data necessary to identify the destination of a communication:

Measurements What is being measured? Why do you measure? How do you do it?

How to measure? Passive measurement: Log files Observe traffic Active measurement: Send probing packets Example: ping

How to measure? Passive measurement: Log files Observe traffic Active measurement: Send probing packets Example: ping

Record packets with tcpdump Capture network traffic (not only TCP) at specified interface Collected data stored as pcap files Can be used as library by other applications Many capturing options, filters, Example: tcpdump 'tcp[tcpflags] & (tcp-syn tcp-fin)!=0'

Wireshark

Location of Measurement Single hosts: Only traffic directed to/generated by the host All traffic seen on the network segment Switches, routers: 1. Create mirror port (Cisco: SPAN-Port) for one or more source ports 2. Send traffic from mirror port to a measurement host Packet loss if traffic throughput is > mirror port bandwidth > storage/processing rate at measurement host

Limitations of Packet Measurement Abilene network

Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing faster: Move to kernel space Distributed collection & processing Dedicated hardware

Limitations of packet measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing faster: Move to kernel space Distributed collection & processing Dedicated hardware

Sflow, Netflow, IPFIX A flow summarizes a sequence of packets: Source & destination IP address Source & destination port number Source & destination AS Layer 3 protocol type Size (aggregated number of bytes) Timestamps of first and last packet

NetFlow infrastructure Protocols: Netflow v5, 9: quasi-standard. by Cisco IPFIX: from Netflow v9, by IETF Flexible Netflow: flexible monitoring, by Cisco (from: Cisco)

Netflow v9 Exported data specified by templates ( v5) from: Cisco

Netflow v9 (from: Cisco)

Netflow v9 (from: Cisco)

Flows vs. Packets Of course, loss of information (no payload, no details of packet headers) But sometimes the only option Still useful for: Accounting Interception Even intrusion detection: Scans Some kinds of DoS