Monitoring sítí pomocí NetFlow dat od paketů ke strategiím



Similar documents
NfSen Plugin Supporting The Virtual Network Monitoring

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot

Network Management & Monitoring

Cisco IOS Flexible NetFlow Technology

Conclusions and Future Directions

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Scalable Extraction, Aggregation, and Response to Network Intelligence

Netflow Overview. PacNOG 6 Nadi, Fiji

Flow Based Traffic Analysis

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

Nemea: Searching for Botnet Footprints

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

}w!"#$%&'()+,-./012345<ya

Detecting Botnets with NetFlow

CISCO IOS NETFLOW AND SECURITY

Name. Description. Rationale

CS5008: Internet Computing

Network Security Monitoring and Behavior Analysis Best Practice Document

An overview of traffic analysis using NetFlow

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

KEITH LEHNERT AND ERIC FRIEDRICH

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

On-Premises DDoS Mitigation for the Enterprise

Keywords Attack model, DDoS, Host Scan, Port Scan

Internet Management and Measurements Measurements

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Flow-based detection of RDP brute-force attacks

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Wireshark Developer and User Conference

Detecting Network Anomalies. Anant Shah

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Intrusion Detection Systems

CSCE 465 Computer & Network Security

Intrusion Detection in AlienVault

Network Monitoring and Management NetFlow Overview

Fuzzy Network Profiling for Intrusion Detection

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Network Intrusion Detection Systems

Development of a Network Intrusion Detection System

Introduction to Netflow

Internet Security Firewalls

Observation and Findings

Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Network Visibility Guide

Analysis of Network Beaconing Activity for Incident Response

Cisco IPS Tuning Overview

Application Latency Monitoring using nprobe

Radware s Behavioral Server Cracking Protection

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

NetFlow/IPFIX Various Thoughts

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks

Comprehensive IP Traffic Monitoring with FTAS System

Network security Exercise 10 Network monitoring

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

On Entropy in Network Traffic Anomaly Detection

Second-generation (GenII) honeypots

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Introduction... Error! Bookmark not defined. Intrusion detection & prevention principles... Error! Bookmark not defined.

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Nfsight: NetFlow-based Network Awareness Tool

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS

Network Flow Analysis. egambit, your defensive cyber-weapon system. You have the players. We have the game.

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Overview of NetFlow NetFlow and ITSG-33 Existing Monitoring Tools Network Monitoring and Visibility Challenges Technology of the future Q&A

Intro to Firewalls. Summary

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

Open Source Software for Cyber Operations:

Security Technology White Paper

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Introducing FortiDDoS. Mar, 2013

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments

System Specification. Author: CMU Team

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

Indexing Full Packet Capture Data With Flow

Transcription:

Monitoring sítí pomocí NetFlow dat od paketů ke strategiím Martin Rehák, Karel Bartoš, Martin Grill, Jan Stiborek a Michal Svoboda ATG, České vysoké učení technické v Praze Jiří Novotný, Pavel Čeleda a Vojtěch Krmíček ÚVT, Masarykova Univerzita

CAMNEP Project Network security monitoring Intrusion detection system Includes: Anomaly detection techniques Aggregation of more opinions Fusion mechanism Adaptation process Game theory

CAMNEP Goals & Assumptions Improve the error rate lower false positives same false negatives Validation & Stability reliable response to typical threats traffic-independent response Management self-optimization and selfconfiguration Reasonable-sized traffic Reasonable attack types Not-real time (minimal response delay 40 sec.) Integrates with other defense techniques Low predictability by opponent Structured, actionable output

Network Behavior Analysis Processes NetFlow data no content source, destination IP address/ port + protocol bytes, packets, (flows) flags (TCP) Aggregation 1-15 min. interval (typ. 5 min.) widely available, quality varies, IETF standard Anomaly detection methods Broad decision rules Statistical traffic prediction and analysis

CAMNEP: System overview

Architecture Levels by speed: Up to 10 M packets ps Up to 10 K flows ps Detected flows (10K fps) Events (0-1000 per 5min) Plans/ Attack Trees Adaptation processes

Data Acquisition Layer Network probe Collector + preprocessing COMBO card High-performance hardware probes 10 Gbits/sec full volume nfdump/nfsen collector NetFlow/IPFIX protocol Customized plugin for: Open-source Swiss led effort Actively maintained Data preprocessing Communication with CAMNEP engine

Detection Layer Overview Flows to categories Multiple AD methods Multiple trust models Multiple aggregation methods Agent-based Dynamic Several layers of learning

Anomaly Detection Methods MINDS TAPS number of connections Trends, aggregated by: srcip, dstip, srcipdstport, dstip-srcprt Scan detection Dest. ports/dstip, flow size entropy Aggregated by srcip

Anomaly Detection Methods Principal Component Analysis used to generalize the traffic model by dimensionality reduction Aggregated by source IP Captures relationships between traffic sources Lakhina Volume Lakhina Entropy Models flows, packets, Models traffic characteristics header and bytes for larger value distributions traffic sources

Anomaly Detection Methods Xu Traffic characteristics dstip, srcprt, dstprt distribution entropies Aggregated by traffic source Xu-dstIP Traffic characteristics srcip, srcprt, dstprt distribution entropies Aggregated by traffic destination

Anomaly Detection Methods Method/Attack Malware Brute force Horizont Vertical al Sc. scannin Fingerpri g nt. DoS/DDoS Flooding/Sp oof. MINDS *** **** **** *** Xu ** **** *** *** Xu-dst IP * * ** ***** Lakhina - Volume ** *** *** **** Lakhina - Entropy *** **** ** *** TAPS *** ***** ***** **

Detection Layer Overview Flows to categories Multiple AD methods Multiple trust models Multiple aggregation methods Agent-based Dynamic Several layers of learning

Identity and Context Example Identity srcip = 147.251.198.84 dstip = 78.154.195.124 srcprt = 2430 dstprt = 47575 proto = TCP packets = 8699 bytes = 8,100,000 Context (Xu) H(dstIP)= 0.2 H(srcPrt)= 0.3 H(dstPrt)= 0.3

Trust Modeling Reduction of false positives by: Multi-source aggregation Historical experience aggregation Incremental, unsupervised learning Automatic identitycontext construction Associated trust model

Trust Aggregation Error reduction Feature diversity Algorithm diversity Multistage error reduction: AD Trustfulnes s

Trust Aggregation Importance

Self-Management and Adaptation Monitoring: Self-monitoring Self-evaluation Defect detection Reflection: Component generation Component selection Component combination Component repair

Dynamic Classifier Selection Unsupervised Dynamic: Background traffic Model performance Attacks Strategic behavior Evasion Attacks on learning

Adaptation Architecture Monitoring & evaluation Challenge insertion Challenge insertion control Challenge selection strategy Adaptation Aggregation function selection Aggregation function creation

Monitoring: Challenge Insertion Unlabeled background input data Insertion of small set of challenges Legitimate Malicious Response evaluation Problems: Noise, challenge nonuniformity, distribution, system compromise

Challenge Insertion Control

Results Processing level FP TP 300 2 Average of anomalies 58 2 Arithmetic average of trustworthiness 15 2 5 2 Individual anomaly detection algorithm Adaptive aggregation of trustworthiness

Architecture Levels by speed: Up to 10 M packets ps Up to 10 K flows ps Detected flows (10K fps) Events (0-1000 per 5min) Plans/ Attack Trees Adaptation processes

Incident Classification & Reporting

From research to product

Conclusions CAMNEP uses advanced AI methods to tackle real business problems: Automatically reduces and maintains the error rate Reduces downtime and fault rate Monitors system performance Optimizes system performance Resists strategic behavior of informed opponent