From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik



Similar documents
Practical Experience with IPFIX Flow Collectors

Scalable Extraction, Aggregation, and Response to Network Intelligence

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Nemea: Framework for stream-wise analysis of network traffic

Nemea: Searching for Botnet Footprints

Flow Based Traffic Analysis

Detecting Botnets with NetFlow

Network Monitoring and Management NetFlow Overview

Introduction to Netflow

NfSen Plugin Supporting The Virtual Network Monitoring

An overview of traffic analysis using NetFlow

and reporting Slavko Gajin

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Stateful Firewalls. Hank and Foo

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Configuring Security for FTP Traffic

Experiences Deploying and Operating a Large-Scale Monitoring Infrastructure

Configuring Security for SMTP Traffic

LESSON Networking Fundamentals. Understand TCP/IP

Data Analysis Load Balancer

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Comprehensive IP Traffic Monitoring with FTAS System

Networks and Security Lab. Network Forensics

Datasheet. Cover. Datasheet. (Enterprise Edition) Copyright 2015 Colasoft LLC. All rights reserved. 0

Cisco PIX vs. Checkpoint Firewall

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Introduction to Cisco IOS Flexible NetFlow

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Exercise 7 Network Forensics

pmacct, a new player in the network management arena

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Indexing Full Packet Capture Data With Flow

Security Toolsets for ISP Defense

Connecting North Carolina s Future Today. Application Monitoring: ClassScape Case Study. NCSU Centennial Networking Lab

NetFlow/IPFIX Various Thoughts

Solution of Exercise Sheet 5

CS5008: Internet Computing

First Line of Defense

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

OnCommand Unified Manager

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Network Analysis with isilk

Network Security Management

Attack and Defense Techniques

XpoLog Center Suite Log Management & Analysis platform

Safe network analysis

[Optional] Network Visibility with NetFlow

Protocols. Packets. What's in an IP packet

How to protect your home/office network?

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Chapter 14 Analyzing Network Traffic. Ed Crowley

Cisco IOS Flexible NetFlow Technology

Pilot Deployment of Metering Points at CESNET Border Links

DDoS Attacks & Mitigation

Revealing Botnets Using Network Traffic Statistics

Analysis of Network Packets. C DAC Bangalore Electronics City

Intrusion Detection System

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Management & Monitoring

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Application Firewalls

Guideline on Firewall

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

A Review of the Measuring Platform

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

The Transport Layer. Antonio Carzaniga. October 24, Faculty of Informatics University of Lugano Antonio Carzaniga

Security threats and network. Software firewall. Hardware firewall. Firewalls

Chapter 11 Cloud Application Development

TCP/IP Basis. OSI Model

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Network Monitoring Based on IP Data Flows Best Practice Document

CNS-208 Citrix NetScaler 10 Essentials for ACE Migration

Configuring NetFlow. Information About NetFlow. Send document comments to CHAPTER

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Networking Basics and Network Security

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

M3-R3: INTERNET AND WEB DESIGN

Networking for Caribbean Development

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

A Plan for the Continued Development of the DNS Statistics Collector

PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham

Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Monitoring sítí pomocí NetFlow dat od paketů ke strategiím

Firewalls. Pehr Söderman KTH-CSC

Network Programming TDC 561

Columbia - Verizon Research Securing SIP: Scalable Mechanisms For Protecting SIP-Based Systems

Firewall Implementation

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Firewalls. Chapter 3

Transcription:

From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik

Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables Maintenance Security Planning

Introduction Traditional tools Fixed format of flow data Storage optimization Offline analysis of 5 minutes intervals Latest trends Increasing amount of flows Network applications Attacks Alternative approach

Motivation Trend is to connect anything Mobile devices Internet of Things, Everything SmartTV SmartToilet

Motivation Migration of applications into clouds Secure network environment supports trustworthy service delivery to end users Application-oriented attacks Visibility of application layer HTTP Telnet SMTP DNS SIP

Issues Various flow data formats Flexibility of data storage Response to data queries Online analysis and effective data processing

Concept Modular collector to support various formats Database to store dynamic data Column oriented storage for fast queries Streaming processing for online analysis

Collector IPFIXcol IPFIX protocol support (RFC 7011) Modular architecture

Collector IPFIX records from network or local file Private Enterprise Numbers Variable length elements Easily extensible for new elements Internal record processing IPFIX mediator capabilities (RFC 6183) Data output: Local storage Further processing Primary data storage: FastBit database Further data processing using Nemea

Streaming analysis Traditional concept is to store & analyze 5 minutes interval Intensive disk access Alternative streaming approach Analysis pipeline of multiple modules Stream data through modules Keep data in memory Nemea framework

Streaming analysis Unified interface for efficient intermodule communication Unix sockets (single host) TCP sockets (multiple hosts) Data format defined at run time (binary) Efficient data transfer Blocking/non-blocking Connection recovery Supervisor

Streaming analysis Simple offline example Stream stored flows Count number of received flows

Streaming analysis Advanced online example IPFIX stream Nemea stream Multicast stream to modules

Streaming analysis Adding new monitoring/analysis capability Use case Heartbleed vulnerability monitoring 1. Extend flow probe with plugin 2. Extend definition IPFIXcol output plugin template 3. Write down analysis module

Streaming analysis Performance results

Streaming analysis Running detectors (events/month) Scanning (520117) DoS (324) SSH bruteforce (70) IP spoofing (permanent) Amplification attacks (20) Heartbleed (20 per day) Anomalies PCA (depends)

Streaming analysis Advantages Near-real time results & actions Continuous seamless processing Keep data in memory Share outputs Scaling Disadvantages Memory management Data copies

FastBit DB Developed at the Berkeley Lab Columnar storage: Element = Column = File Table = Directory Flexible data format High performance for large data files Augmented by bitmap indexes Allows fast value and range queries Strings and binary objects processing

FastBit DB Command line data manipulation tools C, Java and native C++ API fbitdump: nfdump-like tool Queries over FastBit database Uses C++ API Network oriented (support for IP addresses, protocols, TCP flags,...)

Fbitdump Comparison with nfdump and SiLK SELECT date start, protocol, src IPv6, dst IPv6, src port, dst port, packets, bytes FROM dataset WHERE dst port = 53 AND ip version = 6

Fbitdump SELECT src IPv4, packets, bytes, count(*) FROM dataset WHERE ip version = 4 GROUP BY src IPv4 ORDER BY bytes DESC LIMIT 5

FastBit DB Lesson learned Columnar databases are good for flows More mature DBs might be considered Pros Fast storage access using indexes Easy data manipulation Cons Missing efficient aggregation functions Lots of files (table per template) Large indexes

Conclusion Alternative flow storage and analysis Columnar DB brings improvement but not solving the problem entirely Future work Distributed storage to cope with increasing amount of data to support interactive network forensics Possible way to go is big data processing