Case Study: Instrumenting a Network for NetFlow Security Visualization Tools



Similar documents
Cisco IOS Flexible NetFlow Technology

NVisionIP and VisFlowConnect-IP: Two Tools for Visualizing NetFlows for Security

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Flow Based Traffic Analysis

Network Management & Monitoring

Netflow Overview. PacNOG 6 Nadi, Fiji

CISCO IOS NETFLOW AND SECURITY

Network Monitoring and Management NetFlow Overview

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Introduction to Netflow

VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring

NetFlow-Lite offers network administrators and engineers the following capabilities:

Internet Security Visualization Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

NetFlow/IPFIX Various Thoughts

Wireshark Developer and User Conference

Securing and Monitoring BYOD Networks using NetFlow

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite

UltraFlow -Cisco Netflow tools-

Introduction to Cisco IOS Flexible NetFlow

Flow Analysis Versus Packet Analysis. What Should You Choose?

CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security

NetFlow v9 Export Format

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Network Monitoring Comparison

Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure

Configuring Flexible NetFlow

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 8 Security Pt 2

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

The Value of Flow Data for Peering Decisions

Get Your FIX: Flow Information export Analysis and Visualization

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks

Cisco IOS Flexible NetFlow Overview

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

NetFlow The De Facto Standard for Traffic Analytics

Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference

An overview of traffic analysis using NetFlow

Network congestion control using NetFlow

INTRODUCTION TO FIREWALL SECURITY

NSC E

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Cisco PIX vs. Checkpoint Firewall

Gaining Operational Efficiencies with the Enterasys S-Series

Using IPM to Measure Network Performance

NetFlow Configuration Guide, Cisco IOS Release 15M&T

Firewall Design Principles

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICES MONITORING

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Customer Guide. BT Business - BT SIP Trunks. BT SIP Trunks: Firewall and LAN Guide. Issued by: BT Business Date Issue: v1.

Network Performance Monitoring at Minimal Capex

NetFlow Tips and Tricks

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

FIREWALLS & CBAC. philip.heimer@hh.se

Internet Security Firewalls

Network Monitoring and Traffic CSTNET, CNIC

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Scalable Extraction, Aggregation, and Response to Network Intelligence

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

NetFlow Configuration Guide, Cisco IOS Release 12.4

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

F-SECURE MESSAGING SECURITY GATEWAY

Enhancing Flow Based Network Monitoring

NetFlow Configuration Guide, Cisco IOS Release 12.2SR

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

NetFlow Subinterface Support

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Overview of Network Traffic Analysis

Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact

LogLogic Cisco NetFlow Log Configuration Guide

Per-Packet Load Balancing

Firewall Firewall August, 2003

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Net-flow. PacNOG 6 Nadi, Fiji

NVisionIP: An Interactive Network Flow Visualization Tool for Security

and reporting Slavko Gajin

Take the NetFlow Challenge!

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

NetFlow Analytics for Splunk

Appendix A Remote Network Monitoring

IP address format: Dotted decimal notation:

Transcription:

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign Annual Computer Security Applications Conference (ACSAC 05) slide 1 of 26 National Center for Supercomputing Applications

Overview NetFlows for Security? What are NetFlows? Challenges with NetFlows Instrumentation Data Management Interoperability Sampling Conclusions slide 2 of 26

NetFlow Security Analysis Who are my top N talkers What percentage of traffic are they? How many users are on the network at any given time? When will upgrades effect the least number of users? How long do my users surf? Where do they go? Where did they come from? Are users following the security policy? Alarm connection-oriented attacks like DoS, DDoS, malware distrribution, worm scanning, vulnerability scanning, etc Will watch for these attacks destined for anywhere or coming from anywhere or entirely within your perimeter! slide 3 of 26

slide 4 of 26

VisFlowConnect External View clock highlighted ports time axis slide 5 of 26 outside domains inside hosts outside domains

What are NetFlows? slide 6 of 26 National Center for Supercomputing Applications

What NetFlows are Information about packets sent between two network nodes source and destination IP addresses source and destination TCP/UDP ports IP protocol type number of packets and bytes (octets) start and stop time slide 7 of 26

NetFlow Data Record Usage Packet Count Byte Count Source IP Address Destination IP Address From/To Time of Day Start Timestamp End Timestamp Source TCP/UDP Port Destination TCP/UDP Port Port Utilization QoS Input Interface Port Output Interface Port Type of Service TCP Flags Protocol Next Hop Address Source AS Number Dest.. AS Number Source Prefix Mask Dest.. Prefix Mask Application Routing and Peering slide 8 of 26

Why NetFlows? Data Source Description Advantage Disadvantage Packet lowest level of granularity; all raw packets with all fields intact most detailed data and statistics especially protocols; easiest to obtain unscalable; protocol signaling needs to be decoded NetFlows IDS Load Levels IPs/ports/protocols/ Timestamps/data? scalable for catching all traffic; multiple sources, uniform field formats maybe no data field; context must be inferred alerts of different formats scalable; tunable resource-intensive; misses; FPs aggregate utilization levels that can be broken down to IP, protocol, port high volume attacks (DOS, traffic); capacity planning; availability from routers & sniffers details about SD pairs; no direction; low volume events obscured slide 9 of 26

What NetFlows are not Infinitely Scalable Data Source Unreliable UDP network transfer for Cisco Argus reliability dependent on CPU speed and I/O of sensor PC Content aware i.e., flow data may not contain packet payload, just metadata about the packets Proactive/Preventative Security Sensor near-real time is good enough layered defense still required black-listing must be coordinated with other security devices slide 10 of 26

NetFlows Network Instrumentation Issues slide 11 of 26 National Center for Supercomputing Applications

NetFlows Instrumentation Issues Streaming Data Vantage Point High Line Rates slide 12 of 26

NetFlow Collection Points Outer Gateway Router Internet Service Provider(s) Switch Web Cache Servers CORE Router Netflow Collectors INBOUND DATA Netflow Collectors OUTBOUND / OTHER slide 13 of 26

NCSA s NetFlows Architecture slide 14 of 26

NetFlows Data Management Issues slide 15 of 26 National Center for Supercomputing Applications

The NetFlows Data Management Problem IDS NetFlows Firewalls time dimension slide 16 of 26

NetFlows Data Management: Alternative 1 (1) Central Database Architecture slide 17 of 26

NetFlows Data Mananagement: Alternative 2 slide 18 of 26 (2) Middleware Architecture

Data Management Problem Summary A simple matter of economics: Database storage = LARGE investment A larger than 10 TB database can cost tens of millions of dollars (particularly in 2001) Although increasing there are finite limits even with unlimited budget. Data storage in flat files No need to move large volume raw data sources. Multiple machine support. Backup in place, oldest data to tape. Large SANs can be used to store data reliably and are relatively scalable, but are still expensive. Are there alternatives to these two basic data storage alternatives? research needed here slide 19 of 26

NetFlows Interoperability Issues slide 20 of 26 National Center for Supercomputing Applications

Interoperability: Flow Flavors Router-Based NetFlows (Cisco, Juniper, Foundry) unidirectional commercial cache timeout (30 min) configuration - sampling Platform-Independent NetFlows (Argus) <http://www.qosient.com/argus/> bidirectional open source cache timeout (1 min) configuration collect data field Other sflows, NFDump, etc. slide 21 of 26

Directionality Client telnet 192.168.1.2 Server login: 192.168.1.1 192.168.1.2 Flows SrcIP SrcPort DestIP DestPort Protocol 192.168.1.1 1234 192.168.1.2 23 TCP x bytes 192.168.1.2 23 192.168.1.1 1234 TCP x bytes 192.168.1.2 23 192.168.1.1 1234 TCP x bytes slide 22 of 26

Interoperability Solution: CANINE Tool Converter and ANonymizer for Investigating Netflow Events Handles several NetFlow formats Cisco V5 & V7, ArgusNCSA, CiscoNCSA, NFDump Also provides multi-dimensional anonymization of fields to facilitate secure data sharing URL: <http://security.ncsa.uiuc.edu/distribution/caninedownload.html> slide 23 of 26

NetFlows Sampling Issues slide 24 of 26 National Center for Supercomputing Applications

NetFlows Sampling Systematic Sampling (deterministic function) Count-based (spatial packet position; e.g., packet count) Time-based (temporal packet position; e.g., arrival time) Random Sampling n-out-of-n Probabilistic Uniform Probabilistic (same probability for each packet) Non-Uniform Probabilistic (probability depends on input) Flow State Probabilistic Sampling probability depends on flow state slide 25 of 26

Summary and Future Work NetFlows network instrumentation for security is specialized and non-trivial, however, the payoff is large Flow-Analysis Community Homepage <http://www.ncassr.org/projects/sift/flow-analysis/> Future Work: NetFlows anonymization to facilitate security data-sharing slide 26 of 26

NCSA SIFT Project <http://www.ncassr.org/projects/sift/> Questions? slide 27 of 26

slide 28 of 26

Flow-Based Analysis Seven Keys Define a Flow: 1. Source Address 2. Destination Address 3. Source Port 4. Destination Port 5. Layer 3 Protocol 6. TOS Byte (DSCP) 7. Input Interface slide 29 of 26

Project Motivations NetFlows in multiple, incompatible formats Network security monitoring tools usually support one or two NetFlows format Need conversion of NetFlows between different formats Sensitive network information hinders log sharing Log sharing necessary for research and study Need anonymization of sensitive data fields slide 30 of 26