Internet Traffic Trends A View from 67 ISPs



Similar documents
Internet Traffic and Content Consolidation

Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan

ATLAS Internet Observatory Bandwidth Bandwagon: An ISOC Briefing Panel November 11, 2009, Hiroshima, Japan

Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect

ATLAS Internet Observatory 2009 Annual Report

Internet Traffic Evolution

DDoS Mitigation Techniques

Introduction to Netflow

The Value of Flow Data for Peering Decisions

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

and reporting Slavko Gajin

Netflow Overview. PacNOG 6 Nadi, Fiji

FortiDDos Size isn t everything

"Dark" Traffic in Network /8

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Internet Inter-Domain Traffic

Flow Analysis Versus Packet Analysis. What Should You Choose?

DDoS Protection Technology White Paper

Network Monitoring and Management NetFlow Overview

Security Toolsets for ISP Defense

Arbor s Solution for ISP

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Flow Based Traffic Analysis

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

Network Management & Monitoring

Get Your FIX: Flow Information export Analysis and Visualization

JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Cheap and efficient anti-ddos solution

DDoS Overview and Incident Response Guide. July 2014

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Introducing FortiDDoS. Mar, 2013

Outline. Outline. Outline

Network congestion control using NetFlow

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques

NetFlow/IPFIX Various Thoughts

F5 Silverline DDoS Protection Onboarding: Technical Note

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Wireshark Developer and User Conference

Cisco IOS Flexible NetFlow Technology

Ferramentas de Ataques de DDoS e a Evolução de ameaças a disponibilidade contra serviços Internet. Julio Arruda Gerente America Latina Engenharia

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

STATEMENT OF CRAIG LABOVITZ, PHD Co-Founder and CEO of DeepField Before the House Judiciary Committee Subcommittee on Regulatory Reform, Commercial

DDoS Mitigation Strategies

Take the NetFlow Challenge!

Open Source in Network Administration: the ntop Project

Scalable Extraction, Aggregation, and Response to Network Intelligence

DEFENSE NETWORK FAQS DATA SHEET

Exterior Gateway Protocols (BGP)

How is SUNET really used?

Comprehensive IP Traffic Monitoring with FTAS System

Analysis of a DDoS Attack

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Introduction to Cisco IOS Flexible NetFlow

Approaches for DDoS an ISP Perspective.

Radware s Attack Mitigation Solution On-line Business Protection

Putting the Tools to Work DDOS Attack

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

IPFIX IE Extensions for DDoS Attack Detection draft-fu-dots-ipfix-extension-01

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Internet Traffic Measurement

TDC s perspective on DDoS threats

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Data Sheet. DPtech Anti-DDoS Series. Overview

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

Network Monitoring and Traffic CSTNET, CNIC

Inter-domain Routing. Outline. Border Gateway Protocol

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

How Cisco IT Protects Against Distributed Denial of Service Attacks

E-Guide. Sponsored By:

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

How To Block A Ddos Attack On A Network With A Firewall

Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Internet Protocol: IP packet headers. vendredi 18 octobre 13

How to configure an Advanced Expert Probe as NetFlow Collector

Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications

Distributed Denial of Service (DDoS)

OpenDaylight Project Proposal Dynamic Flow Management

VERISIGN DDOS PROTECTION SERVICES IN-THE-CLOUD SOLUTION FOR SCALABLE, RELIABLE, AND FLEXIBLE DDOS MONITORING AND MITIGATION

MSP. HOW MSPs Can Use Performance Monitoring to Create New Revenue Streams. [ WhitePaper ] Introduction

Pravail 2.0 Technical Overview. Exclusive Networks

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

DDoS attacks in CESNET2

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Transcription:

Internet Traffic Trends A View from 67 ISPs Craig Labovitz (labovit@arbor.net) Danny McPherson (danny@arbor.net) Scott Iekel-Johnson (scottij@arbor.net) Mike Hollyman (mhollyman@arbor.net)

Internet Statistics Golden Age NSFNet 1986-1995 Monthly ARTs reports protocol, ports Filtered prefix reports Today Some ISP specific traffic research and commercial datasets e.g. Akamai, Google, etc. Lots of BGP data Many, many analyst reports Mostly people make stuff up

Internet Traffic Project Global view of Internet traffic and attack trends Leverage commercial probe deployments Pool of 2,500+ active Flow / DPI collectors Across 250 ISPs / Content Provider / Higher Ed Deployed adjacent interesting bits of infrastructure Internet scale data collection Traffic, DPI, Mitigation and Security datasets Geographically and topologically diverse

Internet Traffic Project Outgrowth Fingerprint Sharing Initiative 45 publicly disclosed participants and Annual ISP Security Survey All data voluntary anonymous data sharing agreement with ISPs Still more research project than commercial Arbor, University of Michigan, Princeton (Intern) And 78 ISPs (and growing)

Internet Traffic Deployment 67 long-term participants (2 years) 17 unique countries 27 in US, though many have global footprint

Current Traffic Project Deployment 67 long-term ISPs (now 78) 5 MSO, 4 Tier1, 15 Tier2, 4 Content, 1 R&E Remainder not self-catagorized 1,270 routers 141,629 interfaces > 1.8 Tbps of average inter-domain traffic 485 days and counting (began September 2006)

Typical ISP Deployment Majority deployments are Flow from all peering edge routers NetFlow / JFlow/ Sflow / IPFIX / etc Growing DPI from gigabit inline / portspan in front of customers or server clouds Exported to commercial probes Usually 1/100-1/000 sampling Regexp or BGP based classification of border interfaces to avoid double counting Data validated against interface SNMP counters

Anonymous XML Data Five minute traffic samples Traffic In/out of network (subset of backbone traffic) Cross-products based on top N protocols, ASNs, ports, applications, etc. Traffic anomaly data Combination protocol signatures, behavior and statistical variance from baselines Distinguish Attack versus Flash Crowd Annotations and mitigation status Self-Categorization Tier1/2/3, Content, High Ed, etc Predominant geographic coverage area

Internet Traffic Project statistics.arbor.net ISP1 ISP2 ISP3 ISP5 ISP4 Each participating ISP deployment submits XML Anonymous XML over SSL every hour Arbor managed servers collect/process

90 Day Protocol Distribution Trends No real surprises: TCP dominates followed by UDP Possible North America / Europe bias to dataset given diurnal patterns Wither IPv6?

60 Day TCP Port Trends Again, no surprises: http/80 by far most prominent TCP port In second place, TCP/4662 (edonkey) most prominent inter-domain peer-2-peer file sharing protocol Rises of NNTP ( ranks 3rd) as file sharing alternative (alt.binaries!)

Internet Anomaly / Attack Summary 485 days Anomalies 616,631 total anomalies reported 1,271 average anomalies/day Attacks 353,588 classified attacks (57.34%) 729 average attacks/day

Internet Attack Propagation Detect multi-isp distributed attack Each color represents different anonymous ISP (30 represented) Each line represents different attack 7 Outbound ISPs, 10 attack streams (7 tcpsyn, 3 icmp) generating 6.312 Mpps, one Russian AV Vendor

Internet Attack Packet Size Distribution Small packets predominate (pps attacks) Spectral analysis-like fingerprints of other attack types and tools Some issues with data collection methodology

Internet Attack Types Data excluding floods After nine years, TCP SYN (31%) still dominates DDoS ICMP (27%) also prominent

Most Frequently Attacked Ports HTTP ports account for bulk of TCP-based attacks Fragmentation attacks lead the pack on the UDP front

Internet Attack Scale Unique attacks exceeding indicated BPS threshold for single ISP Average of three 1-Gbps or larger attacks per day over 485 days of collection Two ~25 Gbps attacks reported by a single ISP (on same day, about one hour apart, duration of ~35 minutes)

21 Days Y/Y Significant Y/Y growth Identify additional trends: Holiday Season typically slow time for attackers

Challenges Balance commercial privacy with research and business interests Data normalization / extrapolation Differing notions tier1 Many business units within an ISP Data availability to other researchers

Questions? Craig Labovitz (labovit@arbor.net), Danny McPherson (danny@arbor.net) Scott Iekel-Johnson (scottij@arbor.net) Mike Hollyman (mhollyman@arbor.net)