A Quantitative Cross Comparative Analysis of Tools for Anamoly Detection

Similar documents
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool

How To Protect Gante From Attack On A Network With A Network Security System

Operational Experiences with Anomaly Detection in Backbone Networks

Firewall on Demand Multidomain

The Value of Flow Data for Peering Decisions

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Expanding the TALAIA NETWORKS market: From the Academic to the Private Sector

DDoS Mitigation Strategies

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

Internet Protocol: IP packet headers. vendredi 18 octobre 13

8. 網路流量管理 Network Traffic Management

F5 Silverline DDoS Protection Onboarding: Technical Note

with NetFlow Technology Adam Powers Chief Technology Officer

Internet Traffic Trends A View from 67 ISPs

Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

5/24/10. Computer Science IT Security Guest Lecture. Matthew Cook. Agenda

Choosing Routers for the Campus

Internet Routing Protocols Lecture 04 BGP Continued

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

BGP Convergence in much less than a second Clarence Filsfils - cf@cisco.com

Network Tomography and Internet Traffic Matrices

DDoS Mitigation Techniques

Passively Detecting Remote Connectivity Issues Using Flow Accounting. 2nd EMANICS Workshop on Netflow/IPFIX usage in network management

and reporting Slavko Gajin

Anomaly detection. Problem motivation. Machine Learning

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

CAREN NOC MONITORING AND SECURITY

INTRODUCTION TO FIREWALL SECURITY

Intrusion Detection Systems (IDS)

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

The methodology. Interne. 1 Introduction

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Netflow Overview. PacNOG 6 Nadi, Fiji

Using Lancope StealthWatch for Information Security Monitoring

Challenges in Cyber Security Experiments: Our Experience

Traffic Monitoring using sflow

Windows Wiping. Analysis of several secure deletion software products

Load Balance Mechanism

SNMP Simple Network Measurements Please!

Using NetFlow for Anomaly Detection in Operational Networks

Choosing a Computer for Running SLX, P3D, and P5

Firewalls P+S Linux Router & Firewall 2013

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

STEALTHWATCH MANAGEMENT CONSOLE

Report of Independent Auditors

Choosing a Single Sign-on solution FIVE things you MUST consider 1

Network-Wide Change Management Visibility with Route Analytics

DDOS in academic Networks. Herramientas para la seguridad prevención y mitigación de DDOS. CSUC. 3 de Abril 2014

NetFlow Performance Analysis

SA3: Support for Multi-Domain Services Plenary

Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos

Build Your Business with Mobile

Quick guide: Selecting an IT solution for your Business

Protocols. Packets. What's in an IP packet

SecureTrack. Securing Network Segments and Optimizing Permissive Rules with the Automatic Policy Generator.

Network Traffic Analysis of the Internet 2 using OSU Flow-Tools

Cisco dan Hotel Crowne Plaza Beograd, Srbija.

DNS Best Practices. Mike Jager Network Startup Resource Center

Detecting Network Anomalies. Anant Shah

CTS2134 Introduction to Networking. Module Network Security

Implementing MDaemon as an Security Gateway to Exchange Server

NetFlow & BGP multi-path: quo vadis?

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

La Sicurezza e la qualità dei dati nella Gestione dell impresa. Luigi V. Mancini mancini@di.uniroma1.it Tel or 8537

Automatic Network Protection Scenarios Using NetFlow

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Peering Analysis: GenieATM 6000 July 2013

Metric Matters. Dain Perkins, CISSP

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot

2011 Pearson Education. Elasticities of Demand and Supply: Today add elasticity and slope, cross elasticities

How do I load balance FTP on NetScaler?

Cisco NetFlow Reporting Instruction Manual Version 1.0

MikroTik Invisible Tools. By : Haydar Fadel 2014

Whitepaper. NetFlow vs. sflow: A Technical Review. plixer. International

FIREWALL AND NAT Lecture 7a

SolarWinds Log & Event Manager

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Comprehensive IP Traffic Monitoring with FTAS System

IPv6 over IPv4/MPLS Networks: The 6PE approach

- Classful vs. Classless Routing -

Bond Pricing Fundamentals

How to configure an Advanced Expert Probe as NetFlow Collector

WatchGuard XCS Exam Study Guide

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

How good can databases deal with Netflow data

Invisible attacks visible in your network. How to see and follow the tracks?

Network Management & Monitoring

A Talari Networks White Paper. Turbo Charging WAN Optimization with WAN Virtualization. A Talari White Paper

Part I: Overview. Core concepts presented:

Introduction to perfsonar

Network Security Policy: Best Practices White Paper

VIDEO TRANSCRIPT: Content Marketing Analyzing Your Efforts 1. Content Marketing - Analyzing Your Efforts:

Transcription:

A Quantitative Cross Comparative Analysis of Tools for Anamoly Detection Wayne Routly DANTE Riga, 20 th Jan. 2008

Quite obviously. For a small organization, doing a quantitative cross comparison of commercial tools for network security is lengthy and difficult

Moving on 1. The Problem 2. The Tools 3. What Are We Looking For? 4. The Process 5. The RESULTS!!! 6. In Conclusion

The Problem. 1.. A Transit Network 2. +/- 10 Million Speaking Hosts Per Day 3. 10Gbps Links 4. Unusual Traffic 1. Large FTP Transfers 2. Legitimate SSH & DNS Traffic 5. Intercontinental Peerings

The Difficult Part. You must give the tools the same data You must understand different tool terminology You must tune the tools to give similar results And you ll never get them to see exactly the same things You must not just trust the tool results, but verify them with other means Raw NetFlow analysis via NfSen, exchange of evidence with friendly CERTs You must work out your success criteria

Lengthy very lengthy It took us more than one year Preparation: 6-7 months Shortlist vendors, get in touch with them, convince them to engage in a comparative trial with no upfront commitment, make them spell out a price figure even before the trial, set up the legal bit, get the boxes delivered, installed and configured One (established) vendor pulled out (we remained with 3) Tool learning curve and tuning: 3-4 months Comparative testing: 1 month Result analysis and reporting: 1 month

What if you can t afford all that? 1. You decide on the basis of vendor s visits (cool! ) 2. You buy the cheapest, or the more expensive, but not what you need (cool! ) 3. You buy what others have bought, for their own network and needs (cool! ) 4. You don t buy at all (cool! ) We re showing some results, today, but we don t want you to convince to buy either or the two (best performing tools) we tested But we d very much like to discuss how small CERTs could share these experiences (and that d be really cool! )

The Good Stuff the Tools StealthWatch Lancope Per Host Behavioral Analysis Requires 1 Point to be Defined Normally Found in Campus Networks Netreflex - Guavus Fuses BGP & ISIS Data Creates a 18 x 18 Router Matrix

The Process 13 days of cross comparative testing (balancing MM - WR) 1066 Investigated anomalies, results precision bounds estimated 14 Anomoly Types Analyzed raw netflow using nfsen Certain Events forwarded to CERTS for Confirmation

THE RESULTS

True and False Positives SW 32.8 anomalies per day, followed by NetReflex (21.7) Number of false positives is 28% in SW, 21% in NetReflex

Type of Anomolies Scan vs DoS Other? No. of Anomolies Per Tool

Scan types

(D)DoS types

Origin of Anomalies (1/2) Stealthwatch & NRENS Unknown? Netreflex Balanced

Origin of Anomalies (2/2) DWS Clients =GRNET Several? International SRC s versus NRENs? Several: multipoint origin Unknown: could not track origin Others: 1 single, identified origin (but not within top 3)

Destination of Anomalies SW, Scans & NRENS NR versus SW Several: multipoint dest. Unknown: could not track dest. Others: 1 single, identified dest. (but not within top 3)

Origin and type: SealthWatch 30 25 20 15 10 SCAN (D)DoS OTHER 5 0 NRENs NON NREN UNKNOWN SCANS Feature Prodominatly Primarily NRENS as SRCs 18 16 14 12 10 8 6 4 2 0 GRNET CARNET FCCN ROEDUNET OTHER SCAN (D)DoS OTHER

Origin and type: NetReflex 9 8 7 6 5 4 3 2 1 0 NRENs NON NREN UNKNOWN 12 10 SCAN (D)DoS OTHER Fair Anomaly Type Distribution 8 6 4 SCANS (D)DoS OTHER Dispersion of NREN & Non NREN SRCs 2 0 CHINA SEVERAL ROEDUNET INTERNET2 OTHER

In Conclusion Aquired Anomaly Detection Tools To Trial Installed, Configured, Tweaked.and Tweaked Again Captured & Investigated over 1000 events in 13 days Cross-compared results amongts all tools and validated results..and the descision is??????

Questions? THANK-YOU