Monitoring of Internet traffic and applications



Similar documents
Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles Sophia Antipolis, France

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Lecture 12: Network Management Architecture

Network Traffic Characterization using Energy TF Distributions

Java Modules for Time Series Analysis

Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication

Packet TDEV, MTIE, and MATIE - for Estimating the Frequency and Phase Stability of a Packet Slave Clock. Antti Pietiläinen

Business case for VoIP Readiness Network Assessment

Evaluation & Validation: Credibility: Evaluating what has been learned

IP Network Monitoring and Measurements: Techniques and Experiences

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent

Conclusions and Future Directions

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Large-Scale IP Traceback in High-Speed Internet

Network Performance Monitoring at Small Time Scales

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

CS Computer and Network Security: Intrusion Detection

Chapter 4 Customizing Your Network Settings

Detecting Network Anomalies. Anant Shah

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

Internet Infrastructure Measurement: Challenges and Tools

Kalman Filter Applied to a Active Queue Management Problem

5 Signal Design for Bandlimited Channels

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

Experimentation driven traffic monitoring and engineering research

Leak Detection Theory: Optimizing Performance with MLOG

Question: 3 When using Application Intelligence, Server Time may be defined as.

Passive Queue Management

ANALYZER BASICS WHAT IS AN FFT SPECTRUM ANALYZER? 2-1

Measurement Study of Wuala, a Distributed Social Storage Service

Cisco Bandwidth Quality Manager 3.1

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Testing Protocols for the Internet of Things and Coexistence with Wi Fi Networks

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Adaptive Tolerance Algorithm for Distributed Top-K Monitoring with Bandwidth Constraints

Cisco IOS Flexible NetFlow Technology

An apparatus for P2P classification in Netflow traces

Software-Defined Traffic Measurement with OpenSketch

Effect of sampling rate and monitoring granularity on anomaly detectability

CSC574 - Computer and Network Security Module: Intrusion Detection

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Anomaly Detection and Predictive Maintenance

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Bluetooth voice and data performance in DS WLAN environment

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

Lecture 8: Signal Detection and Noise Assumption

Costs and Benefits of Reputation Management Systems

Limitations of Packet Measurement

Stability of QOS. Avinash Varadarajan, Subhransu Maji

Detecting Flooding Attacks Using Power Divergence

P2P Traffic Manager. L7 Internet Security. IP Appliance Products

Active Queue Management

PeerRush: Mining for Unwanted P2P Traffic

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

On Entropy in Network Traffic Anomaly Detection

DeltaV System Health Monitoring Networking and Security

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Data Science Center Eindhoven. Big Data: Challenges and Opportunities for Mathematicians. Alessandro Di Bucchianico

Smart Queue Scheduling for QoS Spring 2001 Final Report

Anomaly detection. Problem motivation. Machine Learning

SNMP Monitoring: One Critical Component to Network Management

Application Performance Management - Deployment Best Practices Using Ixia- Anue Net Tool Optimizer

Role of Anomaly IDS in Network

Wireless LAN Concepts

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down

Obfuscation of sensitive data in network flows 1

Internet Management and Measurements Measurements

KEITH LEHNERT AND ERIC FRIEDRICH

Alteon Global Server Load Balancing

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Efficient model-based leak detection in boiler steam-water systems

Designing, Securing and Monitoring a/b/g/n Wireless Networks

The ArubaOS Spectrum Analyzer Module

Transcription:

Monitoring of Internet traffic and applications Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group ETH Zurich October 2009 Email: Chadi.Barakat@sophia.inria.fr WEB: http://www.inria.fr/planete/chadi

Our goal Efficient solutions for passive and active network monitoring Passive monitoring: use the existing, don t inject more traffic Active monitoring: measure the Internet by injecting probes Features: Reduce the overhead of passive monitoring Volume of collected traffic, memory access, processing Reduce the volume of probes to be injected into the network Targeted applications: network troubleshooting and topology mapping Congestion control for data collection and network probing Our TICP protocol: Transport Information Collection Protocol, http://www.inria.fr/planete/chadi/ticp/ Chadi Barakat - 12/10/2009 2

An example of two activities Application identification from packet measurements What can we learn on applications from packet sizes? Is it possible to avoid port numbers and payload inspection? Networking 2009 in Aachen, Germany. Analysis of packet sampling in the frequency domain How packet sampling impacts the spectrum of network traffic? Is there a way to preserve frequencies? Supported by the ECODE FP7 strep project with Alcatel-Lucent, LAAS, U. Lancaster, U. Liege, U. Louvain (Sep 2008 to Sep 2011) http://www.ecode-project.eu/ Chadi Barakat - 12/10/2009 3

Application identification from packet sizes: Learning phase Collect real packet traces where we know the reality of applications Construct density spaces for packet sizes One space per packet size order (first packet of an application, second packet of an application, etc) Plus and minus for the direction of the packet x: size of packet of order i of Application 1 x: size of packet of order i of Application 2 xxxx xx xx xxx xxx xxx Cluster the dots and calculate weights per cluster per application 0 Chadi Barakat - 12/10/2009 4

Application identification from packet sizes: Classification phase On the fly Capture a packet from an application, get its size Go to the corresponding space and cluster, then calculate probability per application Update a global likelihood function per application Stop when either a threshold is reached Or a maximum number of iterations is reached Map the flow to the most likely application Chadi Barakat - 12/10/2009 5

Applications - Originality That remains a probabilistic method But it works with encrypted packets and non standard ports Can help administrator to raise alarms and trigger further inspection of a given application flow Originality of the work: A clustering space per packet order which allows the method to scale to further packets At the expense of ignoring correlation between packet sizes (measurements show it to be low) Current work focus on other compression/clustering methods For more details: M. Jaber and C. Barakat, Enhancing Application Identification by Means of Sequential Testing, in proceedings of IFIP Networking 2009. Chadi Barakat - 12/10/2009 6

Prior work: One joint space for all packets Global accuracy: True positive The accuracy decreases after the fourth packet because of the complexity of the joint space Gain in accuracy when monitoring the first few packets Chadi Barakat - 12/10/2009 7

Our case: One space per packet - Sequential testing Global accuracy: True positive Different confidence levels in the port number Accuracy keeps improving and can reach very high value Chadi Barakat - 12/10/2009 8

Accuracy per application Per application accuracy Chadi Barakat - 12/10/2009 9

False positive per application Per application false positive Chadi Barakat - 12/10/2009 10

Why? The Likelihood per application The likelihood to be WEB After few packets tested, there is a clear separation in the likelihood to be WEB between applications Chadi Barakat - 12/10/2009 11

The Likelihood per application The likelihood to be POP3 Chadi Barakat - 12/10/2009 12

Time between packets adds noise Global accuracy: True positive Time between packets represents network conditions more than application behaviors Chadi Barakat - 12/10/2009 13

Analysis of packet sampling in the frequency domain Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group Joint work with Alfredo Grieco Politechnico di Bari, Italy Email: Chadi.Barakat@sophia.inria.fr WEB: http://www.inria.fr/planete/chadi

Motivation: Packet sampling Packet sampling, a technique to reduce the monitoring load on routers Chadi Barakat - 12/10/2009 15

Motivation: Packet sampling Packet sampling, a technique to reduce the monitoring load on routers Chadi Barakat - 12/10/2009 15

Motivation: Packet sampling Packet sampling, a technique to reduce the monitoring load on routers Chadi Barakat - 12/10/2009 15

Motivation: Packet sampling Packet sampling, a technique to reduce the monitoring load on routers Chadi Barakat - 12/10/2009 15

Motivation: Packet sampling Packet sampling, a technique to reduce the monitoring load on routers How does the monitoring of the sampled traffic compare to the original one? How to perform the inversion? Chadi Barakat - 12/10/2009 15

Motivation: Related work Many papers have studied the problem with stochastic tools (Duffield et al, Veitch et al, Estan et al, Diot et al, Zseby et al) Packets or flows form a population Sampled randomly then measured Inversion aim at reducing some error function Minimize mean square error Maximize likelihood Preserve some ranking measure Inverted metrics: traffic volume, flow size distribution, heavy hitter detection, flow counting, etc How does packet sampling impact the spectrum of the traffic? Chadi Barakat - 12/10/2009 16

Outline Models for traffic and spectrum Analysis of packet sampling Aliasing noise and its removal by low pass filtering The Filter-Bank solution Simulation results Conclusions Chadi Barakat - 12/10/2009 17

Traffic model and spectrum Traffic: A time series of packets of different sizes d n Measured traffic rate: Divide time into small bins Volume of bytes per bin divided by bin length T The larger the bin the coarser the measurement Targeted traffic spectrum: Spectrum of the binned traffic rate Bytes Energy of different frequency components Energy Freq Chadi Barakat - 12/10/2009 18 T 2T 3T 4T Time

Spectrum and sampling No sampling: Spectrum depends on the binning interval T Binning with time window T === low pass filtering with band 0.445/T The bin defined the maximum frequency of interest All frequency oscillations less than 0.445/T are left With packet sampling: Less packets Different spectrum of binned traffic For some bin T, are frequencies preserved? Given sampling rate, is there any minimum T to use? IMC - 05/11/2009 5

Analysis: No Sampling Let D(f) be the spectrum of the original traffic Traffic discretized in tiny time slots t 0 Periodic spectrum of period 1/t 0 Energy D(f) = D 0 (f+n/t 0 ) -1/t 0 -f M 0 f M 1/t 0 Suppose the existence of a maximum frequency f M with 0 < f M < 1/t 0 An example of a real baseband IMC - 05/11/2009 6

Analysis: No Sampling, With Binning Binning equivalent to low pass filtering Energy Freq -1/t 0 -f M 0 f M 1/t 0 Convolution with a low pass filter of band 0.445/T Energy of signal of interest Freq -1/t 0 -f M 0 f M 1/t 0 IMC - 05/11/2009 7

Analysis: Sampling Traffic sampled with rate p < 1 Let D p (f) be the spectrum of the sampled traffic Result: A replication of D 0 (f) with period p/t 0 in the band of interest Scaled down by p Energy Freq -1/t 0 -f M 0 f M 1/t 0 Energy D(f) p D 0 (f+n.p/t 0 ) -p/t 0 -f M 0 f M p/t 0 Freq IMC - 05/11/2009 8

Analysis: Sampling, With Binning By binning and scaling up by 1/p, one can recover the signal of interest Energy Freq -p/t 0 -f M 0 f M p/t 0 Energy of signal of interest -f M 0 f M Freq IMC - 05/11/2009 9

Aliasing for small sampling rates The smaller the sampling rate, the closer the replicas There is a sampling rate below which they overlap Energy -2p/t 0 -p/t 0 0 p/t 0 2p/t 0 If the binning is not coarse enough, aliasing occurs. We get a noisy signal. Energy Freq Freq -2p/t 0 -p/t 0 0 p/t 0 2p/t 0 IMC - 05/11/2009 10

Aliasing in the baseband IMC - 05/11/2009 11

Aliasing noise elimination For a traffic of maximum frequency f M in the baseband Either increase the sampling rate to avoid the overlap of replicas in the band of interest Always work Or increase the binning interval T Will not work if p/t 0 < f M General result: Spectrum of the binned traffic is preserved upon traffic sampling if and only if 0,445 / T < p/t 0 -f M IMC - 05/11/2009 12

Determining the bin to use A traffic already sampled Further downsampling possible, but not upsampling No information on the maximum frequency in the baseband How to know the right bin? Increasing the bin size alone is not enough The energy decreases with Our solution: Filter-Bank to check Traffic Variance (Energy) Take a bin size Further increase the sampling rate If energy (variance) quickly drops, aliasing exists If energy (variance) slowly decays, the bin size is fine IMC - 05/11/2009 13

Sampling rates vs bin sizes Over a long trace from the Japanese MAWI project Min Sampling Rate Worst performance Estimation Error Bin size in seconds Mean performance Chadi Barakat - 12/10/2009 28

Conclusions A better method for classifying applications using their packet sizes An analysis of packet sampling in the frequency domain An expression relating: Sampling rate Maximum frequency in the baseband Minimum binning interval in order to avoid aliasing and sampling noise Future plans: More applications to classify, especially P2P applications Estimate the amount of noise caused by aliasing Chadi Barakat - 12/10/2009 29