Chuck Cranor, Ted Johnson, Oliver Spatscheck

Similar documents
Gigascope: A Stream Database for Network Applications

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

SolarWinds Certified Professional. Exam Preparation Guide

Limitations of Packet Measurement

Comprehensive IP Traffic Monitoring with FTAS System

Network Monitoring and Traffic CSTNET, CNIC

Observer Analysis Advantages

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Cisco IOS Flexible NetFlow Technology

Flow Analysis Versus Packet Analysis. What Should You Choose?

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

Observer Probe Family

UltraFlow -Cisco Netflow tools-

Network Performance Channel

Best Practices for NetFlow/IPFIX Analysis and Reporting

MASSIF: A Highly Scalable SIEM

Experimentation driven traffic monitoring and engineering research

Maintaining Non-Stop Services with Multi Layer Monitoring

Structured Threats 21 External Threats 22 Internal Threats 22 Network Attacks 22 Reconnaissance Attacks 22 Access Attacks 23 Data Retrieval 23 System

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Network Management and Monitoring Software

Network Security. Network Packet Analysis

Introduction. The Inherent Unpredictability of IP Networks # $# #

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

PANDORA FMS NETWORK DEVICES MONITORING

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Choosing Tap or SPAN for Data Center Monitoring

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

Experiences Deploying and Operating a Large-Scale Monitoring Infrastructure

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Network Management & Security (CS 330) RMON

PANDORA FMS NETWORK DEVICE MONITORING

Beyond Monitoring Root-Cause Analysis

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

Data Analysis Load Balancer

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Gaining Operational Efficiencies with the Enterasys S-Series

Virtual Private Network Using Peer-to-Peer Techniques

NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE

QRadar Security Intelligence Platform Appliances

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA

End-to-End Network Centric Performance Management

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Cisco Bandwidth Quality Manager 3.1

"Charting the Course...

Open Source in Network Administration: the ntop Project

Selecting a Network Recorder for back-in-time analysis to solve intermittent problems and unexpected events

Denial of Service Attacks and Countermeasures. Extreme Networks, Inc. All rights reserved. ExtremeXOS Implementing Advanced Security (EIAS)

mbits Network Operations Centrec

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Integration with CA Transaction Impact Monitor

Introducing FortiDDoS. Mar, 2013

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

Wireshark Developer and User Conference

Cisco NetFlow Generation Appliance (NGA) 3140

Dell SonicWALL report portfolio

8. 網路流量管理 Network Traffic Management

Flow Analysis. Make A Right Policy for Your Network. GenieNRM

Network Instruments white paper

Device Discover: A Component for Network Management System using Simple Network Management Protocol

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

LUCOM GmbH * Ansbacher Str. 2a * Zirndorf * Tel / * Fax / *

Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

Network Probe. Figure 1.1 Cacti Utilization Graph

Strategies to Protect Against Distributed Denial of Service (DD

HP IMC User Behavior Auditor

Question: 3 When using Application Intelligence, Server Time may be defined as.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

UKCMG Industry Forum November 2006

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Netflow Overview. PacNOG 6 Nadi, Fiji

Secure Networks for Process Control

BlackRidge Technology Transport Access Control: Overview

Whitepaper. 10 Metrics to Monitor in the LTE Network. blog.sevone.com

Technical Note. ForeScout CounterACT: Virtual Firewall

Chapter 11 Cloud Application Development

4 Internet QoS Management

Basic & Advanced Administration for Citrix NetScaler 9.2

Understanding Slow Start

Administrator Guide. CA Multi-Port Monitor. Version 10.2

Cover. White Paper. (nchronos 4.1)

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Beyond Monitoring Root-Cause Analysis

Query-Aware Partitioning for Monitoring Massive Network Data Streams

Infrastructure for active and passive measurements at 10Gbps and beyond

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

WhatsUpGold. v3.0. WhatsConnected User Guide

Ethernet-based Software Defined Network (SDN)

Network Management. 8.1 Centralized Monitoring, Reporting, and Troubleshooting Monitoring Challenges and Solutions CHAPTER

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Frequently Asked Questions

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

SERVICE LEVEL MONITORING WITH DORADO SOFTWARE S REDCELL SUITE. Scaling IT for the Front Office

Transcription:

Gigascope: How to monitor network traffic 5Gbit/sec at a time. Chuck Cranor, Ted Johnson, Oliver Spatscheck June, 2003 1

Outline Motivation Illustrative applications Gigascope features Gigascope technical details Conclusion 7/7/03 2

Motivation Network monitoring is required to maintain network: Security Reliability Performance What does that mean? The monitoring tool has to Be flexible enough to allow the operator to react in Internet time Achieve high speeds GETH OC48 (2.48Gbit/sec full duplex) OC192 (9.92Gbit/sec full duplex) Be inexpensive Have a small form factor to allow retrofitting Be reliable Be remotely manageable All 7 layers need to be monitored 7/7/03 3

Existing Solutions Use tcpdump and analyze data off line Solution does not scale to even moderate line rates Very expensive due to disk cost and space Standard tools such as: SNMP, RMON, Netflow Do not cover layer 7 in a scalable fashion Do not allow changes to the aggregation type at Internet time Proprietary vendor products (sniffer.com, NARUS, handcrafted libpcap tool, ) Do not allow changes to the aggregation type at Internet time => We address those shortcomings with Gigascope, a fast and flexible network monitoring platform 7/7/03 4

Outline Motivation Illustrative applications Gigascope features Gigascope technical details Conclusion 7/7/03 5

Case 1: End-to-end TCP Performance Monitoring Business Challenge: Customer wanted to monitor the TCP performance of all active clients to identify performance problems Current Approach: Netflow and SNMP data do not address end-to-end performance Issues: To perform this task accurately, the TCP session state of all current TCP connections has to be tracked to identify active TCP connections 7/7/03 6

Case 1: Solution Gigascope module was used to track all active TCP connections and calculate the average connection throughput Gigascope TCP performance analysis tool will report: Latency Loss rate Applicable to both real-time performance monitoring and network/application troubleshooting 7/7/03 7

Case 2: Hidden Traffic Detection Business Challenge: Customer suspected a large volume of peer-to-peer traffic within its network and wanted to more accurately determine the volume of this traffic Current Approach: Typically Netflow is used to determine P2P traffic volumes using the TCP port number found in the netflow data Issues: P2P traffic might not use the known P2P port numbers 7/7/03 8

Case 2: Solution Gigascope was used to search for P2P related key words within the content of each TCP datagram Gigascope identified 3 times more traffic as P2P than Netflow measurements 7/7/03 9

Case 3: Custom Monitoring Business Challenge: Customer wanted to monitor performance of a critical custom application, in particular: Client application layer metrics (latency, loss) Clients starting and ending the application Current approach: Netflow and SNMP data do not address end-to-end performance Issues: Commercially available tools do not support analysis of this application protocol 7/7/03 10

Case 3: Solution A Gigascope custom query was written to track the requested metrics in real time and display them in our data warehouse SQL-based query language allowed development in less than 1 week In addition: The resulting data was analyzed to reverse engineer the protocol s performance requirements The data was correlated with Netflow and routing data to perform root cause analysis on service interruptions 7/7/03 11

Outline Motivation Illustrative applications Gigascope features Gigascope technical details Conclusion 7/7/03 12

Gigascope Features and Functions Gigascope is a fast, flexible packet monitoring platform Extremely flexible SQL-based interface Available for: High performance at speeds up to OC48 (2 * 2.48 Gbit/sec) with a single probe Lower cost at lower speeds Apple PowerBook version available for portable use Small size (2U form factor for OC48 version) Current libraries include: Netflow compatible records Traffic matrix by site or AS Detection of hidden P2P traffic End-to-end TCP performance monitoring Detailed custom performance statistics More under development 7/7/03 13

Gigascope Typical Data Collection Method Data is gathered using the following steps: 1. Raw data feed is provided by a: Optical splitter Electrical splitter Monitoring/SPAN port 2. Gigascope extracts aggregated records from the data feed in real time 3. Gigascope stores data on local RAID 4. Data is copied in real time or during off peak hours to data warehouse for further analysis. SSH secured back channel Tools allow rate limiting to prevent the Gigascope from flooding the network 5. Data is analyzed and/or joined with other data feeds using Daytona or other tools in the data warehouse 6. Result is displayed, or used for alarming, or to generate customized reports Optional features: Alarms can be generated on the Gigascope directly Data can be stored on the Gigascope and only uploaded to data warehouse if needed E.g., additional data can be uploaded after a Denial of Service attack to enable forensic analysis. 7/7/03 14

Outline Motivation Illustrative applications Gigascope features Gigascope technical details Conclusion 7/7/03 15

Main Components of Gigascope build query run query application queries query compiler FTA module clearinghouse device interface Query compiler: translate GSQL queries into multiple FTA modules (C or C++) FTA module: filters, transforms, and aggregates network data Application: allocates and configures a set of FTAs collects output of FTAs and does something with it Most common application is the printapp which writes the query output to disk Clearinghouse: manages and tracks all FTAs, manages all IPC, tracks available network input devices Device and firmware interface: manages hardware and/or libpcap 7/7/03 16

Run Time Architecture application processes perl application c/c++ application HFTA processes net interface processes LFTA code dag driver HFTA HFTA LFTA ctrl tigon driver LFTA code pcap driver clearinghouse hardware dag oc48/gige tigon gige LFTA code generic netif 7/7/03 17

Query Language Gigascope queries are written in GSQL Similar to SQL Support for stream database queries Stream fields can have ordering properties Deduce when aggregates are closed and thus can be flushed to the output stream Each query: Receives one or more tuple streams as input Generates one tuple stream as output Currently limited to selection, aggregation, views, joins and merges Query compiler maps logical query topology to an optimized FTA processing topology 7/7/03 18

GSQL Input PROTOCOL IP (Layer2) { uint ipversion get_ip_ipversion (snap_len 23); } PROTOCOL IPV4 (IP){ uint hdr_length get_ipv4_hdr_length (snap_len 34); uint service_type get_ipv4_tos (snap_len 34); uint total_length get_ipv4_total_length (snap_len 34); uint id get_ipv4_id (snap_len 34); bool do_not_fragment get_ipv4_do_not_fragment (snap_len 34); bool more_fragments get_ipv4_more_fragments (snap_len 34); uint offset get_ipv4_offset (snap_len 34); uint ttl get_ipv4_ttl (snap_len 34); uint protocol get_ipv4_protocol (snap_len 34); continues.. GSQL queries receive raw data from low level schemas which are: Defined on the packet level Use inheritance from lower network layer Current schemas cover Layer 2: ETH/HDLC Layer 3: IP/IPv4 Layer 4: UDP/TCP/ICMP Layer 5-7: Packet data New schemas can be defined by: Specifying the schema in the GSQL configuration file Providing C parser functions for the fields in the schema RTS and GSQL compiler highly optimize the field extraction 7/7/03 19

Filtering and Aggregation Select tb, srcip, sum(len) From IPv4 Where protocol=6 Group by time/60 as tb, srcip Having count(*)>5 Basic GSQL queries supports filtering and aggregation GSQL is similar to SQL and allows: Selection and filtering Aggregation over schema fields which are increasing (e.g. time) Filtering over aggregates GSQL queries can be defined over: Low level schemas The output of other GSQL queries or Views 7/7/03 20

Combining Tuple Streams Merge P1.time, P2.time From PacketSum1 P1, PacketSum2 P2 Problem Data is collected on multiple network interface cards; for example: to monitor one OC48 full duplex line two OC48 interfaces are required. Some queries are most easily formulated on a single data stream. Solution GSQL supports stream merges Stream merges Combine two streams with identical fields Maintain the temporal properties of the merge field (e.g. time is still increasing in the joined stream) 7/7/03 21

Selectively Combining Tuple Streams select S.timestamp, S.sourceIP, S.destIP, S.source_port, S.dest_port, (A.timestamp - S.timestamp) as rtt INNER_JOIN from tcp_syn S, tcp_syn_ack A where S.sourceIP = A.destIP and S.destIP = A.sourceIP and S.source_port = A.dest_port and S.dest_port = A.source_port and S.tb = A.tb Problem How to selectively combine diverse tuple streams Solution Joins provide an efficient way of selectively combining multiple diverse tuple streams GSQL joins Preserve the temporal properties of temporal fields which are used in equalities Current restriction: one temporal field of each input stream has to be used in an equality relationship with a temporal field of the other stream 7/7/03 22

Integrating Complex Algorithms OPERATOR_VIEW tcp_perf { OPERTOR(file tcp_perf ); FIELDS { UINT time (increasing); UINT srcip; UINT destip; UINT srcport; UINT destport UINT loss_rate_estimate; } SUBQUERIES { tcpq (UINT time (increasing) UINT srcip, UINT destip, UINT srcport, UINT destport, UINT seqnum, UINT acknum ); } SELECTION_PUSHDOWN { time -> tcpq.time; srcip -> tcpq.srcip; destip -> tcpq.destip; srcport -> tcpq.srcport; destport -> tcpq.destport; } } Problem How to reuse prior and ongoing work in efficient networking algorithms Solution GSQL views GSQL views Allow user to handcode FTAs Provide syntax and semantic of the input/output datastreams of handcoded FTA to GSQL Optimize automatically surrounding FTAs Example uses: IP/TCP reassembly TCP performance 7/7/03 23

Cheaply Integrating Complex Algorithms Definitions: uint FUN getlpmid(uint, string HANDLE); PRED str_regex_match[string, string HANDLE]; string FUN [PARTIAL] str_extract_regex( string, string HANDLE); Example use: select getlpmid(srcip, bgp.dat ), str_extract_regex(tcp_data, HOST[^\n]* ) from TCP where str_regex_match[tcp_data, HTTP1 ] Each view requires its own FTA and therefore its own thread. fi Views are heavy weight External functions are a less expensive alternative. External functions: Are integrated into an auto generated FTA Can be used as: Functions Predicates Do not have a thread Can have state Can produce one or none output per call but no more Examples: String search Longest Prefix Match 7/7/03 24

An Example Query Collection Output Tuple Stream Output Tuple Stream BASIC QUERY VIEW MERGE JOIN BASIC QUERY BASIC QUERY BASIC QUERY BASIC PACKET LEVEL SCHEMAS 7/7/03 25

Example Deployment INTERNET Access Router Access Router GETH SPAN PORT To management VPN GETH SPAN PORT GETH GETH GIGASCOPE Customer Equipment 7/7/03 26

Performance of Example Deployment Gigascope is configured to track: Number and IP address of all user Detailed performance statistics of 5% of all user including: Client latency Client loss Server latency Server loss All ICMP unreachable messages In this setup Gigascope monitors at peak times: 90000 users > 1 million packets per second > 1.4 Gbit/sec Gigascope has been operational since 11/2002 7/7/03 27

Data Reduction Rates 900 800 700 600 500 400 300 200 100 0 Reduction Ratio App1 App2 App3 One Gigascope benefit is to provide early data reduction through targeted aggregation. Data reduction rates are application specific Typical application: App1: Example Deployment App2: Detailed Accounting in 1 minute granularity App3: Detailed Accounting, P2P detection and TCP throughput monitoring Remark: All 3 applications are susceptible to DOS attacks 7/7/03 28

Conclusions Network monitoring requires the processing of streams of network data At high rates (OC48, OC192) Flexibly Inexpensively Gigascope is a stream database designed to address this problem 7/7/03 29