How is SUNET really used?



Similar documents
Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Firewall Firewall August, 2003

Firewalls P+S Linux Router & Firewall 2013

An apparatus for P2P classification in Netflow traces

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Encrypted Internet Traffic Classification Method based on Host Behavior

Early Recognition of Encrypted Applications

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Distributed Systems. 2. Application Layer

Traffic Analysis of Mobile Broadband Networks

Second-generation (GenII) honeypots

How To Protect Your Network From Attack From A Hacker On A University Server

Sonian Getting Started Guide October 2008

CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION

EXPLORER. TFT Filter CONFIGURATION

Introduction of Intrusion Detection Systems

About Firewall Protection

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets

A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Chapter 2 Quality of Service (QoS)

LESSON Networking Fundamentals. Understand TCP/IP

Linux MDS Firewall Supplement

Network Security Fundamentals

A D M I N I S T R A T O R V 1. 0

modeling Network Traffic

Security Toolsets for ISP Defense

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

Signature-aware Traffic Monitoring with IPFIX 1

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

Kick starting science...

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Networking for Caribbean Development

Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Flow Based Traffic Analysis

Internet Security Firewalls

Keywords Attack model, DDoS, Host Scan, Port Scan

Chapter 11 Cloud Application Development

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Classification of Firewalls and Proxies

DoS/DDoS Attacks and Protection on VoIP/UC

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Computer Networks - CS132/EECS148 - Spring

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

ECE 578 Term Paper Network Security through IP packet Filtering

Analysis of Network Packets. C DAC Bangalore Electronics City

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Proxies. Chapter 4. Network & Security Gildas Avoine

Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect

Intercept Anti-Spam Quick Start Guide

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Assuring Your Business Continuity

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Fuzzy Network Profiling for Intrusion Detection

Internet Traffic Trends A View from 67 ISPs

Computer Networks CCNA Module 1

Introduction to Computer Security Benoit Donnet Academic Year

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Introduction to Firewalls

Network- vs. Host-based Intrusion Detection

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

IxLoad TM Adobe HDS Player Emulation

Firewalls. Chapter 3

Basic Network Configuration

Chapter 4: Security of the architecture, and lower layer security (network security) 1

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

DDoS Overview and Incident Response Guide. July 2014

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

Load Balance Router R258V

Protocols. Packets. What's in an IP packet

Networking Basics and Network Security

Introducing FortiDDoS. Mar, 2013

Customized Data Exchange Gateway (DEG) for Automated File Exchange across Networks

Linux MPS Firewall Supplement

1. Firewall Configuration

Transcription:

MonNet a project for network and traffic monitoring How is SUNET really used? Results of traffic classification on backbone data Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University of Technology Göteborg, Sweden

Introduction: Measurement location 2x 10 Gbit/s (OC-192) capturing headers only IP addresses anonymized tightly synchronized bidirectional per-flow analysis Stockholm Internet GSIX Regional Regional ISPs ISPs Göteborg GU Chalmers Other smaller Univ. and Institutes

Introduction: Motivation Problem: Operators don t know type of their traffic How to: Improve network design and provisioning? Support QoS support or security monitoring? Enhance accounting possibilities? Reveal trends and changes in network applications?

Introduction: Motivation (2) Solution: Network classification Four approaches in literature: 1. Port numbers + easy to implement - unreliable (P2P, malicious traffic) 2. Packet payloads + accurate - requires updated payload signatures - privacy and legal issues - high processing requirements

Introduction: Motivation (3) Solution: Network classification (contd.) 3. Statistical fingerprinting + no detailed packet information needed - depending on quality of training data - promising, but still immature 4. Connection patterns + no payload required + no training data required - not perfect accuracy

Introduction: Overview Connection classification Overview of proposed heuristics Verification of methodology Results Traffic volumes Diurnal patterns Signaling behavior Summary of more results

Methodology: Traffic Classification Two articles classify P2P flows according to connection patterns: Karagiannis et al., 2004 Perenyi et al., 2006 Updated classification heuristics: Refined the heuristics in prior articles Added new, necessary heuristics

Methodology: Proposed Heuristics Rules based on connection patterns and port numbers 5 rules for P2P traffic 10 rules to classify other types of traffic remove false positives from P2P Rules are applied: On flows in 10 minute intervals Independently on all flows and Prioritized when fetched from the database

Methodology: Proposed Heuristics (2) Heuristics for potential P2P traffic (H1-H5) All traffic to and from potential P2P hosts is marked as P2P traffic H1: TCP and UDP traffic between IP pair H2: Well known P2P ports H3: Re-usage of source port within short time H4: Non-parallel connections to endpoint (IP/Port) H5: unclassified, long flows unclassified by H1-H5 and F1-F10 more than 1MB in one direction or duration of more than 10 minutes

Methodology: Proposed Heuristics (3) Heuristics for other traffic (F1-F10) F1 and F2: Web servers: parallel connections to Web ports All traffic to and from Web server is Web-traffic F3: common services (DNS, BGP) Equal source and destination port and port<501 F4: Mail servers: Hosts receiving traffic on mail ports (smtp, imap, pop) while sending traffic via smtp All traffic to and from Mail servers is Mail-traffic

Methodology: Proposed Heuristics (3) Heuristics for other traffic (F1-F10) F5 and F6: Messenger and Gaming Hosts, connected to by a number of different IPs on wellknown messenger, chat or gaming ports within a period of 10 days All traffic to and from these hosts is messenger or gaming F7: FTP Active FTP with initiating port number of 20 F8: non P2P ports: Some well-known, privileged port numbers, typically not used by P2P like dns, telnet, ssh, ftp, mail, rtp, bgp

Methodology: Proposed Heuristics (3) Heuristics for other traffic (F1-F10) F9: malicious and attack traffic Scans through IP ranges Scans through port ranges DoS or hammering attacks to few hosts in high frequency F10: unclassified, known non-p2p Port unclassified by H1-H4 and F1-F9 (no connection pattern) Well known ports including Web, messenger and gaming

Verification of proposed heuristic Comparison of classification for P2P traffic # connections in 10 6 Amount of data in TB

Results: Traffic Volumes Application breakdown April 2006

Results: Traffic Volumes (2) Application breakdown April till Nov. 2006

Results: Diurnal Patterns Fractions of P2P data, April till November 1 0.9 0.8 0.7 0.6 0.5 0.4 Linear (2AM P2P data) Linear (10AM P2P data) Linear (14PM P2P data) Linear (20PM P2P data ) 0.3 0.2 0.1 0 1143000000 1148000000 1153000000 1158000000 1163000000

Results: Signaling Behavior Connection establishment for P2P, Web and malicious traffic

Summary of Results Traffic is increasing for TCP and UDP Highest activity during evening hours P2P dominating (~90 % of data volume) P2P peak time at evening and night-time Web peak time during office hours Fractions of P2P and Web constant Malicious traffic constant in absolute numbers 'background noise'

Summary of Results (2) Major differences in signaling behavior 43% of TCP P2P connections 1-packet flows (attempts) 80% of malicious TCP traffic 1-packet flows (scans) Web traffic behaving nicely Different TCP options deployment P2P behaves as expected Web traffic shows artifacts of client-server patter e.g. popular web-servers neglecting SACK option

References W. John and S. Tafvelin, Analysis of Internet Backbone Traffic and Anomalies observed, ACM IMC07, San Diego, USA, 2007. W. John and S. Tafvelin, Differences between in- and outbound Internet Backbone Traffic, TNC07, Copenhagen, DK, 2007. Available on: http://www.ce.chalmers.se/~johnwolf W. John and S. Tafvelin, Heuristics to Classify Internet Backbone Traffic based on Connection Patterns, accepted at IEEE ICOIN08 W. John and S. Tafvelin and Tomas Olovsson, Trends and Differences in Connection Behavior within Classes of Internet Backbone Traffic, submitted for publication Available on request: johnwolf@ce.chalmers.se or as Paper copy

MonNet a project for network and traffic monitoring Thank you very much for you attention! Questions?