How To Monitor Network Traffic On A Network With A Network Monitor



Similar documents
LOBSTER: Large-Scale Monitoring of Broadband Internet Infrastructures An FP6 IST Research Infrastructures project

Worm Detection: Network-internal Mechanisms and Infrastructure

LOBSTER: Overview. LOBSTER: Large Scale Monitoring for Broadband Internet Infrastructure

Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS

SCAMPI Programmable hardware for network monitoring. Masaryk University

CyberSecurity Research in Crete

EU FP6 LOBSTER. personal view on the future of ero-day Worm Containment. European Infrastructure for accurate network monitoring

D4.4: Web-based Interactive Monitoring Application

Design of an Application Programming Interface for IP Network Monitoring

Appmon: An Application for Accurate per Application Network Traffic Characterization

Peer-to-peer networking. Jupiter Research

FlowMon. Complete solution for network monitoring and security. INVEA-TECH

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

ABW - Short-timescale passive bandwidth monitoring

Chapter 8 Security Pt 2

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

A progressive and integrated approach to protecting corporate networks

SonicWALL Unified Threat Management. Alvin Mann April 2009

Injazat s Managed Services Portfolio

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

FIREWALL POLICY DOCUMENT

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

IDS or IPS? Pocket E-Guide

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

The Truth about False Positives

INTRUSION DETECTION SYSTEMS and Network Security

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

CUTTING THROUGH THE HYPE: WHAT IS TRUE NEXT GENERATION SECURITY?

PEER-TO-PEER NETWORK

Braindumps QA

Security aspects of e-tailing. Chapter 7

with NetFlow Technology Adam Powers Chief Technology Officer

Huawei Network Edge Security Solution

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Chapter 9 Firewalls and Intrusion Prevention Systems

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

Infrastructure for active and passive measurements at 10Gbps and beyond

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Intruders and viruses. 8: Network Security 8-1

Unified Threat Management, Managed Security, and the Cloud Services Model

Cisco Small Business ISA500 Series Integrated Security Appliances

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Firewalls Overview and Best Practices. White Paper

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Cisco IPS Tuning Overview

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Εmerging Ways to Protect your Network

Threat Mitigation for VoIP

Cisco ASA 5500 Series Advanced Inspection and Prevention Security Services Module

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Flow-based detection of RDP brute-force attacks

Cisco ASA 5500 Series IPS Solution

HoneyBOT User Guide A Windows based honeypot solution

PROACTIVE PROTECTION MADE EASY

Sygate Secure Enterprise and Alcatel

An Integrated CyberSecurity Approach for HEP Grids. Workshop Report.

Payment Card Industry (PCI) Data Security Standard

The old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)

Network Security. Protective and Dependable. Pioneer of IP Innovation

[CEH]: Ethical Hacking and Countermeasures

Managed Service Plans

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Nemea: Searching for Botnet Footprints

Security Issues with Integrated Smart Buildings

Description: Objective: Attending students will learn:

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Radware s Attack Mitigation Solution On-line Business Protection

Cyber Security Survey

Are Second Generation Firewalls Good for Industrial Control Systems?

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

PROFESSIONAL SECURITY SYSTEMS

Introduction of Intrusion Detection Systems

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security MWC Nokia Solutions and Networks. All rights reserved.

Network Intrusion Prevention Systems Justification and ROI

Building A Secure Microsoft Exchange Continuity Appliance

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers

SonicWALL Team Nordic Recommendations for safe Unified Threat Management (UTM) Deployments*

Dynamic Rule Based Traffic Analysis in NIDS

PCI Security Scan Procedures. Version 1.0 December 2004

Transcription:

Network Monitoring for Performance and Security The SCAMPI and LOBSTER projects Kostas Anagnostakis Institute of Computer Science (ICS) Foundation for Research and Technology Hellas (FORTH) Crete, Greece

Talk Roadmap Motivation Understanding the Internet Performance, diagnosis and security EC-funded work on net. monitoring R&D: SCAMPI (2001-2004) Pilot Infrastructure: LOBSTER (2005-2007)

What is the problem? Poor network monitoring capabilities We suffer malicious cyberattacks such as viruses and worms, spyware, DoS/DDoS We do not know which applications are running on our networks Friendly fire : unintentional attacks to major Internet services

Cyberattacks continue to plague our networks Famous worm outbreaks: Summer 2001: Code-Red worm Infected 350,000 computers in 24 hours January 2003: Sapphire/Slammer worm Infected 75,000 computers in 30 minutes March 2004: Witty Worm Infected 20,000 computers in 60 minutes

Cyberattacks in palmtops and mobile phones PocketPC virus: Duts Mobile phone virus: Cabir Infects the Symbian operating system

Why do Cyberattacks continue to plague Internet? Defense against worms: Detection: minutes to hours (semi-manual) Identification (i.e., generate an IDS signature or firewall rule) Hours (manual) Deployment of signatures to firewalls/idss, and patching Minutes to hours

Why do Cyberattacks continue to plague Internet? II Attack detection, identification, and response/deployment takes hours Usually too late, when almost all computers have already been infected Can we respond faster to reduce the damage?

Why do Cyberattacks continue to plague Internet? III Can we respond before the damage is done? Yes! But we need: Smart, flexible, high-performance Internet monitoring sensors Capable of detecting new worms Distributed infrastructure of Internet traffic sensors More sensitive to attacks Pinpoint attacks as soon as they emerge Spread information about new worms fast

Problem II: Who generates all this traffic? 69% of the traffic is unaccounted-for Maybe belongs to p2p applications that use dynamic ports Maybe belongs to media applications The bottom line is: We don t know

Friendly Fire on the Internet Win 2K and Win XP computers Started updating root DNS servers Created significant load to DNS Not clear why

Problem summary Our understanding of the Internet needs to be improved The gap between what we can measure and what we need to measure is large and getting larger

Unaccounted traffic is increasing The gap continues to widen with time

Solution? We need better network monitoring: Faster: detect worms before they infect the planet More accurate: close the gap between what we know and what is really going on

SCAMPI and LOBSTER: two steps for better Internet Monitoring SCAMPI: a SCAlable Monitoring Platform for the Internet LOBSTER: Large Scale Monitoring of Broadband Internet Infrastructure

SCAMPI SCAMPI profile: IST R&D project Funded by European Commission Duration: 1/4/02-31/3/05

SCAMPI: Goals Develop a passive monitoring platform capture all network traffic and examine it Technology: Develop a 10 Gbps FPGA-based card Develop a Monitoring Application Programming Interface (MAPI) Develop efficient monitoring applications

SCAMPI: Achievements Security - high-speed intrusion detection: Find all packets that are being sent to my network and contain the CODE-RED worm Find all computers in my network that are infected with backdoors Security - DDOS attack detection Performance analysis What percentage of my traffic goes to KaZaA? What is my network latency to http://www.cnn.com?

SCAMPI: Achievements II Portability: MAPI has been ported to Commodity network interfaces Endace DAG packet capture cards SCAMPI 10 Gbit/s card Partial implementations also exist for Intel IXP network processors

SCAMPI: Achievements III MAPI provides high-level abstractions Ease of use More expressive: users can better communicate their monitoring needs to the system [NOMS 03] Faster: MAPI can capitalize on underlying specialpurpose monitoring hardware [MASCOTS 03] The end result: Improved network monitoring capability

SCAMPI: Achievements IV Speed FPGA-based card allows hardware implementation of important functions e.g. packet filtering/pre-processing Novel algorithms allow faster packet processing e.g. high-speed string searching [SEC03]

The LOBSTER infrastructure LOBSTER A network of passive Internet traffic monitors Cooperation: Exchange information and observations Correlate results

LOBSTER SSA LOBSTER profile: A Specific Support Action Funded by European Commission Two-year project: 1/1/05-31/12/06

Challenging issues I Trust: cooperating sensors may not trust each other Need to protect private and confidential information Achieved through multi-level anonymization techniques Limited access to internal users Outside users will be able to operate on anonymized data only

Challenging issues II Need a Common Programming Environment Use DiMAPI (Distributed Monitoring Application Programming Interface) MAPI developed within the SCAMPI project

Challenging issues III Resilience to attackers: What if intruders penetrate LOBSTER? Can they have access to private/confidential data? NO! Hardware anonymization The level of anonymization can be tuned by system administrators

Potential LOBSTER applications: traffic monitoring Accurate traffic monitoring how much of your bandwidth is going to file sharing applications such as Gnutella? Which application generates most of the traffic?

Potential LOBSTER applications: Early-warning systems Automatic detection of new worms Detect worms within minutes Early-warning Alert administrators+users about potential attacks Timely response to worms Generate attack signature

Potential LOBSTER applications: GRIDs GRID Performance debugging GRID-enabled applications highly dependent on network characteristics Remote data access Remote resource access (e.g. sensors, instruments) Remote computing power How can we perform complete diagnosis when applications are not working as expected? The local LAN? the WAN? The remote LAN? The local computer? The remote server? A middleware server?

Who can benefit from LOBSTER? NRNs/ISPs Better Internet traffic monitoring of their networks Better understanding of their interactions with other NRNs/ISPs Security analysis/researchers Access to anonymized data Access to anonymized testbed Study trends and validate research results Network and security administrators Access to a traffic monitoring infrastructure Access to early-warning systems Access to software and tools

Summary Our understanding of the Internet needs to be improved SCAMPI/LOBSTER will provide better network monitoring through High-end passive monitoring systems A distributed infrastructure of monitoring systems Trusted cooperation in an untrusted world Common programming platform Infrastructure resilience against attacks

Passive Network Monitoring: the SCAMPI and LOBSTER projects Kostas Anagnostakis Institute of Computer Science (ICS) Foundation for Research and Technology Hellas (FORTH) Crete, Greece

LOBSTER partners Research Organizations ICS-FORTH, Greece Vrije University, The Netherlands TNO Telecom, The Netherlands NRNs/ISPs, Associations CESNET, Czech Republic UNINETT, Norway FORTHNET, Greece TERENA, The Netherlands Industrial Partners ALCATEL, France Endace, UK

SCAMPI partners Research Organizations ICS-FORTH, Greece University of Leiden, The Netherlands Masaryk University, Czech Republic IMEC, Belgium NRNs/ISPs, Associations CESNET, Czech Republic UNINETT, Norway FORTHNET, Greece TERENA, The Netherlands Industrial Partners NETIKOS, Italy SIEMENS, Germany 4PLUS, Greece