FPGA based Network Traffic Analysis using Traffic Dispersion Graphs

Similar documents
Behavioral Graph Analysis of Internet Applications

A Framework for Rule Processing in Reconfigurable Network Systems

Graph-based Detection of Anomalous Network Traffic

Worm Detection, Early Warning and Response Based on Local Victim Information

Basic Concepts in Intrusion Detection

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 12

Traffic Dispersion Graph Based Anomaly Detection

MAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation. Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage

Fast and Evasive Attacks: Highlighting the Challenges Ahead

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

IDS: Signature Detection

Intrusion Detection by Combining and Clustering Diverse Monitor Data

Dynamically Configurable Online Statistical Flow Feature Extractor on FPGA


"Dark" Traffic in Network /8

BLINC: Multilevel Traffic Classification in the Dark

Piggybacking Network Functions on SDN Reactive Routing: A Feasibility Study

CSE 565 Computer Security Fall 2018

Exploiting Dynamicity in Graph-based Traffic Analysis: Techniques and Applications

Project Proposal. ECE 526 Spring Modified Data Structure of Aho-Corasick. Benfano Soewito, Ed Flanigan and John Pangrazio

Virtual CMS Honey pot capturing threats In web applications 1 BADI ALEKHYA, ASSITANT PROFESSOR, DEPT OF CSE, T.J.S ENGINEERING COLLEGE

Microsoft Advance Threat Analytics (ATA) at LLNL NLIT Summit 2018

Internet Traffic Classification Using Machine Learning. Tanjila Ahmed Dec 6, 2017

intelop Stealth IPS false Positive

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

RiceNIC. Prototyping Network Interfaces. Jeffrey Shafer Scott Rixner

Activating Intrusion Prevention Service

Statistical based Approach for Packet Classification

FIST: A Fast, Lightweight, FPGA-Friendly Packet Latency Estimator for NoC Modeling in Full-System Simulations

Link Homophily in the Application Layer and its Usage in Traffic Classification

Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine

Cisco ASA Next-Generation Firewall Services

Classification of Log Files with Limited Labeled Data

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models

Project Proposal. ECE 526 Spring Modified Data Structure of Aho-Corasick. Benfano Soewito, Ed Flanigan and John Pangrazio

Heavy-Hitter Detection Entirely in the Data Plane

TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE

Network Management without Payload Inspection: Application Classification via Statistical Analysis of Bulk Flow Data

AS INTERNET hosts and applications continue to grow,

Cisco Service Control Service Security: Outgoing Spam Mitigation Solution Guide, Release 4.1.x

Intelligent and Secure Network

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Internet Security: Firewall

High Ppeed Circuit Techniques for Network Intrusion Detection Systems (NIDS)

Configurable String Matching Hardware for Speeding up Intrusion Detection

Malicious Activity and Risky Behavior in Residential Networks

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA

Exploiting Dynamicity in Graph-based Traffic Analysis: Techniques and Applications

Network Anomaly Detection Using Autonomous System Flow Aggregates

Network measurement activities at UPC Barcelona. June 3, 2011

A Hybrid Approach for Accurate Application Traffic Identification

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

Traffic Classification Using Visual Motifs: An Empirical Evaluation

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

Game Traffic Analysis: An MMORPG Perspective

IP Profiler. Tracking the activity and behavior of an IP address. Author: Fred Thiele (GCIA, CISSP) Contributing Editor: David Mackey (GCIH, CISSP)

Intrusion Detection and Malware Analysis

Cisco Intrusion Prevention Solutions

Computer Network Vulnerabilities

Heuristics to Classify Internet Backbone Traffic based on Connection Patterns

Demystifying Service Discovery: Implementing an Internet-Wide Scanner

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422

FlowMatrix Tutorial. FlowMatrix modus operandi

ARDA Program: P2INGS (Proactive And Predictive Information Assurance For Next Generation Systems)

Effects of Internet Path Selection on Video-QoE

An In-depth Study of LTE: Effect of Network Protocol and Application Behavior on Performance

Automated Application Signature Generation Using LASER and Cosine Similarity

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Multi-phase IRC Botnet & Botnet Behavior Detection Model

Botnets Behavioral Patterns in the Network

Intrusion Detection Systems

Flows at Masaryk University Brno

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network-Aware Behavior Clustering of Internet End Hosts

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Reduction in Power Consumption of Packet Counter on VIRTEX-6 FPGA by Frequency Scaling. Pandey, Nisha; Pandey, Bishwajeet; Hussain, Dil muhammed Akbar

Cisco IOS Firewall Intrusion Detection System Commands

AMP-Based Flow Collection. Greg Virgin - RedJack

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Machine Learning in Data Quality Monitoring

MULTIVARIATE ANALYSIS OF STEALTH QUANTITATES (MASQ)

High-Throughput Real-Time Network Flow Visualization

CSC Network Security

Differential Congestion Notification: Taming the Elephants

A Lost Cycles Analysis for Performance Prediction using High-Level Synthesis

SVILUPPO DI UNA TECNICA DI RICONOSCIMENTO STATISTICO DI APPLICAZIONI SU RETE IP

Empirical Models of TCP and UDP End User Network Traffic from Data Analysis

Stochastic Pre-Classification for SDN Data Plane Matching

Polygraph: Automatically Generating Signatures for Polymorphic Worms

Exscind: A Faster Pattern Matching For Intrusion Detection Using Exclusion and Inclusion Filters

Configuring Anomaly Detection

Cisco IOS Classic Firewall/IPS: Configuring Context Based Access Control (CBAC) for Denial of Service Protection

Transcription:

FPGA based Network Traffic Analysis using Traffic Dispersion Graphs 2 nd September, 2010 Faisal N. Khan, P. O. Box 808, Livermore, CA 94551 This work performed under the auspices of the U.S. Department of Energy by under Contract DE-AC52-07NA27344 Release # LLNL-PRES-450851

Outline Introduction and Motivation FPGA Architecture & Algorithm Experimental Results Conclusions and Future Work 2

Network Traffic Analysis Network traffic analysis & classification is keystone in wide range of applications such as detection of network anomalies and attacks, identification of new applications, and traffic engineering. Traditionally it has been done using TCP destination port Payload signature matching Behavioral characterization of a host and its flows 3

Traffic Dispersion Patterns Traffic Dispersion Patterns/Graphs (TDPs/TDGs) are a network wide extension of behavioral techniques [lliofotou-07]. Communication patterns between the hosts exhibit insights into different kinds of applications and anomalies in a network. HTTP SMTP WinMX (Peer-to-Peer) 4

Applications Isolating anomalous hosts and sub-networks Detecting the spread of worm and viruses. Characterizing unknown activity/application. Flagging suspicious activity without examining the content. WinMX (Peer-to-Peer) 5

Motivation TDPs are traditionally processed offline (non-streaming) Full view of the graph: Complete flexibility Slow and resource intensive Real-time threats get missed out. The question of processing TDPs in real-time has mostly been overlooked. 6

Goals An autonomous passive system that can detect anomalous behaviors in streaming traffic in real-time. Isolates or alarms the IT staff about the threats. Programmable to varying network monitoring needs. Scalable to millions of edges and new traffic features. Has a defined accuracy budget. 7

Quantizing Traffic Dispersion Patterns Dispersion patterns can be classified as Offline: requires knowledge of complete graph. For e.g. depth of communication Online: can be computed in streaming traffic. For e.g. connectivity of an IP address InDegree/OutDegree: The number of incoming/outgoing connections made to/from an IP address/node. InO: The number of hosts that have both incoming and outgoing connections. 8

Percent Defining Rules Simulated backbone CAIDA traces having known P2P activity. 100 50 0 > 999 100 to 9 to 999 99 InDegree Distributions OutDegree Distributions InO Distributions P2P Detection Rule: A high InO with a low InDegree and OutDegree Port-Scan Rule: High InDegree and/or High OutDegree 9

The Measurement Solution Mapped on FPGAs that are an ideal platform for the high programmability and throughput requirements of the application. Configurable packet filter. Bloom Filters to check presence of an incoming IP address. Bloom Counters to keep the InDegree and OutDegreees. Count values and programmable rules in Statistics Unit. FPGA Mapped Architecture 10

The Measurement Algorithm Incoming packet checked for uniqueness in the Flow-filter. The source-ip and destination-ip are used to update the degreecounts. Statistics unit is updated. The IPs are reverse checked for deducing InO behavior. A found InO IP is checked in InO- Filter and InO count updated FPGA Mapped Architecture 11

Design Space Exploration Config Flow x8 InO x8 Degree x2x8x8 Total (Kb) Node Count Accuracy InO Count Accuracy C-1 16 16 2 512 71.78 27.35 C-2 8 8 4 640 88.31 85.75 C-3 16 8 4 704 92.14 81.07 C-4 8 8 8 1152 90.13 99.18 C-8 32 1 8 1312 96.95 99.34 C-9 32 16 16 2432 99.98 99.67 Architectural Exploration (values in Kb) FPGA Mapped Architecture 12

Design Accuracy Node Count Accuracy InO Count Accuracy The work utilized datasets from CAIDA, WIDE and ISI/USC for empirical evaluations. The work discusses analytical and empirical accuracy studies. Results show very high amounts of accuracies for up to 10k flows. Suitable for detecting threats like Port-Scan. 13

Implementation Results & System Throughput Prototyped C-8 on Virtex-5, XC5VLX50t device. Xilinx ISE 11.1 Ample room in the device for future logic enhancements. Average throughput of 7.5 million packets/second. Metric Valu e Device Utilization IO Pins 69 14.4% Number of occupied slices 754 10% Number of Block-RAMs 44 73% Clock (MHz) 107-14

Actual Actual Port-Scan Detection Accuracy Very high detection accuracy of both scanners and victim identification. Observed Observed Scanners P N Victims P N P 4 0 P 22 0 N 0 33972 N 2 2303 Scanner Identification Scanned Victim Identification F1 Score: 1.0 F1 Score: 0.932 Used USC-LANDER [USCISI-06] and CAIDA traces [CAIDA-03]. 15

Peer-to-Peer Detection Accuracy Programmed Rule: 10% of InO Nodes and Low InDegree and OutDegrees. Port based filtering. Alarm raised in less than 1400 flows at the correct port (port-6677) 1400 flows represent a very high system accuracy design point. Useful for classifying P2P activity on a new port. 16

Conclusion A real-time FPGA based solution for processing streaming TDPs. Configurable with high processing speeds. Real-time detection of Port-Scan and Peer-to-Peer activities. Reducing noise in capturing interesting traffic. Easily extensible to include temporal rules and other characterization measures. Open Source under GNU General Public License: https://computation.llnl.gov/casc/dcca-pub/dcca/datacentric_architecture.html 17

Future Directions Including temporal relations in rule sets Isolating sudden changes from gradual shifts For e.g. A new Worm, Spammer, etc 10T T T time 18

References [lliofotou-07] M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, Network monitoring using traffic dispersion graphs (TDGS), in Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007, pp. 315 320. [USCISI-06]Internet Addresses Survey dataset, PREDICT ID: USC- LANDER/attack-tcpsyn-20061106. Traces taken 2006-11-06. Provided by the USC/LANDER project <http://www.isi.edu/ant/lander>. [CAIDA-03] CAIDA OC48 Trace Project 20030115-100000-0- anon.pcap https://imdc.datcat.org/data/1-3n3t-4=20030115-100000-0- anon.pcap+(60+min) 19