An Empirical Evaluation of Entropy- based Traffic Anomaly Detection - - PowerPoint PPT Presentation

an empirical evaluation of entropy based traffic anomaly
SMART_READER_LITE
LIVE PREVIEW

An Empirical Evaluation of Entropy- based Traffic Anomaly Detection - - PowerPoint PPT Presentation

An Empirical Evaluation of Entropy- based Traffic Anomaly Detection George Nychis, Vyas Sekar, David Andersen, Hyong Kim, Hui Zhang Carnegie Mellon University Entropy-based Anomaly Detection Goal: detect abnormal behavior scan activity,


slide-1
SLIDE 1

An Empirical Evaluation of Entropy- based Traffic Anomaly Detection

George Nychis, Vyas Sekar, David Andersen, Hyong Kim, Hui Zhang Carnegie Mellon University

slide-2
SLIDE 2

Entropy-based Anomaly Detection

 Goal: detect abnormal behavior

 scan activity, DDoS, bandwidth floods ...

 Traditional: raw traffic volume (insufficient)

 e.g., total number of packets in an epoch

 Modern: entropy-based traffic metrics

 e.g., relative randomness in distribution of packets

across ports

Example Anomaly Entropy: Detectable Traffic Volume: Undetected

2

slide-3
SLIDE 3

Anomaly Detection

Alarm!

Traffic Feature Timeseries Detection NetFlow Data 3

Motivation

slide-4
SLIDE 4

Anomaly Detection

A(pkts)

Traffic Feature NetFlow Data sum(packets) Timeseries Detection 3

Motivation

slide-5
SLIDE 5

Anomaly Detection

A(addr)

Traffic Feature NetFlow Data H(addresses)

  • Dist. of packets across addresses

Timeseries Detection

Entropy-based Features:

3

Motivation

slide-6
SLIDE 6

Anomaly Detection

A(addr) A(port)

Traffic Feature NetFlow Data H(ports)

Distribution of packets across ports

Timeseries Detection

Entropy-based Features:

3

H(addresses)

Motivation

slide-7
SLIDE 7

Anomaly Detection

Traffic Feature NetFlow Data H(flow-size)

Distribution of flow-sizes (in packets) A(addr) A(port) A(FSD)

Timeseries Detection

Entropy-based Features:

3

H(ports) H(addresses)

Motivation

slide-8
SLIDE 8

Anomaly Detection

Traffic Feature NetFlow Data H(degree)

Distribution of host communication A(addr) A(port) A(FSD) A(deg)

Timeseries Detection

Entropy-based Features:

3

H(flow-size) H(ports) H(addresses)

Motivation

slide-9
SLIDE 9

Anomaly Detection

Traffic Feature NetFlow Data ????????

A(addr) A(port) A(FSD) A(deg)

Timeseries Detection

Entropy-based Features:

3

H(degree) H(flow-size) H(ports) H(addresses)

Motivation

slide-10
SLIDE 10

 Goal: understanding the features

Anomaly Detection

Traffic Feature NetFlow Data ????????

A(addr) A(port) A(FSD) A(deg)

Timeseries Detection

Entropy-based Features:

3

H(degree) H(flow-size) H(ports) H(addresses)

Motivation

slide-11
SLIDE 11

Anomaly Detection

Traffic Feature NetFlow Data ????????

H(degree) H(flow-size) H(ports) H(addresses)

 Goal: understanding the features

  • 1. How unique are their detection capabilities?
  • 2. How effective are they?

A(addr) A(port) A(FSD) A(deg)

Timeseries Detection

Entropy-based Features:

3

Motivation

slide-12
SLIDE 12

NetFlow Data

CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006

5 one-month-long traces:

4

Analysis Method

slide-13
SLIDE 13

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006

4

Analysis Method

slide-14
SLIDE 14

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006

Timeseries Correlation

Are the distributions structurally similar?

4

Analysis Method

slide-15
SLIDE 15

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006 Are the distributions structurally similar?

A(addr) A(port) A(FSD) A(deg)

4 Timeseries Correlation

Analysis Method

Anomaly Detection

slide-16
SLIDE 16

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006 Are the distributions structurally similar?

Anomaly Detection

A(addr) A(port) A(FSD) A(deg)

Anomaly Correlation

Goal(1): Uniqueness

4 Timeseries Correlation

Analysis Method

slide-17
SLIDE 17

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006 Are the distributions structurally similar?

A(addr) A(port) A(FSD) A(deg)

Anomaly Correlation

Goal(1): Uniqueness

4 Timeseries Correlation

Analysis Method

Anomaly Detection

slide-18
SLIDE 18

In-degree Out-degree Flow-size

  • Src. Address
  • Dst. Address
  • Src. Port
  • Dst. Port

Raw traffic volume

5

Entropy Timeseries (February 2005)

slide-19
SLIDE 19

In-degree Out-degree Flow-size

  • Src. Address
  • Dst. Address
  • Src. Port
  • Dst. Port

Raw traffic volume

5

Entropy Timeseries (February 2005)

slide-20
SLIDE 20

test In-degree Out-degree Flow-size

  • Src. Address
  • Dst. Address
  • Src. Port
  • Dst. Port

Raw traffic volume

5

Entropy Timeseries (February 2005)

slide-21
SLIDE 21

test In-degree Out-degree Flow-size

  • Src. Address
  • Dst. Address
  • Src. Port
  • Dst. Port

Raw traffic volume

5

Entropy Timeseries (February 2005)

slide-22
SLIDE 22

test In-degree Out-degree Flow-size

  • Src. Address
  • Dst. Address
  • Src. Port
  • Dst. Port

Raw traffic volume

5

Entropy Timeseries (February 2005)

slide-23
SLIDE 23

NetFlow Data

5 one-month-long traces:

Entropy Timeseries

H(addresses) H(ports) H(flow-size) H(degree) CMU-2005, CMU-2008, GATech-2008, GEANT-2005, Internet2-2006 Are the distributions structurally similar?

A(addr) A(port) A(FSD) A(deg)

Anomaly Correlation 6 Timeseries Correlation

Goal(1): Uniqueness

Analysis Method

Anomaly Detection

slide-24
SLIDE 24

 Pairwise correlation-scores for CMU-2005  All 4 other traces exhibit similar behavior! 7

Correlation in Entropy Timeseries

slide-25
SLIDE 25

Why Entropy is Structurally Correlated

  • 1. Port / Address Correlation

 Properties of Network Traffic:

  • contribute X packets to address A
  • contribute X packets to port B

… if hosts have few connections, and ports are uniformly random → similar distributions

8

slide-26
SLIDE 26
  • 1. Port / Address Correlation

 Properties of Network Traffic

  • 2. Source / Destination Correlation

 Flow accounting:

  • Bi-directional: Addr1(23) → Addr2(53)

Bi-directional Saddr(23) Daddr(53)

8

Why Entropy is Structurally Correlated

slide-27
SLIDE 27
  • 1. Port / Address Correlation

 Properties of Network Traffic

  • 2. Source / Destination Correlation

 Flow accounting:

  • Uni-directional: Addr1 → Addr2 (23)

Addr2 → Addr1 (53)

Uni-directional Saddr(23), Daddr(23) Saddr(53), Daddr(53) Bi-directional Saddr(23) Daddr(53) Uni-directionality destroys 2 unique distributions

8

Why Entropy is Structurally Correlated

slide-28
SLIDE 28

Analyze top-k Remove flows Recompute entropy Anomaly subsides? no yes, cause!

 Root-cause analysis approach:  Our results:

 Ports & addresses: only detect alpha flows (correlation)  FSD: detects scans, Degree: SYN flood  FSD & Degree are unique (no correlation)

9

Why Anomalies are Correlated

slide-29
SLIDE 29

 Root-cause analysis approach:  Our results:

 Ports & addresses: only detect alpha flows (correlation)  FSD: detects scans, Degree: SYN flood  FSD & Degree are unique (no correlation)

Traffic volume

9

Why Anomalies are Correlated

Analyze top-k Remove flows Recompute entropy Anomaly subsides? no yes, cause!

slide-30
SLIDE 30

Summary of Goal(1): Uniqueness

 Strong correlation in ports and addresses  Flow-size and degree: unique  Structural correlation: properties of traffic  Anomaly correlation: types of anomalies seen

10

slide-31
SLIDE 31

NetFlow Data Entropy Timeseries Timeseries Correlation Anomaly Correlation

Inject Synthetic Anomalies

11

Understanding Effectiveness

Anomaly Detection

slide-32
SLIDE 32

 Anomalies: BW Flood, Scanner, Multiple Scanners, Port Scan, and SYN Flood

 Other Results:

 BW Flood:

  • ports & addresses
  • already detectable

by traffic volume

 Scans:

  • difficult to detect

 … FSD and degree

FSD best detector

12

Best Distribution for an Anomaly?

slide-33
SLIDE 33

 Look beyond ports and addresses  Select complementary traffic distributions  Uni-directional accounting introduces biases in

traffic distributions

 Future Work: Can correlations be leveraged?

 during anomalies found in flow-size & degree,

correlation drops between ports & addresses

13

Implications and Conclusions

slide-34
SLIDE 34

Questions?

14