autom atic anom aly detection using nfsen
play

Autom atic anom aly detection using NfSen Wim Biemolt, SURFnet - PowerPoint PPT Presentation

Autom atic anom aly detection using NfSen Wim Biemolt, SURFnet Werner Schram, SURFnet 14/ 12/ 2007 Autom atic anom aly detection using NfSen - SURFnet and netflow anomaly detection - NERD - NfSen - PeakFlow SP - Currently used detection


  1. Autom atic anom aly detection using NfSen Wim Biemolt, SURFnet Werner Schram, SURFnet 14/ 12/ 2007

  2. Autom atic anom aly detection using NfSen - SURFnet and netflow anomaly detection - NERD - NfSen - PeakFlow SP - Currently used detection methods - DDos - Botnet - Holt-Winters aberrant behavior 1 SURFnet – Automatic anomaly detection using NfSen

  3. SURFnet and netflow anom aly detection - NERD v1 - Developed by TNO - Based on cflowd - cflowd is no longer supported - NERD v2 - Initially developed by TNO - Has serious performance problems - NfSen can do the same but without the performance problems 2 SURFnet – Automatic anomaly detection using NfSen

  4. NfSen - Netflow Sensor (NfSen) is a - network statistics tool - Developed by Peter Haag - Currently in active development - Alert plug-in system - Generic plug-in system - Some plug-ins already available 3 SURFnet – Automatic anomaly detection using NfSen

  5. NfSen 4 SURFnet – Automatic anomaly detection using NfSen

  6. DDos detection - Simple flow analysis - based on NERD v1 DDos detection - using a low threshold and a high threshold - Rules for traffic between those thresholds - Custom thresholds for high load services 5 SURFnet – Automatic anomaly detection using NfSen

  7. Expected traffic 6 SURFnet – Automatic anomaly detection using NfSen

  8. Definitively Conspicuous Traffic 7 SURFnet – Automatic anomaly detection using NfSen

  9. Border cases 8 SURFnet – Automatic anomaly detection using NfSen

  10. High load servers 9 SURFnet – Automatic anomaly detection using NfSen

  11. Custom thresholds 10 SURFnet – Automatic anomaly detection using NfSen

  12. DDos interface: report 11 SURFnet – Automatic anomaly detection using NfSen

  13. DDos interface: Details 12 SURFnet – Automatic anomaly detection using NfSen

  14. Botnet detection - Hosts infected by viruses connect to hosts known as botnet controllers - List of botnet controllers are available, for example: http: / / www.bleedingthreats.net/ rules/ bleeding-botcc.rules - Our plug-in logs all hosts that connect to known botnet controllers - Automatically reports to incident report system using IODEF 13 SURFnet – Automatic anomaly detection using NfSen

  15. Botnet I ODEF reports <?xml version="1.0" encoding="iso-8859-1"?> <io:IODEF-Document xmlns:io="urn:ietf:params:xml:ns:iodef-1.0” lang="en"> <io:Incident purpose="reporting"> <io:IncidentID name="overflow.surfnet.nl&#10;">#33408</io:IncidentID> <io:StartTime> 2007-08-13T15:07:47+02:00 </io:StartTime> <io:EndTime> 2007-08-13T21:06:12+02:00 </io:EndTime> <io:ReportTime> 2007-08-13T21:12:07+02:00 </io:ReportTime> <io:Assessment> <io:Impact type="user"/> </io:Assessment> <io:Contact> <io:ContactName>Werner Schram</io:ContactName> </io:Contact> <io:EventData> <io:Method> <io:Reference> <io:ReferenceName> botnet </io:ReferenceName> </io:Reference> </io:Method> <io:Flow> <io:System category="source"> <io:Node> <io:Address category="ipv4-addr"> 192.168.1.1 </io:Address> <io:Counter type="flow"> 20 </io:Counter> </io:Node> </io:System> <io:System category="target"> <io:Node> <io:Address category="ipv4-addr"> 192.168.1.2 </io:Address> </io:Node> <io:Service ip_version=" 4 " ip_protocol=" 6 "> <io:Port> 80 </io:Port> </io:Service> </io:System> </io:Flow> </io:EventData> <io:AdditionalData dtype="string">Generated by NFSen</io:AdditionalData> </io:Incident> </io:IODEF-Document> 14 SURFnet – Automatic anomaly detection using NfSen

  16. Holt-W inters aberrant behavior detection - Uses information about periodic data to predict aberrant behavior. 15 SURFnet – Automatic anomaly detection using NfSen

  17. Holt-W inters: Exam ple 16 SURFnet – Automatic anomaly detection using NfSen

  18. Holt-W inters: Original im plem entation Trend Periodic information Noise Prediction 17 SURFnet – Automatic anomaly detection using NfSen

  19. Lim itations of the original im plem entation - The original algorithm has three parameters which define: - the weight of historical data - the weight of the trend - the amount of expected noise - The original algorithm has a constant learning rate - If a low learning rate is used, the selection of the initial values is critical. This will introduce false positives for a long time. - With a high learning rate, the model will likely be overfitted. This will introduce false negatives - The trend parameter has no significant influence with the resolution we are using 18 SURFnet – Automatic anomaly detection using NfSen

  20. Holt-W inters: Multiple trends Network traffic time series often show multiple recurring patterns, for example a weekly trend: 19 SURFnet – Automatic anomaly detection using NfSen

  21. Holt-W inters: Multiple periods Daily Period Weekly period Noise 20 SURFnet – Automatic anomaly detection using NfSen

  22. Learning rate Fixed learning rate: The first pattern is overweighted Adaptive learning rate: The weight of the first pattern is relative to the rest 21 SURFnet – Automatic anomaly detection using NfSen

  23. Real data exam ple SURFnet – Automatic anomaly detection using NfSen 22

  24. Holt W inters: Usage Exam ple Normal ICMP Traffic Aberrant ICMP Traffic: Caused by DDos attack by Stormworm botnet 23 SURFnet – Automatic anomaly detection using NfSen

  25. Holt W inters: Other possible uses Common SMTP Traffic Last week SMTP Traffic 24 SURFnet – Automatic anomaly detection using NfSen

  26. Wim Biemolt Wim.Biemolt@surfnet.nl www.surfnet.nl Werner Schram Werner.Schram@surfnet.nl www.surfnet.nl 25 SURFnet – Automatic anomaly detection using NfSen

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend