blinc multilevel traffic classification in the dark
play

BLINC: Multilevel Traffic Classification in the Dark Thomas - PowerPoint PPT Presentation

BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside The problem of workload characterization The goal: Classify Internet


  1. BLINC: Multilevel Traffic Classification in the Dark Thomas Karagiannis, UC Riverside Konstantina Papagiannaki, Intel Research Cambridge Michalis Faloutsos, UC Riverside

  2. The problem of workload characterization • The goal: Classify Internet traffic flows according to the applications that generate them “ in the dark ” – No port numbers – No payload streaming web P2P 2

  3. The problem of workload characterization – Why in the dark? • Traffic profiling based on TCP/UDP ports – Misleading • Payload-based classification – Practically infeasible • Applications are “hiding” their traffic – P2P applications, skype, etc. • Recent research approaches – Statistical/machine-learning based classification ( Roughan et al. IMC’04, Moore et al. SIGMETRICS’05) – Sensitive to network dynamics such as congestion 3

  4. Our contributions • We present BLINC (BLINd Classification), a fundamentally different “in the dark” approach – We shift the focus to the Internet host – We analyze host behavior at three levels • Social • Functional • Application • We identify “signature” communication patterns • Highly accurate classification 4

  5. Outline • Developing a classification benchmark – Payload-based classification • BLINC design – Multilevel classification – Signature communication patterns • BLINC evaluation 5

  6. Classification benchmark • Packet-traces with machine readable headers – Residential (2 traces) • 25 hours & 34 hours, 110 Mbps • web (35%), p2p (32%) – Genome campus • 44 hours, 25 Mbps, ftp (67%) • Classification based on payload signatures – Caveats : Nonpayload (1%-2%), Unknown (6%-16%) 6

  7. BLINC overview • In the dark classification – No examination of port numbers – No examination of user payload • Characterize the host – Insensitive to congestion and path changes • Deployable with existing equipment – Operates on flow records 7

  8. BLINC: Classification process • Characterize the host – Social : Popularity/Communities – Functional : Consumer/provider of services – Application : Transport layer interactions • Identify signature communication patterns • Match observed behavior to signatures 8

  9. 1. Social level • Characterization of the popularity of hosts • Two types of behavior: – Based on number of destination IPs – Communities: Groups of communicating hosts 9

  10. 1. Social level: Popularity • Reveals only basic application traffic properties Heavier tail of CCDF of destination IPs for P2P and malware 10

  11. 1. Social level: Communities • Communication cliques • Perfect cliques – Attacks • Partial cliques – Collaborative applications (p2p, games) • Partial cliques with same domain IPs – Server farms (e.g., web, dns, mail) 11

  12. 2. Functional level • We characterize based on tuple (IP, Port) • We identify three types of behavior – Client: Consumer of services – Server: Provider of services – Collaborative 12

  13. 2. Functional level: Client vs. Server src port: 1000 src port: 1001 src port: 1002 Observation: The host uses a different ephemeral src port for every flow Rule: Hosts that use a large number of source ports are clients 13

  14. 2. Functional level: Client vs. Server Rule: Hosts that use a small number of source ports are offering services on these ports Observation: Observation: The host uses a different ephemeral The host uses only two src port for every flow src ports for all flows src port: 80 src port: 80 src port: 443 14

  15. 2. Functional level: Characterizing the host flows vs. source ports per application Clients Collaborative applications: No distinction between servers and clients Servers Obscure behavior due to multiple mail protocols and passive ftp 15

  16. 3. Application level • Interactions between network hosts display diverse patterns across application types. • We capture patterns using “graphlets” – Target most typical behavior – Relationship between fields of the 4-tuple 16

  17. 3. Application level: Graphlets • Graphlets have four columns corresponding to the 4-tuple: src IP, dst IP, src port and dst port • Each node is a distinct entry for each column • Lines connect nodes when flows contain the specific field values 192.168.1.1 10.0.0.0 1026 135 sourceIP destinationIP destinationPort sourcePort 445 192.168.1.1 10.0.0.0 1026 135 17

  18. 3. Graphlet Generation (FTP) sourceIP destinationIP destinationPort sourcePort X Y 21 10001 X Y 21 10001 X Y X Y 21 21 10001 10001 X Y 20 10002 X Y X Y 20 20 10002 10002 X Z X Z 21 21 3000 3000 X Z 1026 3001 20 10002 5005 X Y 5000 21 10001 3000 Z X 3001 1026 U 18

  19. 3. Graphlet Library 19

  20. Heuristics: Further improving performance • Using the transport layer protocol. 20

  21. Heuristics: Further improving performance • Using the relative cardinality of sets. Cardinality of set of dst IPs versus set of dst ports varies with the application 21

  22. Heuristics: Further improving performance • Using the relative cardinality of sets. WEB: #dst ports >> # dst IPs P2P: #dst ports <= # dst IPs 22

  23. Heuristics: Further improving performance • Using the communities Probably WEB too!! Known: WEB 10.0.0.0 10.0.0.1 23

  24. Heuristics: Further improving performance • Other heuristics: – Using the per-flow average packet size – Recursive (mail/dns servers talk to mail/dns servers, etc.) – Failed flows (malware, p2p) 24

  25. Classification Results • We evaluate BLINC using two metrics: – Completeness • Percentage classified by BLINC – Accuracy • Percentage classified by BLINC correctly • We compare against payload classification – Exclude unknown and nonpayload flows 25

  26. BLINC achieves highly accurate classification 80%-90% completeness ! >90% accuracy !! 26

  27. Characterizing the unknown: Non-payload flows BLINC is not limited by non-payload flows or unknown signatures Flows classified as attacks reveal known exploits 27

  28. BLINC issues and limitations • Extensibility – Creating and incorporating new graphlets • Application sub-types – e.g., BitTorrent vs. Kazaa • Transport-layer encryption – then what? • NATS – Should handle most cases • Access vs. Backbone networks? – Should handle but no data to test 28

  29. Conclusions • A new way of thinking of the classification problem – Classify nodes instead of flows – Multi-level analysis: • social, functional, transport-layer characteristics • each level provides corroborative evidence or insight • BLINC works well in practice – classifies 80-90% of the traffic – with >90% accuracy • Going beyond payload-based classification – Nonpayload/unknown flows • Building block for security applications 29

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend