building a real time grid protocol analyser
play

Building a real-time Grid protocol analyser Jonathan Paisley - PowerPoint PPT Presentation

Building a real-time Grid protocol analyser Jonathan Paisley Department of Computing Science The Grid Wide-area distributed computing Lots of funding Network operators need to support it Traffic dominated by bulk data transfer Elephants and


  1. Building a real-time Grid protocol analyser Jonathan Paisley Department of Computing Science

  2. The Grid Wide-area distributed computing Lots of funding Network operators need to support it Traffic dominated by bulk data transfer

  3. Elephants and Mice

  4. Multiple Elephants and Mice

  5. Elephants and Mixed Mice

  6. Elephants and Cipher Mice ?

  7. Grid Monitoring Monitoring System Grid Application Users Signal ISP Operator Institution Network ISP's Network Monitoring point Servers with Other ISPs and the lots of storage Internet

  8. Approach Interpret protocol to learn about associated bulk connections Report on transfer sizes Be able to deal with mixed control-data flows

  9. DAG-based Network Monitor Just a PC with special network monitoring card. Example: 2.8 GHz dual Xeon, 2+ GB memory Image Source: Endace Measurement Systems

  10. Similarity to NIDS NIDS = Network Intrusion Detection System For example: Bro Does protocol analysis (FTP, SMTP, etc) Needs port-based filter Full reassembly of every monitored flow Too slow

  11. Design Goals Leverage DAG ring buffer architecture Capable of processing at GigE line rate Support full cleartext protocol analysis Efficiently handle mixed control/data

  12. Assumptions and Principles TCP only Applications under study not used maliciously Minimise memory copies Minimise heap allocation Process packets as soon as possible Single-threaded, data-driven

  13. DAG Ring Buffer Not-yet- Processed written DAG Write Pointer Unprocessed Application Acknowledged Pointer

  14. DAG Ring Buffer Not-yet- Processed written Application DAG Write Acknowledged Pointer Pointer Unprocessed Retained Application Processed Pointer

  15. DAG Ring Buffer Not-yet- Processed written Application DAG Write Acknowledged Pointer Pointer Unprocessed Retained Application Processed Pointer

  16. Writing Protocol Analysers Passive monitor sees both flow directions Code to track state -> generate events State machines can be complex Threaded programming style is easier ... but runtime cost normally higher

  17. ProtoThreads Similar to co-routines/continuations Implemented using a C switch statement State maintained in a structure Context switching by stack unwinding

  18. Analyser Example void AnalyserClass::AnalyserMain() { // Read function id and num args READ(OrigFlow, 2); func_id = *(uint16_t*)data; READ(OrigFlow, 2); num_args = *(uint16_t*)data; for (i=0;i<num_args;i++) { READ(OrigFlow, 4); len = *(uint32_t*)data; // Read the argument, but we // only need the first 200 bytes READ_AND_SKIP(OrigFlow, len, 200); // ... process the argument } READ(RespFlow, 4); result_value = *(uint32_t*)data; }

  19. Analyser Example void AnalyserClass::AnalyserMain() May { block // Read function id and num args READ(OrigFlow, 2); here! func_id = *(uint16_t*)data; READ(OrigFlow, 2); num_args = *(uint16_t*)data; for (i=0;i<num_args;i++) { READ(OrigFlow, 4); len = *(uint32_t*)data; // Read the argument, but we // only need the first 200 bytes READ_AND_SKIP(OrigFlow, len, 200); // ... process the argument } READ(RespFlow, 4); result_value = *(uint32_t*)data; }

  20. Scalability Presently limited to single processor Auxiliary flow tracing complicated by concurrent processing Could use retained packet scheme for all flows: gives extra 1-2 seconds buffering

  21. Evaluation Informal testing carried out during development Negligible load for ~900Mbps mixed control/ data SRB flow Initial testing with larger number of connections with flat-out* replay of IP header traces ~10-15% load * 250Mbps, 5000 new connections per second.

  22. Encrypted Analysis Ideas What can we know about encrypted traffic? Messages: (direction, size*, timing) Lack of messages (timeouts) If we understand framing protocol: can get application-level messages * with some bounded error

  23. Requests and Responses Monitoring Point Client Server Look out for associated bulk data flow!

  24. Approaches Hidden Markov Models? Naïve Bayesian Classifier? Other work: SSH password typing analysis HTTPS request analysis by URL lengths Sideband attacks on encryption algorithms

  25. Summary Built (hopefully) fast system for real-time protocol analysis work. Evaluation pending. Support for efficient handling of mixed control/data protocols. Coding of protocol analysers simplified by rich lightweight threaded interface. Starting work on classifying and event reporting of encrypted traffic.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend