Jaal: Towards Network Intrusion Detection at ISP Scale
- A. Aqil, K. Khalil, A. Atya, E. Paplexakis,
- S. Krishnamurthy, KK. Ramakrishnan
- T. Jaeger
- P. Yu, A. Swami
1
Jaal: Towards Network Intrusion Detection at ISP Scale A. Aqil, K. - - PowerPoint PPT Presentation
Jaal: Towards Network Intrusion Detection at ISP Scale A. Aqil, K. Khalil , A. Atya, E. Paplexakis, University of California S. Krishnamurthy, KK. Ramakrishnan Riverside T. Jaeger Penn State University P. Yu, A. Swami US Army Research Lab 1
1
2
3
4
5
Avg decrease in throughput Worst decrease in throughput Drop in accuracy Percentage decrease 50 100 Percentage of traffic replicated 10 20 30 40 50 60 70 80 90 100 Performance degradation as traffic replication increases
70% Tput loss
6
Attack Reservoir Sampling Distributed SYN Flood 54% Sock Stress 60% SSH Brute Force 42%
7
8
9
en source
eater than egularly; this (can result
clusters for peak that, a large are inade- to copying
Packet Filtering Summatization Flow Assign. Inference NIDS Summaries Assignments Decision Load Monitor Packet Filtering Summatization Monitor Info. Load Info. Rules Summaries Assignments
I- Monitors:
batches, create summaries II- Inference engine:
matching III- Flow assignment:
10
all flows all flows assigned flows packets batch batch summary fields mode packets mode
11
batch summary SVD k-means p r n k
centroids counts
fields mode packets mode eliminate small singular values
12
Translator NIDS question Similarity Summary Sm
1 or Sm 2
Config. τd, τc Alert, Q Postprocessor Alert h, τv Config. Q Estimator Aggregator Sa Rules vectors q Inference Engine Feedback
Individual summaries
13
14
most common attack classes
15
n: batch size, r: rank, k: centroids
16
Unchecked infections Remaining infected devices after Jaal Number of infected devices 50 100 150 Time (s) 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 Number of Infected devices vs time
17
18