need for classification
play

Need for Classification Classification required To isolate - PDF document

Need for Classification Classification required To isolate traffic of interest Classification of Internet Traffic To treat special types of traffic in a different manner Some types of classification already seen in Alok


  1. Need for Classification • Classification required – To isolate traffic of interest Classification of Internet Traffic – To treat special types of traffic in a different manner • Some types of classification already seen in Alok Shriram AI learning systems. • Some types of classification seen in Data mining. Identification of Repeated Attacks Three Techniques Using Network Traffic Forensics • A Framework for Classifying Denial of • To Identify repeated attacks Service Attacks ( Single or Multiple Source Attacks) • Forensic evidence used to investigate and establish facts • Identification of Repeated Attacks Using Network Traffic Forensics. • Depending on Intent attackers punishment is decided • Class of Service Mapping for QoS. Objective Methodology in a Nutshell • Build an attack fingerprinting system • Given an attack scenario – Figure out if attack has occurred previously. • Make this system of creating fingerprints automatic • For this we filter attack – Fingerprint is any characteristic feature of an • Create attack fingerprint attack which can uniquely identify it. • Compare attack to previously fingerprinted • Automatic matching system attack • Identify repeated attacks

  2. Creating Attack Fingerprint • Convert packet trace into time series • Consider interval of time p – Packet arrivals [t, t + p) • For T second trace T/p samples • Max frequency 1/2p Hz • Use p=1 msec and attack segment length =2 s Creating Attack Fingerprint(1) Creating Attack Fingerprint(2) • Thus we have time series x(t). • Ideally exact match identifies complete spectrum • Compute autocorrelation function(ACF) of time series • However – Adds complexity • Compute ACF for different values of L to get r k (L) – Needs more samples • Thus we take the twenty most common • Compute FFT of r k (L) samples – Periodicity shows up as dominant frequency. Creating the fingerprint(3) Creating the fingerprints (Finally) • F a consists of all segment fingerprints X k • F a is 20 by 200 matrix • Use F a to compute digest M a =mean of X k • M a vector of size 20 C a = covariance of X k • N a /#X k >=10 • C a vector of size 20 by 20 – Thus N a =20

  3. Comparing Fingerprints(1) • Use a comparator to match similarity • Bayes ML classifier – Assumptions • Spectral profiles normal w.r.t dominant frequency • Each scenario equally likely • Attacks are independent Comparing Fingerprints(2) Analyzing the results • With each attack we just need some • Low CA 5 % quartile indicate the at least 5 information to compare each segment % match very accurately against signature • 95%-5% small range of this indicates • Quantify separation between current attack precision. and signatures Experimental Results (1)

  4. A Framework for Classifying Experiments and Results (2) Denial of Service Attacks • Denial Of Service Attacks are of two types – Single Source – Multiple Source • Identifying the number of sources helps in mitigation strategies Objective Two Types of Attacks • Develop framework to classify attacks as • Software Attacks single or multiple source – Use Ramp up behavior • Flooding Attacks – Port numbers – Single Source – Spectral Characteristics of attack traffic – Multiple Source • Spectral content cannot be spoofed – Reflector Attacks • Could be used in DOS detection and response systems Classifying Attacks Header Content • Three Methods that are used for • Use fragment ID field and TTL field classification – Single hosts monotonically increasing – Header Content – Multiple Hosts – Ramp-up Behavior • Many ID sequences • Two sequence considered unique if they have an – Spectral Characteristics IDgap >16 • ID gap is there to tolerate moderate packet reordering.

  5. Ramp-up Behavior • Single sources don’t exhibit a ramp-up behaviour • Multiple source with large number of processes – Exhibit ramp up behavior – Clock and RTT skews cause gradual buildup – By observing this we can guess the number of sources. Experiments: Packet Header Analysis Spectral Analysis • Stuff about spectra analysis here from previous slides.. Experiments: Ramp Up Behavior Experiments: Arrival Rate Analysis Analysis

  6. Experiments: Spectral Content Experiment: Explanation Analysis • Single Source Dominant high frequencies • Multi Source attacks Dominant low Frequencies How do two sources combine to form lower frequency?? Class of Service Mapping for QoS • Support different applications • With different quality demands • Concept has been around for some time – What ails QoS? • The ability to identify types of traffic Traffic Classification Objective (In the dark ages) • Develop a signature based classification • Based on Port Numbers framework • These techniques had several limitations • Class of Service to Traffic mapping – More than one application using the same port problem – P2P does not use any standardized ports. • How to choose statistics that accurately – Some applications tunnel through other application ports represent traffic behavior. – Different ports used to circumvent control.

  7. Implementing CoS Mapping Statistics Collection • Three Stage process • Place monitors and collect network stats • Need to collect aggregate stats – Statistics Collection • Form a vector of statistics • Ideally statistics should be updatable – Classification recursively or in an online manner. – Rule Creation Instance of recursive Classification Classification • Now we have a collection of statistics indexed by aggregate • Use classification algorithm to classify traffic • This classification can have a direct quality mapping What type of traffic can there be? What statistics can we collect • Interactive -> Real time interaction. • Packet Level features – Mean Packet Size • Streaming -> Multimedia with RT constraints. – RMS size • Bulk Data Transfers-> Large volumes of • Flow Summaries data over the internet. – Mean flow duration • Transactional-> Small volumes of traffic. – Mean data volume

  8. What statistics can we collect Classification methods • Connection Level • Two methods of classification – Track Connection level Characteristics – Linear Discriminant Analysis (LDA) – Symmetry of connection – Nearest Neighbor (NN) – Advertised window size • Intra-flow • Given k classes m features and n training – IAT between packets data points • Multi Flow – Can we classify traffic into characteristics types? – Features across different flows. Simple Classification Results Streaming vs. Data What does this have to do with Temporal Difference NIDS? • If we can classify traffic as the DOS type traffic • Provide QoS of zero to it. – Basically means deny service to that traffic

  9. The END

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend