Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) - - PowerPoint PPT Presentation

network monitoring on large networks
SMART_READER_LITE
LIVE PREVIEW

Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) - - PowerPoint PPT Presentation

Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Overview Overview Introduction Related Studies SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring Tools


slide-1
SLIDE 1

1

Yao Chuan Han (TWCERT/CC) james@cert.org.tw

Network Monitoring On Large Networks

slide-2
SLIDE 2

2

Overview Overview

 Introduction  Related Studies

 SNMP-based Monitoring Tools  Packet-Sniffing Monitoring Tools  Flow-based Monitoring Tools

 The Proposed Mechanism  Results  Conclusion

slide-3
SLIDE 3

3

Introduction Introduction

 Network security has become one of the

most important issues on the Internet.

Internet

DoS Attacks Malicious Probes Worms Intrusion

slide-4
SLIDE 4

4

Real-time network Real-time network traffic monitoring traffic monitoring

 Provide the status and the patterns

  • f network traffic.

 Provide the signs of abnormal traffic

and potential problems.

 Detect the irregular activities.  Identify the possible attack.  Response the situation in time.  Evidence of intrusions.

slide-5
SLIDE 5

5

SNMP-based tools SNMP-based tools

 Collector:collect SNMP data.  Grapher:generate HTML output

containing traffic loading image.

 Provide a live and visual

representation of network traffic and traffic trends in time-series data.

 Only provide information about

levels and changes in traffic volume.

 Need more detailed data.

slide-6
SLIDE 6

6

Packet-Sniffing tools Packet-Sniffing tools

 Capture the traffic packets.  Decode the packet header fields.  Dig into the packet for more detailed

information.

 Provide details on packet activity,

but lack information on global network activities.

 Lack high-level management

supporting.

slide-7
SLIDE 7

7

Problems Problems

 Timely analysis and storing large

volume of data sometimes can be impractical.

 Breakdown: when traffic is too heavy

to handle with.

 Tools: designed for detecting

individual event, not monitoring

  • verall network traffic condition.
slide-8
SLIDE 8

8

Solutions Solutions

 Develop a new network monitoring

method and build a practical system.

 Examine real time network utilization

statistics.

 Look at traffic patterns.  Perform early detection of worm

propagation and DoS attacks.

slide-9
SLIDE 9

9

Related Studies Related Studies

 SNMP-based tools (MRTG)  Packet-Sniffing tools (ntop)  Packet-Sniffing tools (IPAudit)  Flow-based tools (NetFlow)

slide-10
SLIDE 10

10

SNMP-based tools (MRTG) SNMP-based tools (MRTG)

 MRTG:Multi Router Traffic Grapher  Generate HTML page including traffic

statistics images, provide a live and visual representation of network traffic.

 Keep all collected data to a log.  Contain all data over last 2 years,

logs does not grow unlimited.

 Monitor network traffic and other

dynamic information.

slide-11
SLIDE 11

11

Packet-Sniffing tools Packet-Sniffing tools (ntop (ntop) )

 Capture packets, and decode the

packets to show network usage.

 Management: traffic measurement

and monitoring, network optimization, network planning.

 Database support: long-standing

network monitoring and problem backtracking.

 Reports: web mode, interactive

command line mode.

slide-12
SLIDE 12

12

Packet-Sniffing tools Packet-Sniffing tools (IPAudit (IPAudit) )

 Record the network activities on a

network by host, protocal, and port.

 Listen to the network device in

promiscuous mode.

 Monitoring intrusion detection,

bandwidth consumption, and DoS attacks.

 IPAudit-Web: web based network

reports.

slide-13
SLIDE 13

13

Flow-based tools Flow-based tools (NetFlow (NetFlow) )

 Network flow: a unidirectional

sequence of packets between given source and destination network endpoints.

 NetFlow: provide the measurement

for the flow-based network analysis.

 A unique flow: source/destination IP,

source/destination port, layer 3 protocal type, type of service, input logical interface.

slide-14
SLIDE 14

14

Flow Expired Flow Expired

 Idle for a specified time.  Long-lived flows are expired. By

default this is set at 30 minutes.

 The cache becomes full, and so

heuristics are applied to age groups

  • f flows to expire and export those

flows.

 The TCP connection associated with

the flow has reached its end (FIN) or has been reset (RST).

slide-15
SLIDE 15

15

The Proposed Mechanism The Proposed Mechanism

Collecting Forensic Query Statistic Analysis Rule based Analysis Abnormal Traffic Alert Collecting Database

slide-16
SLIDE 16

16

Collecting Module Collecting Module

 Capture the UDP Packets.  Store the NetFlow Records.  Rotate the records into the disk for

further analysis.

 Records might occupy large space.  Disk size should be carefully chosen.  RAM Disk: accelerate the speed of

the analysis.

slide-17
SLIDE 17

17

Statistic Analysis Module Statistic Analysis Module

 Examine each flow, maintain the

counts of the attribute values.

 Summarize and store the statistics

into the database.

 Information is shown in visual graph

in web pages.

 Summarized information should be

plotted into separate graphs.

slide-18
SLIDE 18

18

Graph with aggregation Graph with aggregation

slide-19
SLIDE 19

19

Graph without aggregation Graph without aggregation

slide-20
SLIDE 20

20

Rule Based Analysis Module Rule Based Analysis Module

 Establish rules to alert the attacks.  Attacks often have the patten.  System will collect abnormal amount

  • f the flows with this pattern.

 System needs to know the worm

behavior prior to discover the worm activities.

 Establish the filtering rules.

slide-21
SLIDE 21

21

Results Results

 Results on Traffic Monitoring

 Traffic volume of the IP protocols  Flow graph of the ICMP protocols

 Results on DoS Attacks Detection

 Flow graphs of TCP port 22  Flow graphs of TCP port 44

slide-22
SLIDE 22

22

Traffic volume of the Traffic volume of the IP protocols IP protocols

slide-23
SLIDE 23

23

Flow graph of the Flow graph of the ICMP protocol ICMP protocol

slide-24
SLIDE 24

24

Flow graphs of TCP port 22 Flow graphs of TCP port 22

slide-25
SLIDE 25

25

Flow graphs of TCP port 44 Flow graphs of TCP port 44

slide-26
SLIDE 26

26

Conclusion Conclusion

 Shorten the management time in a

large network.

 Find the malicious activities in

progress as soon as possible.

 Monitor a large network in real-time.  Separate flow graphs is easier to

identify anomaly.

 Rule-based: filter well-known worm

  • r DoS attacks.