network monitoring on large networks
play

Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) - PowerPoint PPT Presentation

Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Overview Overview Introduction Related Studies SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring Tools


  1. Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1

  2. Overview Overview  Introduction  Related Studies  SNMP-based Monitoring Tools  Packet-Sniffing Monitoring Tools  Flow-based Monitoring Tools  The Proposed Mechanism  Results  Conclusion 2

  3. Introduction Introduction Malicious Probes Intrusion Internet DoS Attacks Worms  Network security has become one of the most important issues on the Internet. 3

  4. Real-time network Real-time network traffic monitoring traffic monitoring  Provide the status and the patterns of network traffic.  Provide the signs of abnormal traffic and potential problems.  Detect the irregular activities.  Identify the possible attack.  Response the situation in time.  Evidence of intrusions. 4

  5. SNMP-based tools SNMP-based tools  Collector:collect SNMP data.  Grapher:generate HTML output containing traffic loading image.  Provide a live and visual representation of network traffic and traffic trends in time-series data.  Only provide information about levels and changes in traffic volume.  Need more detailed data. 5

  6. Packet-Sniffing tools Packet-Sniffing tools  Capture the traffic packets.  Decode the packet header fields.  Dig into the packet for more detailed information.  Provide details on packet activity, but lack information on global network activities.  Lack high-level management supporting. 6

  7. Problems Problems  Timely analysis and storing large volume of data sometimes can be impractical.  Breakdown: when traffic is too heavy to handle with.  Tools: designed for detecting individual event, not monitoring overall network traffic condition. 7

  8. Solutions Solutions  Develop a new network monitoring method and build a practical system.  Examine real time network utilization statistics.  Look at traffic patterns.  Perform early detection of worm propagation and DoS attacks. 8

  9. Related Studies Related Studies  SNMP-based tools (MRTG)  Packet-Sniffing tools (ntop)  Packet-Sniffing tools (IPAudit)  Flow-based tools (NetFlow) 9

  10. SNMP-based tools (MRTG) SNMP-based tools (MRTG)  MRTG:Multi Router Traffic Grapher  Generate HTML page including traffic statistics images, provide a live and visual representation of network traffic.  Keep all collected data to a log.  Contain all data over last 2 years, logs does not grow unlimited.  Monitor network traffic and other dynamic information. 10

  11. Packet-Sniffing tools Packet-Sniffing tools (ntop) ) (ntop  Capture packets, and decode the packets to show network usage.  Management: traffic measurement and monitoring, network optimization, network planning.  Database support: long-standing network monitoring and problem backtracking.  Reports: web mode, interactive command line mode. 11

  12. Packet-Sniffing tools Packet-Sniffing tools (IPAudit) ) (IPAudit  Record the network activities on a network by host, protocal, and port.  Listen to the network device in promiscuous mode.  Monitoring intrusion detection, bandwidth consumption, and DoS attacks.  IPAudit-Web: web based network reports. 12

  13. Flow-based tools (NetFlow (NetFlow) ) Flow-based tools  Network flow: a unidirectional sequence of packets between given source and destination network endpoints.  NetFlow: provide the measurement for the flow-based network analysis.  A unique flow: source/destination IP, source/destination port, layer 3 protocal type, type of service, input logical interface. 13

  14. Flow Expired Flow Expired  Idle for a specified time.  Long-lived flows are expired. By default this is set at 30 minutes.  The cache becomes full, and so heuristics are applied to age groups of flows to expire and export those flows.  The TCP connection associated with the flow has reached its end (FIN) or has been reset (RST). 14

  15. The Proposed Mechanism The Proposed Mechanism Statistic Rule based Collecting Analysis Analysis Forensic Abnormal Database Query Traffic Alert Collecting 15

  16. Collecting Module Collecting Module  Capture the UDP Packets.  Store the NetFlow Records.  Rotate the records into the disk for further analysis.  Records might occupy large space.  Disk size should be carefully chosen.  RAM Disk: accelerate the speed of the analysis. 16

  17. Statistic Analysis Module Statistic Analysis Module  Examine each flow, maintain the counts of the attribute values.  Summarize and store the statistics into the database.  Information is shown in visual graph in web pages.  Summarized information should be plotted into separate graphs. 17

  18. Graph with aggregation Graph with aggregation 18

  19. Graph without aggregation Graph without aggregation 19

  20. Rule Based Analysis Module Rule Based Analysis Module  Establish rules to alert the attacks.  Attacks often have the patten.  System will collect abnormal amount of the flows with this pattern.  System needs to know the worm behavior prior to discover the worm activities.  Establish the filtering rules. 20

  21. Results Results  Results on Traffic Monitoring  Traffic volume of the IP protocols  Flow graph of the ICMP protocols  Results on DoS Attacks Detection  Flow graphs of TCP port 22  Flow graphs of TCP port 44 21

  22. Traffic volume of the Traffic volume of the IP protocols IP protocols 22

  23. Flow graph of the Flow graph of the ICMP protocol ICMP protocol 23

  24. Flow graphs of TCP port 22 Flow graphs of TCP port 22 24

  25. Flow graphs of TCP port 44 Flow graphs of TCP port 44 25

  26. Conclusion Conclusion  Shorten the management time in a large network.  Find the malicious activities in progress as soon as possible.  Monitor a large network in real-time.  Separate flow graphs is easier to identify anomaly.  Rule-based: filter well-known worm or DoS attacks. 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend