On the Impact of Flow Monitoring Configuration
Petr Velan et al. velan@ics.muni.cz
Institute of Computer Science, Masaryk University
April 20, 2020
On the Impact of Flow Monitoring Configuration Petr Velan et al. - - PowerPoint PPT Presentation
On the Impact of Flow Monitoring Configuration Petr Velan et al. velan@ics.muni.cz Institute of Computer Science, Masaryk University April 20, 2020 Flow Monitoring Recapitulation Network Flow Monitoring Network Flow Monitoring Used for
Petr Velan et al. velan@ics.muni.cz
Institute of Computer Science, Masaryk University
April 20, 2020
Flow Monitoring Recapitulation
Network planning (using long term statistics) Network debugging
Incident handling Policy verification Attack detection Anomaly detection
2 / 19
Flow Monitoring Recapitulation
Individual packet Receiving side Sending side Time
3 / 19
Flow Monitoring Recapitulation
Individual packet Receiving side Sending side Time Active Timeout
3 / 19
Flow Monitoring Recapitulation
Individual packet Receiving side Sending side Time Active Timeout Active Timeout Active Timeout
3 / 19
Flow Monitoring Recapitulation
Individual packet Receiving side Sending side Time Active Timeout Active Timeout Active Timeout
Active Timeout Active Timeout
3 / 19
Flow Monitoring Recapitulation
Individual packet Receiving side Sending side Time Active Timeout Active Timeout Active Timeout
Active Timeout Active Timeout
Inactive Timeout Active Timeout Inactive Timeout
3 / 19
Flow Monitoring Recapitulation
4 / 19
5 / 19
Flow Expiration Configuration Impact
Larger inactive timeout causes flows to be cached longer which increases computing and memory requirements Smaller timeouts increase number of generated flow records, which increases computing and export bandwidth requirements
Larger number of flow records increases computing and storage space requirements
Larger number of flow records increases computing requirements Different number of flow records with different properties influences analysis results
6 / 19
Flow Expiration Configuration Impact
The CAIDA Anonymized Internet Traces 2015 Dataset (1.1 billion of packets) A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018) (3.6 million of packets)
We were interested only in number of flows Python tool – unsuitable for the CAIDA dataset (too slow, large memory consumption) C++ tool, fast computation the flow records
7 / 19
Analysis of Flow Expiration Timeouts Impact
10 20 30 40 50 60 70 80 90 100 110 120 130 1.5x107 2x107 2.5x107 3x107 3.5x107 4x107 # of flows Interpacket gap frequency 0.07 0.06 0.05 0.04 0.03 0.02 0.00 Interpacket gap / inactive timeout length (seconds) # of flows Interpacket gap frequency
8 / 19
Analysis of Flow Expiration Timeouts Impact
9 / 19
Analysis of Flow Expiration Timeouts Impact
10 20 30 40 50 60 70 80 90 100 450000 500000 550000 600000 650000 700000 750000 # of flows 0.175 0.150 0.125 0.100 0.075 0.050 0.025 0.000 Connection length frequency # of flows Connection length frequency Connection / Active timeout length (seconds)
10 / 19
Analysis of Flow Expiration Timeouts Impact
11 / 19
Analysis of Flow Expiration Timeouts Impact
50 100 150 200 250 300 Active timeout 20 40 60 80 100 120 Inactive timeout 1.6*107 1.7*107 1.8*107 1.9*107 2.0*107 2.1*107 2.2*107 2.3*107 2.4*107
12 / 19
Analysis of Flow Expiration Timeouts Impact
13 / 19
Analysis of Flow Expiration Timeouts Impact
14 / 19
Analysis of Flow Expiration Timeouts Impact
15 / 19
Analysis of Flow Expiration Timeouts Impact
20 40 60 80 100 120 140 160 180 200 220 240 Active timeout 20 40 60 80 100 120 Inactive timeout 1.0*104 2.0*104 3.0*104 4.0*104 5.0*104 6.0*104 7.0*104 8.0*104 9.0*104 100s interpacket gap 108s failed HTTP GET 54s fraction 78s request chunk
16 / 19
Analysis of Flow Expiration Timeouts Impact
17 / 19
Closing Remarks
18 / 19
Closing Remarks
19 / 19