spectral techniques for internet traffic
play

Spectral Techniques for Internet Traffic Christos Papadopoulos and - PowerPoint PPT Presentation

Spectral Techniques for Internet Traffic Christos Papadopoulos and John Heidemann USC/ISI Data Catalog Workshop CAIDA, June 3, 2004 christos@isi.edu, johnh@isi.edu Research Topics Security DDoS classification Attack signatures


  1. Spectral Techniques for Internet Traffic Christos Papadopoulos and John Heidemann USC/ISI Data Catalog Workshop CAIDA, June 3, 2004 christos@isi.edu, johnh@isi.edu

  2. Research Topics • Security – DDoS classification – Attack signatures • Network management – Detection of saturated links – TCP dynamics • Methodology: Spectral analysis

  3. Single vs. Multi-source Attacks Single-source Multi-source 175Hz 290Hz Single src attack produces Multi-src attacks produce � � linear cumulative spectrum localization of power in low frequencies

  4. Single vs. Multi-source Attacks (cont.) Steps: • Compare F(60%) to identify single-/multi-source attacks • Single-source: F(60%) mean 268Hz (240-295Hz) • Multi-source: F(60%) mean 172Hz (142-210Hz) • Robustly categorize Unclassified attacks Results reported at SIGCOMM 2003, Hussain et al.

  5. Congested vs. Un-congested Link Un-congested Link (TCP, UMD->USC, 64MB window) Spectrum of congested link shows clear Congestion shows up as strong signature. high frequency component.

  6. Playground: Los Nettos • Regional network for LA area • ~15 years in existence • Three upstream providers (Verio, Level3, Cogent) plus Internet 2 • 6 members and O(100) associates – mix of academic and commercial • About 45K machines

  7. Los Nettos MEMBER Affiliate JPL HUB CRG Transit VHF Xchange I2 CIT Internet2 LAIIX LAAP CalREN 818 HMC OWB ISI HSC Verio PAIX-LA ICT Cogent USC NGC DWP FE DS3 Circuits Level3 DWP(4) Fiber Level3 Fiber (2) Internet2 Tustin SBC Gigaman CalREN City of Pasadena Fiber(2)

  8. Current Data Collection: Links • Currently monitored links – Verio (200mbps) – Part of Internet 2 (in/out of USC) • Other available links – Level3 (300mbps) – Rest of Internet 2 (200mbps) – Cogent (60mbps)

  9. DNS: B and L Root Servers

  10. Current Data Collection: Trace Hardware • Trace hardware – PCs with 250GB local disks – Netgear GA620 fiber cards – Driver tuned to partial packet capture • RAID boxes – About 6TB

  11. Current Data Collection: Trace Software • PCs running FreeBSD • Tcpdump – Headers only • Traces saved in 2 min files on local disk • Local analysis and periodic transfer to RAID boxes

  12. Trace Analysis Threshold = 60 DNS: 2000, Exclude p2p Find Yes 2-min Examine Yes tcpdump IP Mapping Attack ? trace Analyze/ manually Attack ? Store No No Delete Delete • Captured 80 attacks (July-Nov 2002) • Work by Alefiya Hussain

  13. Available Traces • All 80 DDoS attacks – anonymized – binned (1ms) time-series • Available as a DVD • Must sign 1-page, reasonable MOU – Then we mail you the DVD • Some attacks distributed to about 8-10 takers without advertising

  14. Our Requirements • Packet-level traces • Accurate, high resolution timestamps • Metadata to describe attacks • ..more.. • Contact {johnh@isi.edu or christos}@isi.edu for more information

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend