StrobeLight: Lightweight Availability Mapping and Anomaly Detection - - PowerPoint PPT Presentation

strobelight lightweight availability mapping and anomaly
SMART_READER_LITE
LIVE PREVIEW

StrobeLight: Lightweight Availability Mapping and Anomaly Detection - - PowerPoint PPT Presentation

StrobeLight: Lightweight Availability Mapping and Anomaly Detection James Mickens, John Douceur, Bill Bolosky Brian Noble At any given moment, how can we tell which enterprise machines are online and network-reachable? Mobile AJAX


slide-1
SLIDE 1

StrobeLight: Lightweight Availability Mapping and Anomaly Detection

James Mickens, John Douceur, Bill Bolosky Brian Noble

slide-2
SLIDE 2
slide-3
SLIDE 3

At any given moment, how can we tell which enterprise machines are

  • nline and network-reachable?

Mobile AJAX cloud-based social networking goodness

Customer

slide-4
SLIDE 4

Who Could Give Us Availability Data?

  • Best case: Zeus
  • If we’re lucky: the

distributed system itself

– Limited scope? – Doesn’t scale? – Need to modify hosts/ routers?

slide-5
SLIDE 5

Our Solution: StrobeLight

  • Persistent enterprise-level monitoring

– Track availability of 200K+ hosts

  • Network-wide sweep every 30 seconds

– Fast enough for near real-time analysis – Archive results for use by other services

  • Doesn’t require modification to:

– End hosts – Core routing infrastructure

slide-6
SLIDE 6

How Would We Use This Data?

  • Improve system performance

– DHTs, Farsite: select the best storage hosts – Multicast trees: build more robust topologies – BOINC: perform smarter task allocation

  • Detect system-level anomalies

– Misconfigured routers – IP hijacking attacks

slide-7
SLIDE 7

Outline

  • Design and Implementation
  • Availability Fingerprints
  • Detecting IP Hijacks Using

Fingerprints

  • Related Work
  • Conclusions
slide-8
SLIDE 8

Design Goals

  • Keep it simple, stupid

– Don’t modify end hosts – Don’t change routing core

  • Don’t be annoying

– Don’t impact real flows

  • Collect high-resolution data

– Per-host statistics – Fine temporal granularity

slide-9
SLIDE 9

There Were Non-goals™

  • Infinite scaling: overkill in enterprise setting

– Scaling target: hundred of thousands of hosts – Small number of administrative domains – Centralized solution might be okay

  • Total address disambiguation: hard, unnecessary

– NATs, DHCP, firewalls decouple hosts, IPs – We’re content to measure IP reachability

slide-10
SLIDE 10

The Winning Design: StrobeLight

slide-11
SLIDE 11

Outline

  • Design and Implementation
  • Availability Fingerprints
  • Detecting IP Hijacks Using

Fingerprints

  • Related Work
  • Conclusions
slide-12
SLIDE 12

Availability Fingerprint

  • Instantaneous snapshot of subnet availability

– Bit vector: bh = 1 iff host h responded to probe

  • Similarity metric: # of equivalent bit positions

– Normalize to the range [-1,1]

  • What does fingerprint similarity look like . . .

– Within a single subnet across time? – Between different subnets at a given moment?

slide-13
SLIDE 13

Self-similarity: 15 minute intervals (256-host subnets)

slide-14
SLIDE 14

Instantaneous Cross-subnet Similarity ???

slide-15
SLIDE 15

Cross-subnet similarity vs. Time

Cool Uncool

slide-16
SLIDE 16

Ghosts Were Not To Blame

slide-17
SLIDE 17

One Use For StrobeLight

slide-18
SLIDE 18

Outline

  • Design and Implementation
  • Availability Fingerprints
  • Detecting IP Hijacks Using

Fingerprints

  • Related Work
  • Conclusions
slide-19
SLIDE 19

IP Hijacking

  • Internet: a collection of autonomous systems
  • BGP protocol stitches ASes together

– ASes announce prefix ownership, path lengths – No authentication of announcements!

  • Hijack attack: disrupt routing to target prefix

– Announce ownership of/short route to prefix – Some routers may not be affected (location matters)

slide-20
SLIDE 20

IP Hijacking

1) Blackhole attack: drop all traffic 2) Imposture attack: impersonate target prefix 3) Interception attack: inspect/modify traffic

  • First two should cause fingerprint anomalies!
slide-21
SLIDE 21

Enterprise Network

ft ~ ft-1 ft ~ ft-1

slide-22
SLIDE 22

Enterprise Network

ft ~ ft-1 ft ~ ft-1

slide-23
SLIDE 23

Does WAN Distort Our Probes?

slide-24
SLIDE 24

Does WAN Distort Our Probes?

slide-25
SLIDE 25

Spectrum Agility Hijacks

  • Short-lived manipulation of BGP state

– Hijack /8 prefix – Send spam from random IP addresses – Withdraw BGP advertisement a few minutes later

  • Assume attacker subnet has random fingerprint
slide-26
SLIDE 26

Spectrum Agility Hijacks

  • Simulation setup

– Slide window through MSR trace – For each subnet x, test two similarities

slide-27
SLIDE 27

Spectrum Agility Hijacks

  • Simulation setup

– Slide window through MSR trace – For each subnet x, test two similarities No attack 1101101 1101101 True negative: sim(fx,t, fx,t-1) ≥ c False positive: sim(fx,t, fx,t-1) < c 1101101 101101 fx,t-2 fx,t-1 fx,t fx,t+1

slide-28
SLIDE 28

Spectrum Agility Hijacks

  • Simulation setup

– Slide window through MSR trace – For each subnet x, test two similarities Attack! 1101101 1101101 True positive: sim(fkhan, fx,t-1) < c False negative: sim(fkhan, fx,t-1) ≥ c 1101101 101101 fx,t-2 fx,t-1 fx,t fx,t+1 0101001 fkhan No attack

slide-29
SLIDE 29

Detecting Spectrum Attacks: c=0.78

DNS failure: StrobeLight thinks hosts have died

slide-30
SLIDE 30

Outline

  • Design and Implementation
  • Availability Fingerprints
  • Detecting IP Hijacks Using

Fingerprints

  • Related Work
  • Conclusions
slide-31
SLIDE 31

Availability Monitoring

  • Academic network path monitors

– CoMon, iPlane, RON – Don’t scale to enterprise/don’t track per-host stats

  • Commercial monitoring tools

– Pro: Richer set of statistics – Cons: More difficult to deploy, slower refresh

slide-32
SLIDE 32

Detecting IP Hijacking

  • Modify BGP/push crypto into routing core

– Aiello 2003, Hu 2004, Zhao 2002, etc.

  • Passive monitoring of routing state

– Find anomalies in RouteViews, IRR

  • Data plane fingerprints (Hu and Mao 2006)

– Monitor live BGP for suspicious updates – Scan target prefix with nmap, IP ID probes – Raise alarm if different views are inconsistent

slide-33
SLIDE 33

Conclusion

  • StrobeLight: enterprise-level

availability monitor

– End hosts/routers unchanged – Real-time feeds, archival data

  • Example of StrobeLight client:

Hijack detector

– Uses availability fingerprints to find routing anomalies – Anomaly detection is fast and accurate – Don’t need to modify BGP/push crypto into routers

slide-34
SLIDE 34

Thanks!