The Subspace Method for Diagnosing Network-Wide Traffic Anomalies - - PowerPoint PPT Presentation

the subspace method for diagnosing network wide traffic
SMART_READER_LITE
LIVE PREVIEW

The Subspace Method for Diagnosing Network-Wide Traffic Anomalies - - PowerPoint PPT Presentation

The Subspace Method for Diagnosing Network-Wide Traffic Anomalies Anukool Lakhina, Mark Crovella, Christophe Diot Whats happening in my network? Is my customer being attacked? probed? infected? Is there a sudden traffic shift?


slide-1
SLIDE 1

The Subspace Method for Diagnosing Network-Wide Traffic Anomalies

Anukool Lakhina, Mark Crovella, Christophe Diot

slide-2
SLIDE 2

2

What’s happening in my network?

  • Is my customer being attacked? probed? infected?
  • Is there a sudden traffic shift?
  • An external route change?
  • A routing loop?
  • An equipment outage?

Automated methods for reliably and generally answering such questions are lacking

slide-3
SLIDE 3

3

A General Framework

  • We can treat all such problems as special cases
  • f the general question:

Is my network experiencing unusual conditions?

  • Then, adopt the following framework:

– Detection Is there an unusual event? – Identification Which of the possible explanations fits best? – Quantification How serious is the problem?

slide-4
SLIDE 4

4

Statistical Approach

The advantage of such a framework is that it lends itself to a statistical approach:

– Detection: Outlier detection – Identification: Hypothesis testing – Quantification: Estimation Anomaly Diagnosis

slide-5
SLIDE 5

5

A Need for Whole-Network Diagnosis

Our Thesis: Effective diagnosis of network anomalies requires a whole-network approach

For example, diagnosing traffic anomalies requires analyzing traffic from all links

slide-6
SLIDE 6

6

But, This Is Difficult!

  • Need to study traffic from all links in a

network simultaneously

– Large amount of data – Traffic is nonstationary – Varying link utilization levels – 100s of links High dimensionality

1 2 3 4 5 6 x 107 DNVR−SNVA 1 2 3 4 5 x 107 HSTN−KSCY 0.5 1 1.5 2 x 108 LOSA−SNVA 3 4 5 6 x 108 CHIN−NYCM 1 2 3 4 5 x 107 ATLA−ATLA 0.5 1 1.5 2 2.5 3 x 107 DNVR−DNVR 5 10 15 x 106 KSCY−KSCY 2 2.5 3 3.5 4 4.5 x 107 SNVA−SNVA 1 2 3 4 x 106 LOSA−LOSA 0.5 1 1.5 x 107 HSTN−HSTN 1 2 3 4 5 6 x 106 STTL−STTL 1 1.5 2 x 108WASH−WASH

How do we extract meaning from such a high-dimensional data in a systematic manner?

slide-7
SLIDE 7

7

Low Intrinsic Dimensionality of Link Traffic

Studied via Principal Component Analysis Key result: Normal traffic is well approximated by a low dimensional space For example: Traffic on 40+ links is well approximated in space of

  • nly 4 dimensions
slide-8
SLIDE 8

8

Reasons for Low Dimensionality of Traffic

  • Generally, traffic on different links is not

independent

  • Link traffic is the superposition of origin-

destination flows (OD flows)

– The same OD flow passes over multiple links, inducing correlation among links – All OD flows tend to vary according to common daily and weekly cycles, and so are themselves correlated

[See SIGMETRICS 2004 paper]

slide-9
SLIDE 9

9

The Subspace Method

  • An approach to separate normal from anomalous

traffic

  • Define as the space spanned by the first k principal

components

  • Define as the space spanned by the remaining

principal components

  • Then, decompose traffic on all links by projecting onto

and to obtain:

Traffic vector of all links at a particular point in time Normal traffic vector Residual traffic vector

slide-10
SLIDE 10

10

Traffic on Link 1 Traffic on Link 2

The Subspace Method, Geometrically

In general, anomalous traffic results in a large value

  • f

y

slide-11
SLIDE 11

11

Outline

  • Subspace Method applied to Link Traffic

– Problem: Volume Anomaly Diagnosis – Detection, Identification, Quantification – Validation

  • Subspace Method applied to Flow Traffic

– Problem: General Anomaly Detection – Sample Results

  • Conclusions
slide-12
SLIDE 12

12

Diagnosing Volume Anomalies

  • A volume anomaly is a sudden change in an

OD flow’s traffic (i.e., point to point traffic)

  • Problem Statement:

Given link traffic measurements, diagnose the volume anomalies

  • A first application of the subspace method
slide-13
SLIDE 13

13

An Illustration

5 10 15 x 10

6

4 6 8 x 10

7

2 4 6 x 10

7

2 4 6 x 10

7

Fri Sat Sun 2 4 6 x 10

7

OD flow i−b Link c−b Link d−c Link f−d Link i−f

The Diagnosis Problem requires analyzing traffic on all links to: 1) Detect the time of the anomaly 2) Identify the source & destination 3) Quantify the size of the anomaly

Sprint-Europe Backbone Network

slide-14
SLIDE 14

14

Subspace Method: Detection

  • Error Bounds on Squared

Prediction Error:

  • Assuming multivariate

Gaussian data, traffic is normal when, Result due to

[Jackson and Mudholkar, 1979] Traffic on Link 1 Traffic on Link 2

slide-15
SLIDE 15

15

SPE vs. All Traffic

Value of

  • ver time
  • ver time

Value of SPE (

) at anomaly time points clearly stand out

slide-16
SLIDE 16

16

Results on True Anomalies: Sprint-1

“Knee” in curve - natural cutoff for detection 40 Largest deviations in OD flows via Fourier Detection Identification Quantification

slide-17
SLIDE 17

17

Outline

  • Subspace Method applied to Link Traffic

– Problem: Volume Anomaly Diagnosis – Detection, Identification, Quantification – Validation

  • Subspace Method applied to OD Flow Traffic

– Problem: General Anomaly Detection – Sample Results

  • Conclusions
slide-18
SLIDE 18

18

Beyond Volume Anomalies

  • Volume anomalies: important, but not the entire set of

anomalies of interest to operators.

  • Operators are also interested in:

– DOS attacks, flash crowds, port scans, worm propagation, network equipment outages, changes in ingress/egress traffic patterns, ...

  • Link data doesn't seem to hold enough information to

accurately detect such a wide range of anomaly types.

  • Therefore, we turn to IP flow data
slide-19
SLIDE 19

19

Characterization Methodology

  • Extend subspace method to diagnose

anomalies directly in OD flow traffic timeseries

– Detection in both and subspaces

  • Examine OD flow traffic as three separate

views: # Bytes, # Packets, # IP-flows

  • Manually inspect each anomaly found over 4

week period in Abilene network

– Using 5-tuple headers of sampled flow data

slide-20
SLIDE 20

20

An example BP anomaly (heavy flow)

Dominant Source IP: 192.88.112.0 which accounts for 32% of B, 20% of P and 0.15% of F. Dominant Dest. IP: 160.91.192.0 which accounts for 32% of B, 20% of P and 0.15% of F. Dominant Pair: 192.88.112.0-160.91.192.0 for 32% of B, 20% of P and 0.15% of F. Dominant Dest. Port: 5002 (iperf port, used by SLAC)

slide-21
SLIDE 21

21

An example PF anomaly (DOS attack)

Dominant Source IP: No dominant single source Dominant Dest. IP: 211.65.112.0 accounts for 80% of P traffic and 92% of F traffic. Dominant Pair: No single pair dominant Dominant Ports: No dominant source or destination port found

slide-22
SLIDE 22

22

An example BPF Anomaly (ingress-shift)

Multihomed customer CALREN reroutes around the LOSA-CHIN (scheduled) outage

slide-23
SLIDE 23

23

Species of anomalies found

Customer shifts traffic from one ingress point to another INGRESS-SHIFT Equipment related events that decrease traffic exchanged by an OD pair OUTAGE Distribution of content from one server to many servers POINT to MULTIPOINT Self-propagating code that spreads across a network by exploiting security flaws WORM Scanning a host for a vulnerable port (port scan) or scanning the network for a target port (network scan) SCAN Unusually large demand for a resource/service emerging from common set of sources FLASH CROWD (Distributed) Denial of service attack against a single victim DOS, DDOS Unusually high rate point to point byte transfer ALPHA

Definition Anomaly

slide-24
SLIDE 24

24

137 44 56 64 3 2 3 4 39 31

Alpha DOS Scan Flash−Crowd Point−Multi Worm Outage Ingress−Shift Unknown FalseAlarm

Summary of Anomalies Found

slide-25
SLIDE 25

25

Conclusions

  • Subspace method for anomaly diagnosis allows whole-

network approach

– Significant benefit accrues from whole-network analysis

  • Diagnosing Volume Anomalies from Link Traffic:

– High detection rate, low false alarm rate – Hypothesis-based identification is easily formalized and extended

  • Detecting General Anomalies from Flow Traffic:

– Anomalies detected span remarkable breadth – Almost all of the anomalies found are operationally relevant

  • Whole-Network Anomaly Diagnosis with the Subspace

Method is promising

– ... more to come!

slide-26
SLIDE 26

26

Thanks!

Help with Abilene Data

  • Rick Summerhill, Mark Fullmer (Internet2)
  • Matthew Davy (Indiana University)

Help with Sprint-Europe Data

  • Bjorn Carlsson, Jeff Loughridge (SprintLink),
  • Supratik Bhattacharyya, Richard Gass (ATL)