Detecting Distributed Attacks Using Network-Wide Flow
Data
Anukool Lakhina with Mark Crovella and Christophe Diot
FloCon, September 21, 2005
Using Network-Wide Flow Data Anukool Lakhina with Mark Crovella - - PowerPoint PPT Presentation
Detecting Distributed Attacks Using Network-Wide Flow Data Anukool Lakhina with Mark Crovella and Christophe Diot FloCon, September 21, 2005 The Problem of Distributed Attacks NYC Victim network LA ATLA Continue to become more
FloCon, September 21, 2005
2
LA ATLA NYC
3
LA HSTN ATLA NYC
– Anomaly stands out visibly
– Exhausted bandwidth – Need upstream provider’s cooperation – Spoofed sources
Victim network
4
LA HSTN ATLA NYC
– Identify ingress, deploy filters
– Attack does not stand out – Present on multiple flows
5
traffic on all links
misuse, operational problems
6
7
to houston to seattle to atlanta to LA from nyc
8
9
10
– Methods exploit temporal correlation
– Make use of spatial correlation
– Strong trends exhibited throughout network are likely to be “normal” – Anomalies break relationships between traffic measures
11
Traffic vector of all OD flows at a particular point in time Normal traffic vector Residual traffic vector
12
[LPC+:SIGMETRICS ‘04]
Normal subspace Anomalous subspace
13
Multihomed customer CALREN reroutes around outage at LOSA
14
15
16
One destination (victim) dominates ~ 450 new destination ports
# Packets # Packets
Summarize using sample entropy of histogram X:
where symbol i occurs ni times; S is total # of
Dispersed Histogram
High Entropy
Concentrated Histogram
Low Entropy
17
H(DstPort) # Bytes # Packets H(Dst IP) But stands out in feature entropy, which also reveals its structure Port scan dwarfed in volume metrics…
18
292 152 Total 20 23 False Alarm 45 19 Unknown 7 Point Multipoint 11 4 Outage 28 Network Scan 30 Port Scan 3 6 Flash Crowd 11 16 DOS 137 84 Alpha
# Additional in Entropy # Found in Volume Anomaly Label 3 weeks of Abilene anomalies classified manually
19
20
21
Summary: Correctly classified 292 of 296 injected anomalies (DstIP) (SrcIP) (SrcIP) Known Labels Cluster Results
Legend
Code Red Scanning Single source DOS attack Multi source DOS attack
22
LA HSTN ATLA NYC
23
24
25
26
1.3% 12% 0.63% 6.3%
[Hussain et al, 03]
[Jung et al, 04]
Entropy + Volume Entropy + Volume Volume Alone Volume Alone
Evaluation Methodology
anomaly traces into OD flows
anomaly intensities, by thinning trace
sequence of experiments
(intensity % compared to average flow bytes)
27
(SrcIP) (SrcPort) (DstIP)
28
–
Alpha 4 10
–
Flash Crowd 8 9
+
Point Multipoint 8 8
– –
Alpha 22 7
+
Outage 22 6
+
Alpha 24 5
+
–
Port Scan 30 4
+
–
+
–
Port Scan 35 3
+
Network Scan 53 2
– – –
Alpha 191 1
Plurality Label # points ID –
Alpha 4 10
–
Flash Crowd 8 9
+
Point Multipoint 8 8
– –
Alpha 22 7
+
Outage 22 6
+
Alpha 24 5
+
–
Port Scan 30 4
+
–
+
–
Port Scan 35 3
+
Network Scan 53 2
– – –
Alpha 191 1
Plurality Label # points ID –
Alpha 4 10
–
Flash Crowd 8 9
+
Point Multipoint 8 8
– –
Alpha 22 7
+
Outage 22 6
+
Alpha 24 5
+
–
Port Scan 30 4
+
–
+
–
Port Scan 35 3
+
Network Scan 53 2
– – –
Alpha 191 1
Plurality Label # points ID –
Alpha 4 10
–
Flash Crowd 8 9
+
Point Multipoint 8 8
– –
Alpha 22 7
+
Outage 22 6
+
Alpha 24 5
+
–
Port Scan 30 4
+
–
+
–
Port Scan 35 3
+
Network Scan 53 2
– – –
Alpha 191 1
Plurality Label # points ID –
Alpha 4 10
–
Flash Crowd 8 9
+
Point Multipoint 8 8
– –
Alpha 22 7
+
Outage 22 6
+
Alpha 24 5
+
–
Port Scan 30 4
+
–
+
–
Port Scan 35 3
+
Network Scan 53 2
– – –
Alpha 191 1
Plurality Label # points ID
29
time traffic link traffic
30
[Jackson and Mudholkar, 1979]
31
32
121 11 Abilene 484 22 Géant # OD flows # PoPs Network
33
residual “normal” typical
# od -pairs # timebins
H(SrcIP ) H(SrcPort ) H(DstPort ) H(DstIP )
types H(srcIP ) H(dstIP ) H(srcPort ) H(dstPort ) # od -pairs # od -pairs # timebins # timebins
H(SrcIP ) H(SrcPort ) H(DstPort ) H(DstIP )
types types H(srcIP ) H(dstIP ) H(srcPort ) H(dstPort )