Title: Mining Anomalies in NetworkWide Flow Data
1Mining Anomalies in Network-Wide Flow Data
- Anukool Lakhina with Mark Crovella and
Christophe Diot
NANOG35, Oct 23-25, 2005
2My Talk in One Slide
- Goal A general system to detect classify
traffic anomalies at carrier networks - Network-wide flow data (eg, via NetFlow) exposes
a wide range of anomalies - Both operational malicious events
- I am here to seek your feedback ?
3Network-Wide Traffic Analysis
- Simultaneously analyze traffic flows across the
network e.g., using the traffic matrix - Network-Wide data we use Traffic matrix views
for Abilene and Géant at 10 min bins
4Power of Network-Wide Analysis
Peak rate 300Mbps Attack rate 19Mbps/flow
IPLS
Distributed Attacks easier to detect at the
ingress
5But, This is Difficult!
How do we extract anomalies and normal behavior
from noisy, high-dimensional data in a
systematic manner?
6The Subspace Method LCDSIGCOMM 04
- An approach to separate normal anomalous
network-wide traffic - Designate temporal patterns most common to all
the OD flows as the normal patterns - Remaining temporal patterns form the anomalous
patterns - Detect anomalies by statistical thresholds on
anomalous patterns
7An example user anomaly
8An example operational anomaly
9Summary of Anomaly Types Found LCDIMC04
False Alarms
Unknown
Traffic ShiftOutageWormPoint-Multipoint
Alpha
FlashEvents
DOS
Scans
10Automatically Classifying Anomalies
LCDSIGCOMM05
- Goal Classify anomalies without restricting
yourself to a predefined set of anomalies - Approach Leverage 4-tuple header fields
- SrcIP, SrcPort, DstIP, DstPort
- In particular, measure dispersion in fields
- Then, apply off-the-shelf clustering methods
11Example of Anomaly Clusters
Dispersed
Legend Code Red Scanning Single source DOS
attack Multi source DOS attack
(DstIP)
(SrcIP)
Dispersed
Concentrated
Summary Correctly classified 292 of 296
injected anomalies
12Summary
- Network-Wide Detection
- Broad range of anomalies with low false alarms
- In papers Highly sensitive detection, even when
anomaly is 1 of background traffic - Anomaly Classification
- Feature clusters automatically classify anomalies
- In papers clusters expose new anomalies
- Network-wide data and header analysis are
promising for general anomaly diagnosis
13More information
- Ongoing Work implementing algorithms in a
prototype system - For more information, see papers slides at
- http//cs-people.bu.edu/anukool/pubs.html
- Your feedback much needed appreciated!