Detecting Distributed Attacks Using NetworkWide Flow Analysis - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

Detecting Distributed Attacks Using NetworkWide Flow Analysis

Description:

to atlanta. to LA. from nyc. 8 ... separate normal & anomalous network-wide traffic ... Then, decompose traffic in all OD flows by projecting onto the two ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 30
Provided by: MarkCr8
Category:

less

Transcript and Presenter's Notes

Title: Detecting Distributed Attacks Using NetworkWide Flow Analysis


1
Detecting Distributed Attacks Using Network-Wide
Flow Analysis
  • Anukool Lakhina, Mark Crovella, Christophe Diot

FloCon, September 21, 2005
2
The Problem of Distributed Attacks
NYC
Victimnetwork
LA
ATLA
  • Continue to become more prevalent CERT04
  • Financial incentives for attackers, e.g.,
    extortion
  • Increasing in sophistication worm-compromised
    hosts and bot-nets are massively distributed

3
Detection at the Edge
NYC
Victimnetwork
  • Detection easy
  • Anomaly stands out visibly
  • Mitigation hard
  • Exhausted bandwidth
  • Need upstream providers cooperation
  • Spoofed sources

LA
ATLA
HSTN
4
Detection at the Core
  • Mitigation Possible
  • Identify ingress, deploy filters
  • Detection hard
  • Attack does not stand out in single traffic flow
  • Present on multiple flows

5
A Need for Network-Wide Management
  • Effective diagnosis of attacks requires a
    whole-network approach
  • Simultaneously inspecting traffic on all links
  • Useful in many contexts
  • Managing traffic in enterprise networks
  • Worm propagation, insider misuse, operational
    problems

6
Talk Outline
  • Methods
  • Measuring Network-Wide Traffic
  • Detecting Network-Wide Anomalies
  • Beyond Volume Detection Traffic Features
  • Automatic Classification of Anomalies
  • Applications
  • General detection scans, worms, flash events,
  • Case study Detecting Distributed Attacks
  • Summary

7
Origin-Destination Traffic Flows
  • Traffic entering the network at the origin and
    leaving the network at the destination (i.e.,
    the traffic matrix)
  • Use routing (IGP, BGP) data to aggregate NetFlow
    traffic into OD flows
  • Massive reduction in data collection

8
Data Collected
  • Collect network-wide NetFlow traffic from all
    routers of
  • Abilene Internet 2 backbone research network
  • 11 PoPs, 121 OD flows, anonymized, 1 out of 100
    sampling rate, 5 minute bins
  • Géant Europe backbone research network
  • 22 PoPs, 484 OD flows, not anonymized, 1 out of
    1000 sampling rate, 10 minute bins
  • Sprint European backbone commercial network
  • 13 PoPs, 169 OD flows, not anonymized,
    aggregated, 1 out of 250 sampling rate, 10 minute
    bins

9
But, This is Difficult!
How do we extract anomalies and normal behavior
from noisy, high-dimensional data in a
systematic manner?
10
Turning High Dimensionality into a Strength
  • Traditional traffic anomaly diagnosis builds
    normality in time
  • Methods exploit temporal correlation
  • Whole-network view is an attemptto examine
    normality in space
  • Make use of spatial correlation
  • Useful for anomaly diagnosis
  • Strong trends exhibited throughout network are
    likely to be normal
  • Anomalies break relationships between traffic
    measures

11
The Subspace Method LCDSIGCOMM 04
  • An approach to separate normal anomalous
    network-wide traffic
  • Designate temporal patterns most common to all
    the OD flows as the normal subspace
  • Remaining temporal patterns form the anomalous
    subspace
  • Then, decompose traffic in all OD flows by
    projecting onto the two subspaces to obtain

Residual trafficvector
Traffic vector of all OD flows at a particular
point in time
Normal trafficvector
12
The Subspace Method, Geometrically
In general, anomalous traffic results in a large
sizeof For higher dimensions, use Principal
Component Analysis LPCSIGMETRICS 04
Traffic on Flow 2
Traffic on Flow 1
13
Subspace Method Detection
  • Error Bounds on Squared Prediction Error
  • Assuming Normal Errors
  • Jackson and Mudholkar, 1979
  • Full details in our paper LCDSIGCOMM 04

14
Example of a Volume Anomaly LCDIMC 04
15
Talk Outline
  • Methods
  • Measuring Network-Wide Traffic
  • Detecting Network-Wide Anomalies
  • Beyond Volume Detection Traffic Features
  • Key benefit detect classify low-volume
    anomalies
  • Automatic Classification of Anomalies
  • Applications
  • General detection scans, worms, flash events,
  • Case Study Detecting Distributed Attacks
  • Summary

16
Exploiting Traffic Features
  • Key Idea
  • Anomalies can be detected and distinguished
    by inspecting traffic features SrcIP,
    SrcPort, DstIP, DstPort
  • Overview of Methodolgy
  • Inspect distributions of traffic features
  • Correlate distributions network-wide to detect
    anomalies
  • Cluster on anomaly features to classify

17
Traffic Feature Distributions LCDSIGCOMM 05
  • Typical Traffic

18
Feature Entropy Timeseries
Bytes
Port scan dwarfed in volume metrics
Packets
H(Dst IP)
But stands out in feature entropy, which also
revealsits structure
H(DstPort)
19
How Do Detected Anomalies Differ?
3 weeks of Abilene anomalies classified manually
20
Talk Outline
  • Methods
  • Measuring Network-Wide Traffic
  • Detecting Network-Wide Anomalies
  • Beyond Volume Detection Traffic Features
  • Automatic Classification of Anomalies
  • Applications
  • General detection scans, worms, flash events,
  • Detecting Distributed Attacks
  • Summary

21
Classifying Anomalies by Clustering
  • Enables unsupervised classification
  • Key advantage not restricted to a predefined set
    of anomalies
  • Treat each anomaly as a point in 4-D space
  • (SrcIP), (SrcPort), (DstIP),
    (DstPort)
  • Then, cluster in this 4-D space questions we
    ask
  • Do anomalies form clusters in this space?
  • Are the clusters meaningful?
  • Internally consistent, externally distinct
  • What can we learn from the clusters?

22
Clustering Known Anomalies (2-D view)
Known Labels
Cluster Results
Legend Code Red Scanning Single source DOS
attack Multi source DOS attack
(DstIP)
(SrcIP)
(SrcIP)
Summary Correctly classified 292 of 296
injected anomalies
23
Case Study Distributed Attack Detection
  • Evaluation Methodology
  • Superimpose known DDOS attack trace in OD flows
  • Split attack traffic into varying number of OD
    flows
  • Test sensitivity at varying anomaly intensities,
    by thinning trace
  • Results are average over an exhaustive sequence
    of experiments

24
Distributed Attacks Detection Results
11 OD flows
10 OD flows
9 OD flows
1.3
0.13
The more distributed the attack, the easier it
is to detect
25
Summary
  • Network-Wide Detection
  • Broad range of anomalies with low false alarms
  • Feature entropy significantly augment volume
    metrics
  • Highly sensitive Detection rates of 90
    possible, even when anomaly is 1 of background
    traffic
  • Anomaly Classification
  • Clusters are meaningful, and reveal new anomalies
  • In papers more discussion of clusters and Géant
  • Whole-network study and traffic feature analysis
    are promising for network management and
    diagnostics

26
More information
  • Ongoing Work implementing algorithms in a
    prototype that will do network anomaly diagnosis
    and traffic management
  • Please see our SIGCOMM 2005 and SIGCOMM 2004
    papers slides at
  • http//cs-people.bu.edu/anukool/pubs.html
  • Feel free to contact me at Anukool Lakhina,
  • anukool_at_cs.bu.edu, 617-784-4457

27
Backup slides
28
3-D view of Abilene anomaly clusters
  • Used 2 different clustering algorithms
  • Results consistent
  • Heuristics identify about 10 clusters in dataset
  • details in paper

(DstIP)
(SrcIP)
(SrcPort)
29
Abilene Clusters Reveal New Anomalies
Insights 3 and 4 different types of
scanning 7 NAT box?
Write a Comment
User Comments (0)
About PowerShow.com