Title: ELISHA: A Visual-Based Anomaly Detection System
1ELISHA A Visual-Based Anomaly Detection System
2Outline
- Visual-based Anomaly Detection
- The BGP/MOAS Problem
- ELISHA and demo
- Conclusion/Future Works
3A Few Research Objectives
- Limitations on Anomaly Detection
- We need to convey the alerts (or their
abstraction) to the human users or experts - Not only detecting the problem, but also, via an
interactive process, finding more details about
it - Root cause analysis
- Event Correlation
- Human versus Machine Intelligence
4Visual-based Anomaly Detection
- Utilize humans cognitive pattern matching
capability and techniques from information
visualization. - Visual Anomalies
- Something catches your eyes
5An Interactive Process
- Methodology
- Build an interactive interface between network
management and operators, so they can visualize
the data - Features help operators quickly perceive anomalies
6BGP Autonomous Systems
AS6192 (UCDavis)
AS11423 (UC)
169.237/16
AS11537 (CENIC)
7 6192 UCDavis 11423 UC, the origin
ID is CENIC 11537 is admined by University
Corporation for Advanced Internet Development,
origin ID UCAID-1 513 is admined CERN -
European Organization for Nuclear Research
3356 is admined by Level 3 Communications, LLC,
origin ID is L3CL-1 6461 is admined by
Abovenet Communications, Inc 13129 is RIPE
Network Coordination Centre 209 is
admined by Qwest, origin ID is QWEST-4 3320
is RIPE Network Coordination Centre 9177
is admined by NEXTRANET, T-Systems Multilink AG
Switzerland. 4637 , 1221 and 4608 are
admined by APNIC , but I can't find who they are
in APNIC whois database. 3549 is admined
by Global Crossing, it is locate at Phoenix AZ
. 3257 and 3333, 1103 are RIPE Network
Coordination Centre 2914 is admined by
Verio, Inc 7018 is admined by ATT
8Origin AS in an AS Path
- UCDavis (AS-6192) owns 169.237/16 and AS-6192 is
the origin AS - AS Path 2194?209?11423? 6192
- 12654 513 11537 11423 6192
- 12654 13129 6461 3356 11423 6192
- 12654 9177 3320 209 11423 6192
- 12654 4608 1221 4637 11423 6192
- 12654 777 2497 209 11423 6192
- 12654 3549 3356 11423 6192
- 12654 3257 3356 11423 6192
- 12654 1103 11537 11423 6192
- 12654 3333 3356 11423 6192
- 12654 7018 209 11423 6192
- 12654 2914 209 11423 6192
- 12654 3549 209 11423 6192
- Observation Points in the Internet collecting BGP
AS Path Updates - RIPE AS-12654
9BGP MOAS/OASC Events
- Observable Changes in IP Address Ownership
- OASC Origin AS Changes
- Example 1
- Multiple ASes announce the same block of IP
addresses. - MOAS stands for Multiple Origin AS.
- Example 2
- Punch Holes in the Address Space.
- AS-7777 announced 169.237.6/24
- Maybe legitimate or faulty.
- Many different types of MOAS/OASC events
10BGP MOAS/OASC Events
Max 10226 (9177 from a single AS)
11ELISHA/MOAS
- Low level events BGP Route Updates
- High level events MOAS/OASC
- Still 1000 per day and max 10226 per day
- IP address blocks
- Origin AS in BGP Update Messages
- Different Types of MOAS conflicts
12Quad-Tree Representation
13MOAS Event Types
- Using different colors to represent types of MOAS
events - C type CSS, CSM, CMS, CMM
- H type H
- B type B
- O type OS, OM
14Example CSM (Change S?M)
victim
one CSM instance
suspect
15AS-7777 Punched a Hole
Which AS against which And which address blocks?
16Interesting ASs to watch
- AS7777
- August 14, 2000 H, OS
- AS15412
- April 6-19, 2001 CSM, CMS
- AS4740
- August 18, 2001 CSM, CMS
- September 27, 2001 CSM, CMS
- AS701
- May 02, 2001 H (63.0/10)
- 00 11 11 11 00 March 1, 2000, July 11, 200,
September 26, 2001... - AS64518
- September 18, 2001-Nimda Hed from many ASes.
17Demo time!!
1808/14/2000 04/2001
19Remarks
- Preliminary but encouraging results
- Root cause analysis
- Event correlation
- Integration of Information Visualization,
Interactive Investigation Process, and Data
Mining - Examining several other problems
- BGP Route Path Dynamics and Stability
- TCP/IP and HTTP Traffic
- Availability (source code, papers, ppt)
- http//www.cs.ucdavis.edu/wu/Elisha/
- Sponsored by DARPA and NSF
20August 14, 2000 (larger)
212-D versus 3-D on August 14, 2000
22(No Transcript)
23BGP AS Path Dynamics (1)
24BGP AS Path Dynamics (2)
25Address Appearing Frequency
Normal
26DDoS Attack