detectability of traffic anomalies in two adjacent networks

14

Upload: jorryn

Post on 21-Jan-2016

18 views

Category:

Documents


0 download

DESCRIPTION

Detectability of Traffic Anomalies in Two Adjacent Networks. Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot. Anomaly detection in large networks. Anomaly detection is complex for large network Network-wide analysis [Lakhina 04] is promising - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Detectability of Traffic Anomalies in Two Adjacent Networks
Page 2: Detectability of Traffic Anomalies in Two Adjacent Networks

Detectability of Traffic Anomalies in Two Adjacent Networks

Augustin Soule,Haakon Ringberg,Fernando Silveira,Jennifer Rexford,Christophe Diot

Page 3: Detectability of Traffic Anomalies in Two Adjacent Networks

3

Anomaly detection in large networks

• Anomaly detection is complex for large network

• Network-wide analysis [Lakhina 04] is promising• Validated against multiple networks at different time

– Abilene 03, Geant 04, Sprint Europe 03

• Features impacting the anomaly detection are unknown yet

Compare the anomaly observed between two networks

Page 4: Detectability of Traffic Anomalies in Two Adjacent Networks

4

Using entropy for anomaly detection

• Hypothesis : the distribution changes during an anomaly

• Entropy is a measure of the dispersion of the distribution

1.Minimum if the distribution is concentrated

2.Maximum if the distribution is spread

• Four features1.Source IP distribution

2.Destination IP distribution

3.Source Port distribution

4.Destination port distribution

Normal

During a DOS attack

Page 5: Detectability of Traffic Anomalies in Two Adjacent Networks

5

Detecting anomalies

• Kalman filter method [Soule 05]

• Method Overview1.Use a model to predict the traffic

2.Innovation = Prediction error

• High threshold avoid false positive

Page 6: Detectability of Traffic Anomalies in Two Adjacent Networks

6

Collected dataset

• Abilene and Geant monitoring

• Collected three month of data1.BGP

2.IS-IS

3.NetFlow

• Isolate twenty consecutive days of complete measurement

• Connected through two peering links

Sampling Temporal aggregation

Anonymization

Abilene 1/100 5 min 11 bits

Geant 1/1000 15 min 0 bits

Page 7: Detectability of Traffic Anomalies in Two Adjacent Networks

7

Abilene and Geant

•Use routing information to isolate1.Traffic from Abilene to Geant

2.Traffic from Geant to Abilene

•Detect anomalies inside each dataset using the same threshold parameter, but different data-reduction parametes

Page 8: Detectability of Traffic Anomalies in Two Adjacent Networks

8

58 anomalies

10 anomalies

14 anomalies78 anomalies

Anomalies detected

• Compare the anomalies sent versus the anomalies observed

1.Expected for G2A and A

2.Surprising for G and A2G

• Amount of traffic ?• Sampling ?• Anonymization ?• Threshold ?• Method ?• Model ?

Page 9: Detectability of Traffic Anomalies in Two Adjacent Networks

9

Undetected anomalies

• Examples of anomalies detected in a network but undetected in the other.

1. Impact of Sampling & Method

2. Impact of customer’s Traffic Mix

3. Impact of anonymization

Page 10: Detectability of Traffic Anomalies in Two Adjacent Networks

10

GeantNo spike

Example 1 : attack over Port 22

AbileneSpike > 8σ

Sampling affects the perception of anomalyThe effect depends on the type of anomaly

Page 11: Detectability of Traffic Anomalies in Two Adjacent Networks

11

Example 2 : Alpha Flow

Destination IP entropy

Abilene

• Large file transfer between two hosts• Observed in Geant• Undetectable in Abilene

• In this Abilene the traffic is already concentrated by Web traffic

• The anomaly detectability is impacted by traffic

Geant

Page 12: Detectability of Traffic Anomalies in Two Adjacent Networks

12

Example 3 : Scan over an IP subnet

• Attacker doing a subnet scan• One source host • Multiple destination hosts

1.Concentration of source IP

2.Dispersion of destination IP

• But we observe concentration in the Destination IP entropy

• Anonymization can :1.Help to detect anomalies

2.Impact the anomaly identification

Page 13: Detectability of Traffic Anomalies in Two Adjacent Networks

13

Summary

• First synchronized observation of two networks for anomaly detection

• Identification of various features impacting anomaly detection1. Sampling

2. Traffic mix

3. Anonymization

• Two anomalies are impacted differently by each features

• What impacts detectability ?

Page 14: Detectability of Traffic Anomalies in Two Adjacent Networks

Thanks for listening !