network traffic analysis

Upload: knithim

Post on 07-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 Network Traffic Analysis

    1/19

    Himanshu UttamIWC2010009

    1

  • 8/4/2019 Network Traffic Analysis

    2/19

    What is Network Traffic?Ne twork Traffic Analysis

    Why Monitor and Analyz e Traffic?Ne twork administrators vi ewpointNe twork intrud ers vi ewpoint

    App roaches for Traffic Measurement

    Analyzing Procedure

    2

  • 8/4/2019 Network Traffic Analysis

    3/19

    Density of data pr esent in th e network.

    Communication d evices access resourc es and

    also g et requests to carry out som e work.So a lot of r equest, r espons e and control data.

    Load on th e network.

    Oth er d evices may g et d elayed in th eirrequir ements.

    3

  • 8/4/2019 Network Traffic Analysis

    4/19

    Network traffic monitoring and analysistechniques allow the traffic at particular pointson a network to be recorded, displayed in

    useful form and analysed.

    4

  • 8/4/2019 Network Traffic Analysis

    5/19

    T raffic can be monitored: At the network boundaryOn specific segments

    At particular interfaces

    5

  • 8/4/2019 Network Traffic Analysis

    6/19

    T his question can be approached from twoviewpoints:

    Network administrator

    Network intruder

    6

  • 8/4/2019 Network Traffic Analysis

    7/19

    T roubleshoot problems on the network Analyse the performance of network sections toidentify bottlenecks

    Network intrusion detectionLogging network traffic for forensic evidence

    Analysing the operation of network applicationsT racing the source of a DoS attack

    Detecting spyware

  • 8/4/2019 Network Traffic Analysis

    8/19

    To capture clear-text usernames andpasswords

    And those also which are encrypted

    To passively map a networkTo capture other confidential information

    8

  • 8/4/2019 Network Traffic Analysis

    9/19

    Server Logs:Web servers configur ed to r ecord information a bout allclient r equests.

    Eg most s ervers hav e a log fil e access wh ere requestsand r espons es ar e sav ed.

    Each lin e of th e access log contains information on asingl e request for a docum ent.

    Anex

    ample

    is:cs.fudan. edu.cn [1 5/ Aug / 1999:14:50:05 - 0600]

    "GET/ HTTP / 1.1" 200 1200

    This data can be us ed to charact erize web traffic.

    9

  • 8/4/2019 Network Traffic Analysis

    10/19

    Passiv e Measur ement:Choos e an appropriat e site and passiv ely captur e every IP pack et through it.

    Ideal sit e would be one through which manyconn ections pass.

    Eg a major gat eway sit e.

    Many monitoring platforms. On e such platform isTCPDump based Win Dump.Users can build complicat ed Bool ean expr essions todecide which data pack ets to catch.

    10

  • 8/4/2019 Network Traffic Analysis

    11/19

    Activ e Measur ement:

    Users or provid ers ar e dir ectly r elated to th e activiti esof measur ement in th e following ways:1. Injection of pro bes into n etwork by us ers and provid ers2. Ping and Trac erout e

    a) Path conn ectivityb) Round-trip d elay

    3. User-application p erformanc e as seen from hostsa) Lossb) Delayc) Throughput

    11

  • 8/4/2019 Network Traffic Analysis

    12/19

    Use TCPDump to dump and stor e all th e trafficdata into hard disks.To pars e th e dump ed data and print out th e proc essed r esult into t ext files.Use Matla b softwar e with pr epar ed scripts tomak e detailed analysis on th e proc essed r esult,

    then generat e the analyzing r esult and plot th e result graphs.

    12

  • 8/4/2019 Network Traffic Analysis

    13/19

    HTTP W eb : Includ es common HTTP w eb surfing and HTTPS applications.P2P File Sharing: Includ es th e applicationsusing BitTorr ent, DC++ and oth er P2Pprotocols.Streaming: Includ es Youtu be vid eo, Onlin e

    Audio, etc.DHT D istri bution: Includ es th e applicationwhich using DHT protocol to distri but e itsresourc e map or oth er information.

    13

  • 8/4/2019 Network Traffic Analysis

    14/19

    Traffic Volum e Analyzing Mod el: Afterisolating th e traffic data w e analyz e th e trafficvolum e.Flow Analysis: Th e information of sourc e anddestination IP addr ess, activ e ports and rat e.Pack et Analysis: To know how to optimiz e the

    network d evices' proc essing capa bility.

    14

  • 8/4/2019 Network Traffic Analysis

    15/19

    Local Systems:

    NETSTAT,TCPDUMP,ETHEREAL,NTOP

    Remote End Systems: MIBS, IF-MIB, SNMP, MRTG

    Routers:

    NETFLOW(CISCO), LFAP(ENTERASYS)

    15

  • 8/4/2019 Network Traffic Analysis

    16/19

    16

  • 8/4/2019 Network Traffic Analysis

    17/19

    17

  • 8/4/2019 Network Traffic Analysis

    18/19

    Measur ement and analysis of IP n etwork traffic - C enZhiw ei Gao Chuanshan Cong Suo Han Liang xiu. Dept.of Comput er Science, Fudan Univ ersity, Shanghai200433, ChinaNe twork Traffic Analysis and Intrusion Detectionusing Pack et Sniffer pu blised in 2010 S econdInternational Conf erence on Communication Softwar e and Ne tworks.Broad band Ne twork Traffic Analysis and Study inVarious Typ es of Applications pu blised inInternational Conf erence on Int elligent Control andInformation Proc essing.

    18

  • 8/4/2019 Network Traffic Analysis

    19/19

    19