towards flow-based abnormal network traffic detection

12
POSTECH DP&NM Lab Towards Flow-based Abnormal Network Traffic Detection Hun-Jeong Kang, Seung-Hwa Chung, Seong-Cheol Hong, Myung-Sup Kim and James W. Hong DP&NM Lab. Dept. of Computer Science and Engineering Pohang University of Science and Technology Email: {bluewind, mannam, pluto80, mount, jwkhong}@postech.ac.kr

Upload: knox

Post on 06-Jan-2016

22 views

Category:

Documents


0 download

DESCRIPTION

Towards Flow-based Abnormal Network Traffic Detection. Hun-Jeong Kang, Seung-Hwa Chung, Seong-Cheol Hong, Myung-Sup Kim and James W. Hong DP&NM Lab. Dept. of Computer Science and Engineering Pohang University of Science and Technology - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Towards Flow-based  Abnormal Network Traffic Detection

POSTECH DP&NM Lab

Towards Flow-based

Abnormal Network Traffic Detection

Towards Flow-based

Abnormal Network Traffic Detection

Hun-Jeong Kang, Seung-Hwa Chung, Seong-Cheol Hong, Myung-Sup Kim and James W. Hong

DP&NM Lab.

Dept. of Computer Science and Engineering

Pohang University of Science and Technology

Email: {bluewind, mannam, pluto80, mount, jwkhong}@postech.ac.kr

Hun-Jeong Kang, Seung-Hwa Chung, Seong-Cheol Hong, Myung-Sup Kim and James W. Hong

DP&NM Lab.

Dept. of Computer Science and Engineering

Pohang University of Science and Technology

Email: {bluewind, mannam, pluto80, mount, jwkhong}@postech.ac.kr

Page 2: Towards Flow-based  Abnormal Network Traffic Detection

2POSTECHDP&NM Lab.

Motivation : network security attack threats increase of the number of Internet user & Network services

highly dependent on Internet high damage cost by network security attack

Attack Trend : increase of indirect attacks indirectly interfere with proper working of system danger factors

ease of attack, fast impact on target system difficulty tracing back to attacker effect on entire network performance

Flow-based Abnormal Network Traffic Detection characterize network attack traffic patterns propose detecting algorithms and a system prototype

Introduction

Page 3: Towards Flow-based  Abnormal Network Traffic Detection

3POSTECHDP&NM Lab.

Related Work

Network Security Attacks Scanning : preparation for attacks

send scanning packets to the victim & receive responses gather information on the host and services

DoS : cause improper services logic attack

send packets exploiting software flaws malfunction in the system examples: Ping of Death, Land

flooding transmit a lot of spurious packets to victim

waste of CPU, memory, network resource examples: TCP SYN flood, reflecting DoS(Smurf, Fraggle, Ping-Pong)

general ( ICMP, UDP, TCP) flooding

previous detecting approaches monitor :

patterns that appears in a packet header or payload volume of traffic the victim receives number of new IP addresses that appear

Page 4: Towards Flow-based  Abnormal Network Traffic Detection

4POSTECHDP&NM Lab.

Detecting Process

Overall Process

traffic pattern data generation

flow header detection

traffic pattern detection

Detecting Process (1/5)

2 detecting parts flow header detection

validate fields of flow header detect logic attacks or attacks with specific field value

traffic pattern detection generate traffic pattern data compare traffic parameter with attack patterns detect scanning and flooding attacks

flow

alarm

Page 5: Towards Flow-based  Abnormal Network Traffic Detection

5POSTECHDP&NM Lab.

transportprotocol

ICMP

TCP

UDP

echo request destination IP= broadcast

smurf

source IP = destination IP source port=destination port

land

ping-pong

fraggle

packet count = L, flow size= L

destination port= reflecting port

source port= reflecting port

destination IP=broadcast

ICMP flooding

source IP destination IP source port destination port transport protocol flow size packet count

Detection of Flow HeaderFlow Header

flow size/packet count is too high ping-of-death

packet count = L, flow size= L TCP flooding

packet count = L, flow size= L UDP flooding

L : Large S: Small

Detecting Process (2/5)

Page 6: Towards Flow-based  Abnormal Network Traffic Detection

6POSTECHDP&NM Lab.

Characterization of Traffic Pattern

scanning flooding

host network TCP SYN smurf fraggle ping-pong

general (ICMP,UDP,TCP

)flooding

flow count L L L L L S L or S

flow size/flow S S S L or S L or S L L or S

packet count/flow

S S S L or S L or S L L or S

packet size S S S L or S L or S L or S L or S

total bandwidth L or S L or S L or S L L L L

total packet count

L or S L or S L or S L L L L

property 1 destination 1 portICMP

broadcastUDP

broadcastreflecting

port

L : Large S : Small

Detecting Process (3/5)

Page 7: Towards Flow-based  Abnormal Network Traffic Detection

7POSTECHDP&NM Lab.

Generation of Traffic Pattern Data

hash(source IP)

n(flow)

n(S_IP)

sum(flow size)avg(flow size)dev(flow size)

sum(n_packet)avg(n_packet)dev(n_packet)

destinationIP

sourceIP

destinationport

sourceport

transportprotocol

flow size

packetcount

SYNpacket

ACKpacket …

n(D_port) n(S_port) p(proto) n(SYN) n(ACK)

flow messages

…hash

(destination IP)

traffic pattern data (destination based)

trafficpattern data

(source based)

Detecting Process (4/5)

Page 8: Towards Flow-based  Abnormal Network Traffic Detection

8POSTECHDP&NM Lab.

Detection of Traffic Pattern

destination basedn(D_port) = L

n(S_IP) = Shost

scanning

n(D_port) = Sn(ACK)/n(SYN) = S

TCP SYN flood

sum(n_packet) = Lsum(flow size)= L

n(flow) = Lavg(flow size) = S avg(n_packet) = S

source based

n(D_IP) = L n(D_port) = S

networkscanning

n(flow) = Lavg(flow size) = S avg(n_packet) = S

Detecting Function match traffic pattern data with attack type

sum(n_packet) = Lsum(flow size)= L (ICMP,UDP,TCP) flooding

(ICMP,UDP,TCP) flooding

Detecting Process (5/5)

L : Large S : Small

Page 9: Towards Flow-based  Abnormal Network Traffic Detection

9POSTECHDP&NM Lab.

Analysis Result

(a) total bandwidth (b) number of flows (c) number of source address

(d) total packet count (e) detecting function for Scanning (f) detecting function for TCP SYN

Scanning TCP SYN Flood

sum(flow s ize) n(flow) n(S_IP)

sum(n_packet)

t1 t2 t3

t1 t2 t3 t1 t2 t3t1 t2 t3

t1 t2 t3 t1 t2 t3

Page 10: Towards Flow-based  Abnormal Network Traffic Detection

10POSTECHDP&NM Lab.

ReportGenerator

(email, SMS, log)

System Design

Packet Capturer

FlowGenerator

FlowStore

PresenterWeb Server

NetworkDevice

WebUser Interface

Flow Generationof NG-MON

FlowHeaderDetector

TrafficPattern

DataGenerator

TrafficPatternDetector

TrafficDetection

flow messages

detected traffic

information

Page 11: Towards Flow-based  Abnormal Network Traffic Detection

11POSTECHDP&NM Lab.

Conclusion and Future Work

Abnormal Network Traffic Detection Method efficiency : use and process information on flows simplicity : detecting function based on traffic pattern data that covers

mutant attacks accuracy : use of various traffic characteristics as detecting parameters extensionality : generation of general traffic pattern data easiness

response new type of attacks by compounding traffic

Future Work find algorithm that covers other types of attacks that do not cause

changes of traffic study schemes to cooperate with traffic monitoring systems existing

IDSs extend to Intrusion Protection System

Page 12: Towards Flow-based  Abnormal Network Traffic Detection

12POSTECHDP&NM Lab.