1 of 75Mapping the Internet and Intranets. 75 slides Mapping the Internet and Intranets Bill Cheswick

Slides:



Advertisements
Similar presentations
Jack Jedwab Association for Canadian Studies September 27 th, 2008 Canadian Post Olympic Survey.
Advertisements

EcoTherm Plus WGB-K 20 E 4,5 – 20 kW.
Números.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
PDAs Accept Context-Free Languages
ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala
1
EuroCondens SGB E.
Worksheets.
Slide 1Fig 26-CO, p.795. Slide 2Fig 26-1, p.796 Slide 3Fig 26-2, p.797.
Slide 1Fig 25-CO, p.762. Slide 2Fig 25-1, p.765 Slide 3Fig 25-2, p.765.
& dding ubtracting ractions.
Copyright © 2013 Elsevier Inc. All rights reserved.
Addition and Subtraction Equations
David Burdett May 11, 2004 Package Binding for WS CDL.
Create an Application Title 1Y - Youth Chapter 5.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
CHAPTER 18 The Ankle and Lower Leg
The 5S numbers game..
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
The basics for simulations
Factoring Quadratics — ax² + bx + c Topic
EE, NCKU Tien-Hao Chang (Darby Chang)
A sample problem. The cash in bank account for J. B. Lindsay Co. at May 31 of the current year indicated a balance of $14, after both the cash receipts.
PP Test Review Sections 6-1 to 6-6
1 IMDS Tutorial Integrated Microarray Database System.
2013 Fox Park Adopt-A-Hydrant Fund Raising & Beautification Campaign Now is your chance to take part in an effort to beautify our neighborhood by painting.
Regression with Panel Data
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Progressive Aerobic Cardiovascular Endurance Run
Biology 2 Plant Kingdom Identification Test Review.
Chapter 1: Expressions, Equations, & Inequalities
CSE 6007 Mobile Ad Hoc Wireless Networks
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
Subtraction: Adding UP
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Static Equilibrium; Elasticity and Fracture
Converting a Fraction to %
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Resistência dos Materiais, 5ª ed.
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
Select a time to count down from the clock above
1.step PMIT start + initial project data input Concept Concept.
WARNING This CD is protected by Copyright Laws. FOR HOME USE ONLY. Unauthorised copying, adaptation, rental, lending, distribution, extraction, charging.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Presented to: By: Date: Federal Aviation Administration FAA Safety Team FAASafety.gov AMT Awards Program Sun ‘n Fun Bryan Neville, FAASTeam April 21, 2009.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
120 slides Mapping the Internet and Intranets Steve Branigan, Hal Burch, Bill Cheswick
Presentation transcript:

1 of 75Mapping the Internet and Intranets

75 slides Mapping the Internet and Intranets Bill Cheswick

3 of 75Mapping the Internet and Intranets Motivations Intranets are out of control – Always have been Highlands day after scenario Panix DOS attacks – a way to trace anonymous packets back! Internet tomography Curiosity about size and growth of the Internet Same tools are useful for understanding any large network, including intranets

4 of 75Mapping the Internet and Intranets Related Work See Martin Dodges cyber geography page MIDS - John Quarterman CAIDA - kc claffy Mercator Measuring ISP topologies with rocketfuel – Spring, Mahajan, WetherallSpringMahajanWetherall Enter internet map in your search engine

5 of 75Mapping the Internet and Intranets The Goals Long term reliable collection of Internet and Lucent connectivity information – without annoying too many people Attempt some simple visualizations of the data – movie of Internet growth! Develop tools to probe intranets Probe the distant corners of the Internet

6 of 75Mapping the Internet and Intranets Methods - data collection Single reliable host connected at the company perimeter Daily full scan of Lucent Daily partial scan of Internet, monthly full scan One line of text per network scanned – Unix tools

7 of 75Mapping the Internet and Intranets Methods - network scanning Obtain master network list – network lists from Merit, RIPE, APNIC, etc. – BGP data or routing data from customers – hand-assembled list of Yugoslavia/Bosnia Run a traceroute-style scan towards each network Stop on error, completion, no data – Keep the natives happy

8 of 75Mapping the Internet and Intranets TTL probes Used by traceroute and other tools Probes toward each target network with increasing TTL Probes are ICMP, UDP, TCP to port 80, 25, 139, etc. Some people block UDP, others ICMP

9 of 75Mapping the Internet and Intranets TTL probes Application level TCP/UDP IP Hardware Client IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router Application level TCP/UDP IP Hardware Server Hop 1Hop 2 Hop 3 Hop 4

10 of 75Mapping the Internet and Intranets Send a packet with a TTL of 1… Application level TCP/UDP IP Hardware Client IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router Application level TCP/UDP IP Hardware Server Hop 1Hop 2 Hop 3 Hop 4

11 of 75Mapping the Internet and Intranets …and we get the death notice from the first hop Application level TCP/UDP IP Hardware Client IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router Application level TCP/UDP IP Hardware Server Hop 1Hop 2 Hop 3 Hop 4

12 of 75Mapping the Internet and Intranets Send a packet with a TTL of 2… Application level TCP/UDP IP Hardware Client IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router Application level TCP/UDP IP Hardware Server Hop 1Hop 2 Hop 3 Hop 4

13 of 75Mapping the Internet and Intranets … and so on … Application level TCP/UDP IP Hardware Client IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router IP Hardware Router Application level TCP/UDP IP Hardware Server Hop 1Hop 2 Hop 3 Hop 4

14 of 75Mapping the Internet and Intranets Advantages We dont need access (I.e. SNMP) to the routers Its very fast Standard Internet tool: it doesnt break things Insignificant load on the routers Not likely to show up on IDS reports We can probe with many packet types

15 of 75Mapping the Internet and Intranets Limitations Outgoing paths only Level 3 (IP) only – ATM networks appear as a single node – This distorts graphical analysis Not all routers respond Many routers limited to one response per second

16 of 75Mapping the Internet and Intranets Limitations View is from scanning host only Takes a while to collect alternating paths Gentle mapping means missed endpoints Imputes non-existent links

17 of 75Mapping the Internet and Intranets The data can go either way A EF D BC

18 of 75Mapping the Internet and Intranets The data can go either way A EF D BC

19 of 75Mapping the Internet and Intranets But our test packets only go part of the way A EF D BC

20 of 75Mapping the Internet and Intranets We record the hop… A EF D BC

21 of 75Mapping the Internet and Intranets The next probe happens to go the other way A EF D BC

22 of 75Mapping the Internet and Intranets …and we record the other hop… A EF D BC

23 of 75Mapping the Internet and Intranets Weve imputed a link that doesnt exist A EF D BC

24 of 75Mapping the Internet and Intranets Data collection complaints Australian parliament was the first to complain List of whiners (25 nets) Military noticed immediately – Steve Northcutt – arrangements/warnings to DISA and CERT These complaints are mostly a thing of the past – Internet background radiation predominates

25 of 75Mapping the Internet and Intranets Visualization goals make a map – show interesting features – debug our database and collection methods – hard to fold up geography doesnt matter use colors to show further meaning

26 of 75Mapping the Internet and Intranets

27 of 75Mapping the Internet and Intranets

28 of 75Mapping the Internet and Intranets Infovis state-of-the-art in nodes was a huge graph We had 100,000 nodes Use spring-force simulation with lots of empirical tweaks Each layout needed 20 hours of Pentium time

29 of 75Mapping the Internet and Intranets

75 slides Visualization of the layout algorithm Laying out the Internet graph

31 of 75Mapping the Internet and Intranets

75 slides Visualization of the layout algorithm Laying out an intranet

33 of 75Mapping the Internet and Intranets

34 of 75Mapping the Internet and Intranets A simplified map Minimum distance spanning tree uses 80% of the data Much easier visualization Most of the links still valid Redundancy is in the middle

35 of 75Mapping the Internet and Intranets Colored by AS number

36 of 75Mapping the Internet and Intranets Map Coloring distance from test host IP address – shows communities Geographical (by TLD) ISPs future – timing, firewalls, LSRR blocks

37 of 75Mapping the Internet and Intranets Colored by IP address!

38 of 75Mapping the Internet and Intranets Colored by geography

39 of 75Mapping the Internet and Intranets Colored by ISP

40 of 75Mapping the Internet and Intranets Colored by distance from scanning host

41 of 75Mapping the Internet and Intranets US military reached by ICMP ping

42 of 75Mapping the Internet and Intranets US military networks reached by UDP

43 of 75Mapping the Internet and Intranets

44 of 75Mapping the Internet and Intranets

45 of 75Mapping the Internet and Intranets History of the Project Started in August 1998 at Bell Labs April-June 1999: Yugoslavia mapping July 2000: first customer intranet scanned Sept. 2000: spun off Lumeta from Lucent/Bell Labs

75 slides Yugoslavia An unclassified peek at a new battlefield

47 of 75Mapping the Internet and Intranets

75 slides Un film par Steve Hollywood Branigan...

49 of 75Mapping the Internet and Intranets

75 slides fin

75 slides Intranets: the rest of the Internet

52 of 75Mapping the Internet and Intranets The Pretty Good Wall of China

53 of 75Mapping the Internet and Intranets

54 of 75Mapping the Internet and Intranets

55 of 75Mapping the Internet and Intranets

56 of 75Mapping the Internet and Intranets

57 of 75Mapping the Internet and Intranets

58 of 75Mapping the Internet and Intranets This was Supposed To be a VPN

59 of 75Mapping the Internet and Intranets

60 of 75Mapping the Internet and Intranets

75 slides Anything large enough to be called an intranet is out of control

62 of 75Mapping the Internet and Intranets Case studies: corp. networks Some intranet statistics

75 slides Leak Detection Lumetas special sauce

64 of 75Mapping the Internet and Intranets The second technology: host leak detection Developed to find hosts that have access to both intranet and Internet Or across any privilege boundary Leaking hosts do not route between the networks May be a dual-homed host Not always a bad thing Technology didnt exist to find these

65 of 75Mapping the Internet and Intranets Possible host leaks Miss-configured telecommuters connecting remotely VPNs that are broken DMZ hosts with too much access Business partner networks Internet connections by rogue managers Modem links to ISPs

66 of 75Mapping the Internet and Intranets Leak results Found home web businesses At least two clients have tapped leaks – One made front page news From the military: the republic is a little safer

67 of 75Mapping the Internet and Intranets Leak Detection Prerequisites List of potential leakers: obtained by census Access to intranet Simultaneous availability of a mitt

68 of 75Mapping the Internet and Intranets Leak Detection Layout Internet intranet Mapping host A Test host B mitt D C Mapping host with address A is connected to the intranet Mitt with address D has Internet access Mapping host and mitt are currently the same host, with two interfaces

69 of 75Mapping the Internet and Intranets Leak Detection Internet intranet Mapping host A Test host B mitt D C Test host has known address B on the intranet It was found via census We are testing for unauthorized access to the Internet, possibly through a different address, C

70 of 75Mapping the Internet and Intranets Leak Detection Internet intranet Mapping host A Test host B mitt D C A sends packet to B, with spoofed return address of D If B can, it will reply to D with a response, possibly through a different interface

71 of 75Mapping the Internet and Intranets Leak Detection Internet intranet Mapping host A Test host B mitt D C Packet must be crafted so the response wont be permitted through the firewall A variety of packet types and responses are used Either inside or outside address may be discovered Packet is labeled so we know where it came from

72 of 75Mapping the Internet and Intranets Inbound Leak Detection Internet intranet Mapping host A Test host B mitt D C This direction is usually more important It all depends on the site policy… …so many leaks might be just fine.

73 of 75Mapping the Internet and Intranets Inbound Leak Detection Internet intranet Mapping host A Test host B mitt D C

74 of 75Mapping the Internet and Intranets Honeyd – network emulation Anti-hacking tools by Niels Provos at citi.umich.edu Can respond as one or more hosts I am configuring it to look like an entire clients network Useful for testing and debugging Product?

75 of 75Mapping the Internet and Intranets Some Lumeta lessons Reporting is the really hard part – Converting data to information Tell me how we compare to other clients Offering a service was good practice, for a while We have >70 Fortune-200 companies and government agencies as clients

75 slides Open questions and future work

77 of 75Mapping the Internet and Intranets How do you analyze a large graph over time? Five years of Internet data, mostly unanalyzed Alternate paths to a target country Sample insight: Poland was off the Internet yesterday Placement of monitoring tools? Compute a display differences between two complex graphs

78 of 75Mapping the Internet and Intranets Visualizations These graphs are too big for a piece of paper Various approaches available, but none really satisfactory Build visualization graph as the data comes in, and as the network evolves

79 of 75Mapping the Internet and Intranets

75 slides Mapping the Internet and Intranets Bill Cheswick

81 of 75Mapping the Internet and Intranets