Byung-Joon Lee and Youngseok Lee

Slides:



Advertisements
Similar presentations
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems TELE9752 Group 3.
Advertisements

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Marios Iliofotou (UC Riverside) Brian Gallagher (LLNL)Tina Eliassi-Rad (Rutgers University) Guowu Xi (UC Riverside)Michalis Faloutsos (UC Riverside) ACM.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
Improved TCAM-based Pre-Filtering for Network Intrusion Detection Systems Department of Computer Science and Information Engineering National Cheng Kung.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Automated malware classification based on network behavior
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
DPNM, POSTECH 1/23 NOMS 2010 Jae Yoon Chung 1, Byungchul Park 1, Young J. Won 1 John Strassner 2, and James W. Hong 1, 2 {dejavu94, fates, yjwon, johns,
ECE 526 – Network Processing Systems Design Network Processor Architecture and Scalability Chapter 13,14: D. E. Comer.
What is FORENSICS? Why do we need Network Forensics?
An Effective Fuzzy Clustering Algorithm for Web Document Classification: A Case Study in Cultural Content Mining Nils Murrugarra.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
ECE 526 – Network Processing Systems Design Packet Processing I: algorithms and data structures Chapter 5: D. E. Comer.
Chapter 12 Transmission Control Protocol (TCP)
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering.
April 4th, 2002George Wai Wong1 Deriving IP Traffic Demands for an ISP Backbone Network Prepared for EECE565 – Data Communications.
StrideBV: Single chip 400G+ packet classification Author: Thilan Ganegedara, Viktor K. Prasanna Publisher: HPSR 2012 Presenter: Chun-Sheng Hsueh Date:
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
1 Architecture and scalability of a high-speed traffic measurement platform with a highly flexible packet classification Author: Detlef Sas *, Simon Hauger,
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
High Throughput and Programmable Online Traffic Classifier on FPGA Author: Da Tong, Lu Sun, Kiran Kumar Matam, Viktor Prasanna Publisher: FPGA 2013 Presenter:
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Ethernet Packet Filtering – Part 2 Øyvind Holmeide 10/28/2014 by.
Author Name Security and Networks Research Group Department of Computer Science Rhodes University SNRG SLIDE TEMPLATE.
A Strategy to Compute the InfiniBand Arbitration Tables
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Snort – IDS / IPS.
Lec7: SNMP Management Information
Lab A: Planning an Installation
2018/5/8 An approach for detecting encrypted insider attacks on OpenFlow SDN Networks Author: Charles V. Neu , Avelino F. Zorzox , Alex M. S. Orozcoy and.
Automatic Network Protocol Analysis
CONNECTING TO THE INTERNET
Managing Secure Network Systems
The Devil and Packet Trace Anonymization
Monitoring MIPv6 Traffic with IPFIX
Computer Data Security & Privacy
VIRTUAL SERVERS Presented By: Ravi Joshi IV Year (IT)
Introduction to Networking
Firewalls.
Chapter 6: Network Layer
Transport Layer Unit 5.
ECE 4450:427/527 - Computer Networks Spring 2017
Automatic Discovery of Network Applications: A Hybrid Approach
Network Core and QoS.
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Software Design Lecture : 9.
Network Analyzer :- Introduction to Wireshark
Firewall.
A Small and Fast IP Forwarding Table Using Hashing
IP Control Gateway (IPCG)
ENCODING TOOL DEVELOPED BY HUNGARY Márta Záhonyi
2019/5/8 BitCoding Network Traffic Classification Through Encoded Bit Level Signatures Author: Neminath Hubballi, Mayank Swarnkar Publisher/Conference:
Firewall Installation
Botnet Detection by Monitoring Group Activities in DNS Traffic
Transport Layer Identification of P2P Traffic
2019/7/26 OpenFlow-Enabled User Traffic Profiling in Campus Software Defined Networks Presenter: Wei-Li,Wang Date: 2016/1/4 Author: Taimur Bakhshi and.
Linear Time Sorting.
2019/10/9 A Weighted ECMP Load Balancing Scheme for Data Centers Using P4 Switches Presenter:Hung-Yen Wang Authors:Jin-Li Ye, Yu-Huang Chu, Chien Chen.
Network Core and QoS.
Presentation transcript:

An Automatic Signature-generating Method for Web-based P2P Applications Byung-Joon Lee and Youngseok Lee Dept. of Computer Science and Engineering, Chungnam National University 220 Gungdong, Yusonggu, Daejon, Korea GlobeCom’06(Underreview)

Outline Introduction Related Work Defining Web-Based P2P Application Architecture of GENESIS Experiment Conclusion 2019/5/3

Introduction In enterprise or campus networks, well-known TCP/UDP port numbers used by P2P applications are blocked to prevent P2P traffic from consuming the whole bandwidth of the main link for the network--not proactively quarantine. P2P applications are evolving either by employing a firewall-avoiding method, called port hopping, or by changing themselves into brand new types of P2P applications. 2019/5/3

Introduction (cont.) The process of finding signatures for new P2P applications is a significantly difficult and time-consuming job. An automatic signature generating algorithm is essential for effective traffic classification with signatures. 2019/5/3

suspected 2019/5/3

Introduction (cont.) Propose an automatic signature generating method to find popular web-based P2P applications, which is called GENESIS (System for GENErating SIgnatureS). The method captures P2P-suspected traffic flows from the raw traffic dump, extracts signatures automatically from those categorized flows. 2019/5/3

Related Work Most systems designed to find out signatures automatically are for Internet worms. Follow some common procedures: collect flows which are suspected to be generated by Internet worms. split payloads into multiple blocks of variable size. evaluate the ‘prevalence’ of those blocks. The reason of the procedure (2) is that the signature may appear at variable locations of the payload if a worm shows a polymorphic behavior [3], which means the worm can encode and re-encode itself into successive and different byte strings. 2019/5/3

Related Work (cont.) mark blocks with the high prevalence as candidate signatures. apply the address dispersion criteria. Most of the procedures can be applied in a similar way to the case of P2P applications. But P2P applications show different behaviors compared with those of Internet worms. 2019/5/3

Related Work (cont.) P2P applications follow different communication patterns, and have no polymorphic behavior. procedure (1) should be greatly modified. procedure (2) should be omitted. 2019/5/3

Defining Web-Based P2P Application 2019/5/3

Defining Web-Based P2P Application (cont.) Four rules are defined to classify flows into four different categories (WC, WS, DC, DS). 2019/5/3

Defining Web-Based P2P Application (cont.) 2019/5/3

Architecture of GENESIS GENESIS is a part of the Wise<TrafView> system that provides the content-aware traffic monitoring function. The Wise<TrafView> Capturing Agent collects packets from network interface cards, assembling packets to flow records, and saving them into files. GENESIS inspects the flow files, distinguishes and saves P2P-suspected flows, and extracts P2P signatures. 2019/5/3

Architecture of GENESIS (cont.) GENESIS consists of two different parts: FlowFinder:finds P2P-suspected flows and saves them in different files according to the classification rules. SignatureFinder:carries out signature extraction from each saved file. 2019/5/3

Architecture of GENESIS (cont.) A. FlowFinder and flow classification process Found flows using the rules listed in Table I are saved under each directory named by the IP address of the P2P portal. The saved files have extensions of *.genesis. The names of those files are determined by the categories of the saved flows (WC, WS, DC, DS). 2019/5/3

Architecture of GENESIS (cont.) B. SignatureFinder and signature extraction process Operates in two phases on each *.genesis file Records statistics about each byte of the payloads for all packets in the flow files. generates signatures using the statistics. 2019/5/3

files campus <genesis> FlowFinder (rules) …… …… …… Wise <trafview> files campus <genesis> Directory1(IP1) Directory2(IP2) …… DirectoryN(IPN) FlowFinder (rules) ds.genesis wc.genesis ws.genesis …… flow1 flow2 …… flow n packet 1 …… packet 2 packet n SignatureFinder payload …… 63

Architecture of GENESIS (cont.) Assumed two parts inspection of first B (default = 64) bytes of the payload would be enough. inspection of first P (default = 10) packets of a flow would be enough. 2019/5/3

Architecture of GENESIS (cont.) The first part Verify:examined the frequency of 1-byte integer value of every packet payload without TCP/IP header fields. Built a 2-dimensional array where an (i,j) element represents the frequency of the 1-byte integer value, j (0≤j≤255), at the i-th byte position of payloads. 2019/5/3

Architecture of GENESIS (cont.) Using the frequency table, the maximum, minimum, and average values for the frequencies of 1-byte integer values were calculated for each position of payloads. 2019/5/3

Architecture of GENESIS (cont.) The probability of signature existence is examined with the following function--PSE(i). PSE(i) = ( max(i)-avg(i) ) / max(i) – avg(i) / max(i) (1) PSE(i) value is within the range of [-1,1]. max(i) Min(i) Avg(i) the frequencies of the 1-byte integer values at the i-th byte position of payloads. 2019/5/3

Architecture of GENESIS (cont.) 2019/5/3

Architecture of GENESIS (cont.) The second part Averaged the number of packets for data flows. 2019/5/3

Architecture of GENESIS (cont.) Algorithm 1:Phase 1 of SignatureFinder 在i-th byte中有j值的封包總數量 在i-th byte中有j值的flow大小 2019/5/3

packet 1 2 …… ………… ………… …… . 1 …… . 1 …………………… …………………… packet_counter 3 4 62 2 …… 1 2 ………… ………… 63 1 2 63 0x00 …… . 1 0x00 …… . 1 0x01 0x01 0x02 0x02 …………………… …………………… 0xFF 0xFF packet_counter tmp_matrix

packet 2 …… ………… ………… …… . 1 2 …… . 1 …………………… …………………… packet_counter 1 2 3 4 62 …… 1 2 ………… ………… 63 1 2 63 0x00 …… . 1 2 0x00 …… . 1 0x01 0x01 0x02 0x02 …………………… …………………… 0xFF 0xFF packet_counter tmp_matrix

packet 10 …… ………… ………… …… . 2 3 1 …… . 1 …………………… …………………… 1 2 3 4 62 63 …… 1 2 ………… ………… 63 1 2 63 0x00 …… . 2 3 1 0x00 …… . 1 0x01 0x01 0x02 0x02 …………………… …………………… 0xFF 0xFF packet_counter tmp_matrix

…… . ………… 1 …………………… ………… …………… tmp_matrix flow_byte_counters 1 2 63 1 2 ………… 63 0x00 …… . 1 0x01 0x02 …………………… 1 2 ………… 63 0x00 …… . 0x01 1000 1000 1000 0x02 1000 1000 1000 …………… 1000 1000 0xFF tmp_matrix 0xFF flow_byte_counters

Architecture of GENESIS (cont.) Gray area: the number of packets whose i-th byte value is j is greater than 10, and the total traffic volume of the flows which have such packets is more than 90% of the total traffic volume in bytes 2019/5/3

Architecture of GENESIS (cont.) SignatureFinder collects every j where sigmatrix[i][j] is nonzero (0i63, and j is the integer value of the i-th byte of the payload). The sequence of the collected j’s is recorded as a signature. A new signature is generated, it is put in the signature list. 2019/5/3

Experiment Experiments with the GENESIS system at the main link of the CNU campus network. This link is 1 Gigabit Ethernet, and the peak bandwidth usage is around 200Mbps. With the captured 12-hour traffic traces (11/Nov/2005 18:00 ~ 12/Nov/2005 06:00). 2019/5/3

Experiment (cont.) 2019/5/3

Experiment (cont.) 2019/5/3

Experiment (cont.) 2019/5/3

Experiment (cont.) 2019/5/3

Conclusion P2P applications hide their ports, signature-based traffic monitoring has been useful and practical for assessing P2P applications. Maintaining signatures up-to-date for a lot of P2P applications are difficult and time-consuming. Propose a method to find signatures for P2P application traffic automatically. This method could be extended to the brand new P2P applications in the future work. 2019/5/3