Software Defined Networking: Traffic Monitoring and Analysis

Slides:



Advertisements
Similar presentations
Computer Networks21-1 Chapter 21. Network Layer: Address Mapping, Error Reporting, and Multicasting 21.1 Address Mapping 21.2 ICMP 21.3 IGMP 21.4 ICMPv6.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
CCNA – Network Fundamentals
Lecture 7 Transport Layer
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
QoS Solutions Confidential 2010 NetQuality Analyzer and QPerf.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Internet Control Message Protocol (ICMP)
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Internet Bandwidth Measurement Techniques Muhammad Ali Dec 17 th 2005.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Network Measurement Bandwidth Analysis. Why measure bandwidth? Network congestion has increased tremendously. Network congestion has increased tremendously.
IP-UDP-RTP Computer Networking (In Chap 3, 4, 7) 건국대학교 인터넷미디어공학부 임 창 훈.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Network Monitoring School of Electronics and Information Kyung Hee University. Choong Seon HONG Selected from ICAT 2003 Material of James W. K. Hong.
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Internet Control Message Protocol (ICMP)
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 2. Network Monitoring Metrics.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
IP Forwarding.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
TCP/IP (Transmission Control Protocol / Internet Protocol)
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 1.Introduction.
Lecture Network layer -- May Congestion control Algorithms.
Network Performance.
1 IEX8175 RF Electronics Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Connect communicate collaborate Performance Metrics & Basic Tools Robert Stoy, DFN EGI TF, Madrid September 2013.
Introduction.
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Network Core and QoS.
Networking Theory (part 2)
Requirements Definition
Networking Theory (part 2)
Network Core and QoS.
Networking Theory (part 2)
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Software Defined Networking: Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea jwkhong@postech.ac.kr

Outline Introduction Motivation Research Issues and Goals Active Monitoring Techniques Passive Monitoring Techniques

Introduction

Source : www.internetworldstats.com Introduction (1/9) Growth of Internet Users The Number of Internet users is growing Source : www.internetworldstats.com

Introduction (2/9) Growth of Internet Users Internet traffic has increased dramatically (Exabyte = 1 million terabytes = 260 bytes) Source: Cisco

Introduction (3/9) Stand-alone applications can now utilize networking Cooperative editing: Abiword, ACE, MS SharePoint Workspace Browser-based software: Google Docs, Google Wave Game console: Microsoft XBOX, Sony Playstation, Nintendo Wii Network applications Online games, shopping, banking, stock trading, network storage, P2P applications VOD, EOD (Education on Demand), VOIP, IPTV Online game VoIP VOD

Introduction (4/9) Client-Server Peer-to-Peer (P2P) Traditional structure Peer-to-Peer (P2P) New concept between file sharing and transferring Generates high volume of traffic server client discovery, content, transfer query peer peer peer Structures of applications are changing!

Introduction (5/9) Types of Traffic Static sessions vs. Dynamic sessions Bursty data transfer vs. Streaming data transfer Negotiate & allocate connect disconnect use dynamic protocol, port data control use static protocol, port packet network packet network Types of traffic are various and increasing!

Introduction (6/9) Internet Protocol Distribution Transport Protocol Distribution The amount of UDP flows is increasing by P2P applications The amount of ICMP flows is increasing by Internet worms protocol Flows Packets Bytes TCP 32,515 14.4% 1,797,176 86.3% 1,339,396,630 96.8% UDP 54,561 24.2% 141,769 6.8% 27,812,586 2.0% ICMP 138,253 61.3% 141,247 6.7% 15,720,410 1.1% Others 125 0.0% 474 32,160 2003.09.16 – 19:36 POSTECH Internet Junction Traffic

Introduction (7/9) Internet Protocol Distribution Transport Protocol Distribution The amount of UDP flows is increasing by P2P, gaming & multimedia streaming applications protocol Flows Packets Bytes TCP 42,533 5.8% 1,677,721 38.7% 1,288,490,188 39.9% UDP 678,800 93.4% 2,621,440 60.5% 1,932,735,283 59.9% ICMP 4,452 0.6% 31,256 0.7% 2,516,582 0.1% Others 445 0.0% 3,099 570,726 2011.03.28 – 18:15 POSTECH Internet Junction Traffic

? ? ? Introduction (8/9) Port Number Usage in TCP/UDP Port number distribution in bytes Proportion of Internet applications ? ? TCP Server Listening Port Number Distribution UDP Port Number Distribution ? 2003.09.16 – 19:36 POSTECH Internet Junction Traffic

? ? ? Introduction (9/9) Port Number Usage in TCP/UDP Port number distribution in bytes Proportion of Internet applications ? ? TCP Server Listening Port Number Distribution UDP Port Number Distribution ? 2011.03.28 – 18:15 POSTECH Internet Junction Traffic

Motivation (1/2) Needs of Service Providers Needs of Customers Understand the behavior of their networks Provide fast, high-quality, reliable service to satisfy customers and thus reduce churn rate Plan for network deployment and expansion SLA monitoring, Network security Increase Revenue! Usage-based billing for network users (like telephone calls) Marketing using CRM data Needs of Customers Want to get their money’s worth Fast, reliable, high-quality, secure, virus-free Internet access To Satisfy Service Providers’ Needs to Satisfy Their Customers!

Motivation (2/2) Application Areas Network Problem Determination and Analysis Traffic Report Generation Intrusion & Hacking Attack (e.g., DoS, DDoS) Detection Service Level Monitoring (SLM) Network Planning Usage-based Billing Customer Relationship Management (CRM) Marketing

Issues in Traffic Monitoring Choices Single-point vs. Multi-point monitoring Number of probing or test packet generation point In-service vs. Out-of-service monitoring Whether monitoring should be executed during service or not Continuous vs. On-demand monitoring Monitoring executes continuously or by on-demand. Packet vs. Flow-based monitoring Collect packets or flows from network devices. One-way vs. Bi-directional monitoring Monitor forward path only / forward and return path Trade-offs Network bandwidth Processing overhead Accuracy Cost

Problems Capturing Packets Flow Generation & Storage Analysis High-speed networks (Mbps  Gbps  Tbps) High-volume traffic Streaming media (Windows Media, Real Media, Quicktime) P2P traffic Network Security Attacks Flow Generation & Storage What packet information to save to perform various analysis? How to minimize storage requirements? Analysis How to analyze and generate data needed quickly? What kinds of info needs to be generated?  Depends on applications

Research & Development Goals Develop Methods to Capture all packets Generate flows Store flows efficiently Analyze data efficiently Generate various reports or information that are suitable for various application areas Develop a Flexible, Scalable Traffic Monitoring and Analysis System for High-speed High-volume Rich media IP networks

Traffic Monitoring

Network Monitoring Metrics (1/5) Connectivity Availability Functionality One way loss Loss RT loss Network Monitoring Metrics One way delay Delay RT delay Delay variance Capacity Utilization Bandwidth Throughput

Network Monitoring Metrics (2/5) Availability The percentage of a specified time interval during which the system was available for normal use What is supposed to be available? Service, Host, Network Availabilities are usually reported as a single monthly figure 99.99% availability means that the service is unavailable for 4 minutes during a month One can test availability by sending suitable packets and observing the answering packets (latency, packet loss) Metrics Connectivity: the physical connectivity of network elements Functionality: whether the associated system works well or not

Network Monitoring Metrics (3/5) Packet Loss The fraction of packets lost in transit from a host to another during a specified time interval Internet packet transport works on a best-effort basis, i.e., a router may drop them depending on its current conditions A moderate level of packet loss is not in itself tolerable Some real-time services, e.g., VoIP, can tolerate some packet losses TCP resends lost packets at a slower rate Metrics One way loss Round Trip (RT) loss

Network Monitoring Metrics (4/5) Delay (Latency) The time taken for a packet to travel from a host to another Round Trip Time (RTT) Forward transport delay + server delay + backward transport delay Forward transport delay is often not the same as backward transport delay (may use different paths) For streaming applications, high delay or delay variation (jitter) can cause degradation on user-perceived QoS Metrics One way delay Round Trip Time (delay) Delay variance (jitter)

Network Monitoring Metrics (5/5) Throughput The rate at which data is sent through the network, usually expressed in bytes/sec, packets/sec, or flows/sec Be careful in choosing the interval; a long interval will average out short-term bursts in the data rate A good compromise is to use one- to five-minute intervals, and to produce daily, weekly, monthly, and yearly plots Link Utilization over a specified interval is simply the throughput for the link expressed as a percentage of the access rate Metrics Link Capacity (Mbps, Gbps) Throughput (bytes/sec, packets/sec, flows/sec) Utilization (%)

Traffic Monitoring Approaches (1/4) Passive Monitoring Active Monitoring

Traffic Monitoring Approaches (2/4) Active Monitoring Performed by sending test (probe) traffic into network Generate test packets periodically or on-demand Measure performance of test packets or responses Take the statistics Impose extra traffic on network and distort its behavior in the process Test packet can be blocked by firewall or processed at low priority by routers Mainly used to monitor network performance Test packet generator Test packet probe Response Probe Target host

Traffic Monitoring Approaches (3/4) Passive Monitoring Carried out by observing network traffic Collect packets from a link or network flow from a router Perform analysis on captured packets for various purposes Network device performance degrades by mirroring or flow export Used to perform various traffic usage/characterization analysis or intrusion detection Flow Data Traffic Information Packet Capture Analysis Generation Network link Router

Traffic Monitoring Approaches (3/4) Comparison of Two Monitoring Approaches Active Monitoring Passive Monitoring Configuration Multi-point Single or multi-point Data size Small Large Network overhead Additional traffic Device overhead No overhead if splitter is used Purpose Delay, packet loss, availability Throughput, traffic pattern, trend, & detection CPU Requirement Low to Moderate High Advantages Gain some benefits at the initial stage of network construction, because not much data gained from passive one Measured result may show the real network characteristics Does not need to generate additional probe messages Disadvantages Cannot reflect network characteristics Need to generate the probe messages which may cause extra overhead to network Captured data has massive volume size Should have additional facility to capture the mirrored packet from network

Active Monitoring Techniques

Active Monitoring Techniques ICMP-based Method Diagnose network problems Availability / Round-trip delay / Round-trip packet loss TCP-based Method One-way bandwidth / Round trip bandwidth Bulk transfer rate UDP-based Method One-way packet loss / Round trip bandwidth

ICMP-based Method (1/5) Active Monitoring – ICMP Internet Control Message Protocol (ICMP), RFC 792 The purpose of ICMP messages is to provide feedback about problems in the IP network environment Delivered in IP packets ICMP message format 4 byte of ICMP header and optional message

ICMP-based Method (2/5) ICMP Functions To announce network errors If a network, host, port is unreachable, ICMP Destination Unreachable Message is sent to the source host To announce network congestion When a router runs out of buffer queue space, ICMP Source Quench Message is sent to the source host To assist troubleshooting ICMP Echo Message is sent to a host to test if it is alive - used by ping To announce timeouts If a packet’s TTL field drops to zero, ICMP Time Exceeded Message is sent to the source host - used by traceroute

ICMP-based Method (3/5) ICMP Drawbacks ICMP messages may be blocked (i.e., dropped) by firewall and processed at low priority by router ICMP has also received bad press by being used in many denial of service (DoS) attacks and because of the number of sites generating monitoring traffic As a consequence some ISPs disable ICMP even though this potentially causes poor performance and does not comply with RFC1009 (Internet Gateway Requirements) In spite of these limitations, ICMP is still most widely used in active network measurements

ICMP-based Method (4/5) Ping A simple application that runs on a host, typically supplied as part of the host's operating system Uses ICMP ECHO_REQUEST and ECHO_RESPONSE packets Provides round-trip time and packet loss For average measurement, run ping at regular intervals so as to measure the site's latency and packet loss

ICMP-based Method (5/5) Traceroute Produces a hop-by-hop listing for each router along the path to the target host For each hop, it prints the round-trip time for the router Algorithm: uses ICMP and TTL field in the IP header Send an ICMP packet with TTL=1 First router sends back ICMP TIME_EXCEEDED Then send ICMP packet with TTL=2 and hear back from the second router Continue till the destination is reached or TTL expires (default max TTL=30) It shows you only the forward path The reverse path is seldom the same To trace the reverse path one must run traceroute on the remote host (reverse traceroute server, Looking Glass Server)

TCP-based Method TCP – Throughput TCP t1 t2 105 x 8 NTP Synchronized hosts Measurement Source Machine Measurement Destination Machine TCP t1 local time : t1 100 KB t2 local time : t2 Throughput (Mbps) = t2(㎲) – t1(㎲) 105 x 8

UDP-based Method UDP – One Way Loss UDP Received Packet Counts NTP Synchronized hosts Measurement Source Machine Measurement Destination Machine UDP 1 Packet (1000 Byte) 100 KB 100 KB Received Packet Counts One way Loss = 100 - x 100 (%) Sent Packet Counts

Passive Monitoring and Analysis Techniques

Packet Capturing (1/2) Packet Capturing Packets can be captured using Port Mirroring or Network Splitter (Tap) Mirroring Probe system Splitting Port Mirroring Network Splitter How it works - Copies all packets passing on a port to another port - Splits the signal and sends a signal to original path and another to probe Advantage - No extra hardware required - No processing overhead on router/switch Disadvantage - Processing overhead on router/switch - Splitter hardware required

Packet Capturing (2/2) Difficulties in packet capturing Massive amount of data How much packet data is generated from 100 Mbps network in an hour?  Port speed ⅹIn&Out ⅹLink Utilization ⅹ sec/hour = throughput 100 Mbps ⅹ 2 ⅹ 0.5 ⅹ 3600 = 360 Gbps  Throughput / avg. packet lengthⅹ bytes of packet data = data size 360 Gbps / (1500 ⅹ 8) ⅹ 30 = 1 Gbyte Processing of high-speed packets Processing time for 100 Mbps network Port speed ⅹ In&Out ⅹ Link Utilization / average packet length = 8333 packets/sec => 0.12 msec/packet 100 Mbps 1 Gbps 1 Tbps Data size per hour (assume 0.5 link util) 1 Gbyte 10 Gbyte 10 Tbyte Processing Time per packet 0.12 msec 0.012 msec 0.012 μsec

Sampling Why We Need Sampling? If the rate is too high to capture all packets reliably, there is no alternative but to sample the packets Sampling algorithms: every Nth packet or fixed time interval 1 2 3 4 5 6 7 8 9 10 11 (a) 2:1 sampling (b) 1 msec sampling 0 msec 1 msec 2 msec 3 msec 4 msec

Flow Generation Flow Flow is a collection of packets with the same {SRC and DST IP address, SRC and DST port number, protocol number} Flow data can be collected from routers directly, or standalone flow generator having packet capturing capability Popular flow formats NetFlow (Cisco), sFlow (sFlow.org), IPFIX (IETF) Issues in flow generation What information should be included in a flow data? How to generate flow data from raw packet information efficiently? How to save bulk flow data into DB or binary file in a collector? How long should the data be preserved? flow 1 flow 2 flow 3 flow 4

Flow: NetFlow Cisco NetFlow NetFlow Export Datagram An option configurable in Cisco routers that exports data on each IP flow passed through an interface NetFlow Export Datagram Flow format of Version5 Header · Sequence number · Record count · Version number Flow Record Flow Record Flow Record Flow Record Flow Record From/To Packet Count Byte Count Source IP Address Destination IP Address Usage Time of Day Start Timestamp End Timestamp Source TCP/UDP Port Destination TCP/UDP Port Application Port Utilization Input Interface Port Output Interface Port Next Hop Address Source AS Number Dest. AS Number Source Prefix Mask Dest. Prefix Mask Routing and Peering Type of Service TCP Flags Protocol QoS

Flow: sFlow sFlow Described in RFC 3176: “InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks” sFlow is a monitoring technology that gives visibility into the use of networks, enabling performance optimization, accounting/billing for usage, and defense against security threats sFlow samples packets using statistical sampling theory Format of Version 4 Packet Header Data Header Protocol (Format of sampled header) Frame_length Header bytes Packet IP v4 Data Length Protocol (IP Protocol Type) src_ip / dst_ip src_port / dst_port TCP flags tos

Traffic Analysis Aspects Spatial Aspect The patterns of traffic flow relative to the network topology Important for proper network design and planning Identification of bottleneck & avoidance of congestion Example: Flow aggregation by src, dst IP address or AS number Temporal Aspect The stochastic behavior of a traffic flow, described in statistical terms Important for resource management and traffic control Important for traffic shaping and caching policies Example: Packet or byte per hour, day, week, month Composition of Traffic A breakdown of traffic according to the contents, application, packet length, flow duration Helps to explain its temporal and spatial characteristics Example: game, streaming media traffic for a week from peer ISP

Traffic Classification/Identification (1/2) Classifying traffic based on features passively observed in the traffic, and according to specific classification goals Types of Traffic Classification Port-based approaches E.g., TCP port 20 and 21  FTP, TCP port 80  HTTP Payload-based approaches E.g., “0x12BitTorrent protocol”  BitTorrent Machine Learning (ML)-based approaches Connection-related statistical information-including connection duration, inter- packet arrival time, and packet Accuracy Strength Weakness Port-based Low Low computational cost Low accuracy Payload-based High Most accurate method High computational cost Exhaustive signature generation ML-based Can handle encrypted traffic

Traffic Classification/Identification (2/2) In the Perspective of Network Layers Classification Level in Practice (Classification Output) IP, ARP, RARP, etc. Network Layer TCP, UDP, ICMP, etc. Transport Layer HTTP, HTTPS, SMTP, FTP, TELNET, SSH, POP, etc. Application Layer Bulk transfer, small transaction, etc. Traffic clustering Web, game, P2P, messenger, streaming, mail, etc. Application-type breakdown HTTP, HTTPS, SMTP, FTP, TELNET, SSH, POP, etc. Application protocol breakdown BitTorrent, MSN, NateOn, Filezilla FTP, etc. Application Breakdown

Q&A