ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC.

Slides:



Advertisements
Similar presentations
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka University of Wisconsin – Madison SIGCOMM IMW, 2001.
Advertisements

URCA: Pulling out Anomalies by their Root Causes Fernando Silveira and Christophe Diot.
ASSESSING RESPONSIVENESS OF HEALTH MEASUREMENTS. Link validity & reliability testing to purpose of the measure Some examples: In a diagnostic instrument,
Evaluating Classifiers
An Introduction of Botnet Detection – Part 2 Guofei Gu, Wenke Lee (Georiga Tech)
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
A Fast and Compact Method for Unveiling Significant Patterns in High-Speed Networks Tian Bu 1, Jin Cao 1, Aiyou Chen 1, Patrick P. C. Lee 2 Bell Labs,
Detecting DDoS Attacks on ISP Networks Ashwin Bharambe Carnegie Mellon University Joint work with: Aditya Akella, Mike Reiter and Srinivasan Seshan.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
TransAD: A Content Based Anomaly Detector Sharath Hiremagalore Advisor: Dr. Angelos Stavrou October 23, 2013.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Nick Duffield, Patrick Haffner, Balachander Krishnamurthy, Haakon Ringberg Rule-Based Anomaly Detection on IP Flows.
Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
CS 8751 ML & KDDEvaluating Hypotheses1 Sample error, true error Confidence intervals for observed hypothesis error Estimators Binomial distribution, Normal.
Unsupervised Intrusion Detection Using Clustering Approach Muhammet Kabukçu Sefa Kılıç Ferhat Kutlu Teoman Toraman 1/29.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
A Nonstationary Poisson View of Internet Traffic T. Karagiannis, M. Molle, M. Faloutsos University of California, Riverside A. Broido University of California,
Benchmarking Anomaly-based Detection Systems Ashish Gupta Network Security May 2004.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
ANOMALY DETECTION AND CHARACTERIZATION: LEARNING AND EXPERIANCE YAN CHEN – MATT MODAFF – AARON BEACH.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
EL 933 Final Project Presentation Combining Filtering and Statistical Methods for Anomaly Detection Augustin Soule Kav´e SalamatianNina Taft.
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
A Signal Analysis of Network Traffic Anomalies Paul Barford with Jeffery Kline, David Plonka, Amos Ron University of Wisconsin – Madison Summer, 2002.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Anomaly detection Problem motivation Machine Learning.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
Traffic Classification through Simple Statistical Fingerprinting M. Crotti, M. Dusi, F. Gringoli, L. Salgarelli ACM SIGCOMM Computer Communication Review,
Differences between In- and Outbound Internet Backbone Traffic Wolfgang John and Sven Tafvelin Dept. of Computer Science and Engineering Chalmers University.
1/25 Current results and future scenarios for gravitational wave’s stochastic background G. Cella – INFN sez. Pisa.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Connect. Communicate. Collaborate Experiences with tools for network anomaly detection in the GÉANT2 core Maurizio Molina, DANTE COST TMA tech. Seminar.
1 Impact of IT Monoculture on Behavioral End Host Intrusion Detection Dhiman Barman, UC Riverside/Juniper Jaideep Chandrashekar, Intel Research Nina Taft,
Measurement and Modeling of Packet Loss in the Internet Maya Yajnik.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Anomaly detection in VoIP and Ethernet traffic under presence of daily patterns Piotr Żuraniewski (UvA/TNO/AGH) Felipe Mata (UAM), Michel Mandjes (UvA),
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
BING: Binarized Normed Gradients for Objectness Estimation at 300fps
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Is Sampled Data Sufficient for Anomaly Detection Ip Wing Chung Peter ( ) Ngan Sze Chung ( )
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Academic Research Academic Research Dr Kishor Bhanushali M
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
Mining Anomalies in Network-Wide Flow Data Anukool Lakhina with Mark Crovella and Christophe Diot NANOG35, Oct 23-25, 2005.
Presenter: Kuei-Yu Hsu Advisor: Dr. Kai-Wei Ke 2013/4/29 Detecting Skype flows Hidden in Web Traffic.
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection Jing Gao 1, Wei Fan 2, Deepak Turaga 2,
Assessing Responsiveness of Health Measurements Ian McDowell, INTA, Santiago, March 20, 2001.
Taming Internet Traffic Some notes on modeling the wild nature of OD flows Augustin Soule Kavé Salamatian Antonio Nucci Nina Taft Univ. Paris VI Sprintlabs.
EE515/IS523: Security 101: Think Like an Adversary Evading Anomarly Detection through Variance Injection Attacks on PCA Benjamin I.P. Rubinstein, Blaine.
Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
Sensitivity of PCA for Traffic Anomaly Detection Evaluating the robustness of current best practices Haakon Ringberg 1, Augustin Soule 2, Jennifer Rexford.
LiTGen, a lightweight traffic generator: application to mail and P2P wireless traffic Chloé Rolland*, Julien Ridoux + and Bruno Baynat* * Laboratoire LIP6.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
Machine Learning in Practice Lecture 9 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
Machine Learning in Practice Lecture 9 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
Distributed Network Monitoring in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
Presenter: Ibrahim A. Zedan
Impact of Packet Sampling on Anomaly Detection Metrics
A survey of network anomaly detection techniques
SLOPE: A MATLAB Revival
Jia-Bin Huang Virginia Tech
Presentation transcript:

ASTUTE: Detecting a Different Class of Traffic Anomalies Fernando Silveira 1,2, Christophe Diot 1, Nina Taft 3, Ramesh Govindan 4 1 Technicolor 2 UPMC Paris Universitas 3 Intel Labs Berkeley 4 University of Southern California ACM SIGCOMM 2010

ASTUTE: Detecting a Different Class of Traffic Anomalies A Short-Timescale Uncorrelated-Traffic Equilibrium Comparing to Kalman Filter and Wavelet Analysis, ASTUTE can find anomalies with different features Kalman & Wavelet can detect:  few large flows ASTUTE can detect:  many small flows

2010/11/2 Speaker: Li-Ming Chen 3 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 4 Anomaly Detection Traffic anomalies (in large ISPs & enterprise networks) come from:  Malicious activities (e.g., DoS, port scan)  Misconfigurations/failures of network components (e.g., link failure, routing problem)  Legitimate events (e.g., large file transfers, flash crowds) Anomaly detection:  Build a statistical model of normal traffic  An anomaly is defined as deviation from the normal model

2010/11/2 Speaker: Li-Ming Chen 5 Motivation: Challenges in Anomaly Detection Anomaly Detection:  Pros: Can detect new anomalies!  Cons: Training takes times Training data is never guaranteed to be clean Periodical (re)training is required False alarm  Can we detect anomalies without having to learn what is normal?

2010/11/2 Speaker: Li-Ming Chen 6 Observation Network Traffic show Equilibrium:  When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out   making the average change across flows close to ZERO The equilibrium property  Holds if the flows are independent  While, is violated by traffic changes caused by several, potentially small, correlated flows ~ traffic anomalies

2010/11/2 Speaker: Li-Ming Chen 7 Goal Propose a new approach to anomaly detection based on ASTUTE  A mathematical model to describe “A Short-Timescale Uncorrelated-Traffic Equilibrium” Advantages:  No training – computationally simple and immune to data- poisoning  Accurately detects a well-defined class of traffic anomalies  Theoretical guarantees on the false positive rates Evaluate the performance against Kalman filter and wavelet analysis

2010/11/2 Speaker: Li-Ming Chen 8 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 9 Equilibrium Model Flow: a set of packets that share the same values for a given set of traffic features (e.g., 5-tuple) Binning: use time bin to study the evolution of a flow Flow volume: number of packets in the flow during the corresponding bin Measure flow volume on a link for each time bin bin i bin i+1 … time … flow f starts at time bin s f flow f continued for d f bins flow f ’s volume of each time bin can be represented as a vector: x f,i x f,i+1

2010/11/2 Speaker: Li-Ming Chen 10 Equilibrium Model: Focus on Volume Changes of Flows bin i bin i+1 … time … flow f ’s volume of each time bin can be represented as a vector: x f,i x f,i+1 F: set of flows that are active in i or i+1 (volume change of f from i to i+1)

2010/11/2 Speaker: Li-Ming Chen 11 Consequences of the ASTUTE Model Assumptions:  (A1) Flow independence  (A2) Stationary Theorem 1 (consequences of the ASTUTE) : other Intuition: independent flows cancel each other out

2010/11/2 Speaker: Li-Ming Chen 12 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 13 ASTUTE-based Anomaly Detection Method Given:  A detection threshold K(p)  A pair of consecutive time bins Measure:  Set of active flows, F  Mean volume change,  Variance of volume changes, Compute AAV (ASTUTE Assessment Value) :  Flag an alarm if:  A toy example : ii+1 No Alarm (copy from author’s slides) 0 +2

2010/11/2 Speaker: Li-Ming Chen 14 Note: About Volume Changes Requirement:  Only consider traffic on non-saturated links, and using short-timescale bins Volume change (for F flows that are active at bin i):  Mean:  Standard deviation:

2010/11/2 Speaker: Li-Ming Chen 15 Note: About Detection Threshold For large F, has a (1-p) confidence interval given by the central limit theorem  If contains zero, then F satisfies ASTUTE  Otherwise, there is an ASTUTE anomaly at time bin i  smallest value of K(p) is 1-p conf. interval p/2 K(p)K(p)-K(p) 0 (defined as AAV) < 0> 0

2010/11/2 Speaker: Li-Ming Chen 16 Note: Situations that ASTUTE is Violated There are 2 possibilities that ASTUTE is violated:  (1) false positive Controlled by false positive rate p In a fraction p of the time bins, ASTUTE may be violated by normal traffic  (2) Flows violate the model’s assumption: independence & stationary Stationary:  Only over the timescale of a typical flow duration  Authors study which bin sizes show stationary behavior Independence:  Many flows increase/decrease their volumes at the same time!

2010/11/2 Speaker: Li-Ming Chen 17 Note: Validate Stationary Assumption (A2) Stationary:  Depends on timescale (bin size) In the trace:  Long scales: daily usage bias  Small scales: no bias!  We use short timescales to factor out violations of stationarity

2010/11/2 Speaker: Li-Ming Chen 18 Note: Validate “ Gaussianity ” of AAVs Check distribution similarity Study the impact of packet sampling rate

2010/11/2 Speaker: Li-Ming Chen 19 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology  Competitors (or collaborator!?): Kalman & Wavelet  Inspect anomalies from traffic data and identify their root causes  Simulation through anomaly injection Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 20 Kalman & Wavelet (alternative anomaly detectors for comparison purpose) Kalman: a spatio-temporal detector  Learning spatial and temporal correlations to predict the next values  Its threshold parameter has similar semantics to that of ASTUTE (allowing a direct comparison)  [26] A. Soule, K. Salamatian, and N. Taft, “Combining Filtering and Statistical Methods for Anomaly Detection,” in Proc. IMC, Wavelet: a frequency-based detector  Decompose signals into low/medium/high frequency bands  The variance of the combined signal (medium & high freq. bands) represents anomalies  [2] P. Barford, J. Kline, D. Plonka, and A.Ron, “A Signal Analysis of Network Traffic Anomalies,” In Proc. IMW, 2002.

2010/11/2 Speaker: Li-Ming Chen 21 Kalman & Wavelet (cont ’ d) Targets of these two detectors:  (1) packet volume time series  (2) entropy time series of Src. IP  (3) entropy time series of Dst. IP  (4) entropy time series of Src. Port  (5) entropy time series of Dst. port

2010/11/2 Speaker: Li-Ming Chen 22 Dataset Flow traces from 3 different networks (between research institutions) (public Internet  European NRENs) (inside the enterprise network) Flow sampling: NO

2010/11/2 Speaker: Li-Ming Chen 23 Manual Classification of Anomalies for Root Cause Analysis Goal:  To perform “root cause” analysis for the anomalies found by ASTUTE, Kalman, and Wavelet   need to know the root cause first Approach:  Use information provided by ASTUTE to help the process of manual classification of anomalies in the traffic trace Steps:  (1) correlated anomalous flows  (2) anomalous flow identification  (3) anomalous flow classification (by hand)

2010/11/2 Speaker: Li-Ming Chen 24 Results of Anomalous Flow Classification Take these as the criteria for labeling the anomalies found in the three traces

2010/11/2 Speaker: Li-Ming Chen 25 Simulation through Anomaly Injection Benefit:  Simulation helps understand how methods trade-off detection rates for false positives (ROC curves)  ps: for comparing Kalman and ASTUTE only Approach:  For end-host activity: build a set of benchmark anomalies and inject (recreate identified anomalies)  For outages: remove related traffic

2010/11/2 Speaker: Li-Ming Chen 26 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 27 Number of Anomalies and Anomaly Overlap Small overlap Kalman & Wavelet have more overlap among each other what are these anomalies??

2010/11/2 Speaker: Li-Ming Chen 28 Anomaly Types (Internet2) Detection capabilities are different

2010/11/2 Speaker: Li-Ming Chen 29 Anomaly Types (GEANT2 & Corporate) Users characteristics in different networks are different

2010/11/2 Speaker: Li-Ming Chen 30 Small Detector Overlap (map qualitative properties (types) of the anomalies to their quantitative properties (# flows and packets)) Kalman/Wavelet (few large flow) ASTUTE (several small flow) Less total volume

2010/11/2 Speaker: Li-Ming Chen 31 Detection Performance Type 1 Type 2 Type 3

2010/11/2 Speaker: Li-Ming Chen 32 Complementarity of ASTUTE & Kalman After combination, the performance is better!

2010/11/2 Speaker: Li-Ming Chen 33 Outline Motivation & Goal ASTUTE – An Equilibrium Model ASTUTE-based Anomaly Detection Experimental Methodology Performance Evaluation Conclusion & My Comments

2010/11/2 Speaker: Li-Ming Chen 34 Conclusion ASTUTE detects anomalies w/o learning the normal behavior  Computationally simple and immune to data-poisoning  Specializes on strongly correlated flows (several small flow)  Limitation: can not find anomalies involving a few large flows But those are easy to find!  ASTUTE and Kalman complement each other nicely  ASTUTE also provides information that is useful to perform root cause analysis