Top Banner
IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka [email protected] Division of Information Technolo Computer Sciences Wisconsin Advanced Internet La
61

IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka [email protected] Division of Information Technology,

Dec 28, 2015

Download

Documents

Henry Johns
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

IP Flow Measurement & Analysis with FlowScan

IPAM Workshop, Los Angeles, March 21, 2002

Dave [email protected]

Division of Information Technology,Computer Sciences

Wisconsin Advanced Internet Lab

Page 2: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Agenda

What is FlowScan? What are IP Flows? Interpreting Sample FlowScan Graphs FlowScan Hardware & Software Components Graphs of Network Events & Anomalies "Characteristics of Flow Anomalies" (work in

progress)

Page 3: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

What is FlowScan?

FlowScan is a freely-available network traffic reporting and visualization tool. Its development began in December 1998, and it was first released in March 2000. There are hundreds of users today including campuses and ISPs.

FlowScan analyzes data exported by Internet Protocol routers.

Page 4: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

FlowScan counts IP flows by protocol, application, user population, or Internet connection. Protocols include TCP and UDP. Applications include email (SMTP), file sharing (e.g.

KaZaA). User populations are subnets such as schools or

departments. Internet connections are transit and peering links

between Autonomous Systems

What does FlowScan do?

Page 5: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

What is a Flow?

An IP flow is a unidirectional series of IP packets of a given protocol (and port where applicable), traveling between a source and destination, within a certain period of time.

K. Claffy, G. Polyzos, H. Werner-Braun, c. 1993.

Page 6: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

These flows represent an ftp file transfer that lasted 9 seconds. Two bidirectional Internet connections, comprised of a total of 430 packets containing 380,122 bytes, are summarized into just five flows.

What is a Flow?

Page 7: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

The notion of flow profiling was introduced by the research community.

Today, flow profiling is built into some networking devices for operational and accounting purposes.

Vendor implementations include Cisco NetFlow, Riverstone (formerly Cabletron) LFAP, Foundry (InMon) sFlow

These essentially use the definition introduced by [ClaffyPB] with timeout and TCP stateful inspection.

The "IP Flow Information eXport" (IFPIX) Working Group in the IETF is currently working toward standardizing existing practice by definingrequirements, information model, and architecture for flow export implementations.

Background on Flows & Router-based Flow-Export

Page 8: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Diagram by Daniel W. McRobb, from the cflowd configuration documentation, 1998-1999.

An "Atomic" Flow

Page 9: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Horizontal axis is time, current time to the right. Vertical axis indicates magnitude of measurement,

usually in bits, packets, or flows per second. Outbound traffic is upwards, Inbound traffic is

downwards (mnemonic: pejoritive `bottom feeders').

Colored bars show traffic classification and are stacked (not overlayed) to show the total.

Interpreting FlowScan Graphs

Page 10: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Interpreting FlowScan Graphs

Page 11: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 12: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 13: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 14: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 15: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 16: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 17: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 18: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 19: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 20: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 21: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 22: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 23: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Hardware and Software Components

Page 24: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Flow collectorstores exported flows from router.

LAN

LAN

LAN

LAN

Internet

Diagram by Mark Fullmer (author of flow-tools), 2002.

Router-based Flow Export

Page 25: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Router-based Flow Export

Page 26: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Router-based Flow Export

Page 27: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Router-based Flow Export

Page 28: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Workstation A Workstation B

Campus Flow probe connectedto switch port in traffic mirror mode

Diagram by Mark Fullmer (author of flow-tools), 2002.

Ethernet Flow Probe

Page 29: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Ethernet Flow Probe

Page 30: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Ethernet Flow Probe

Page 31: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Interpreting Graphs Review

Page 32: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 33: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 34: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 35: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 36: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 37: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Events & Anomalies

Denial-of-Service Probes, Scans Worm Propagation Flash Crowds Distributed Denial-of-Service

Page 38: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Inbound DSL DoS FloodA campus DSL user's host (640Kbps download) was the recipient of 50,000 packets per second, whcih totaled over 10 megabits per second.

Page 39: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 40: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Active Hosts... indications of Network Abuse

Page 41: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Code Red Worm Propagation

The following graph (next slide) plots the difference between the number of UW-Madison IP addresses that have transmitted traffic and the number that have received traffic. These values are plotted independently for each of UW-Madison's four class B networks. This metric represents the number of campus host IP addresses that participated in "monologues" - one way exchanges of IP information with hosts in the outside world. A negative value indicates that more src addresses have been used as received IP traffic than have generated outbound IP traffic. Negative numbers in the plot are an indication of inbound "scanning" or probing behavior (such as that done by the hosts in the outside world that were infected with the Code Red worm) because those scans often attempt to talk to unused campus IP addresses or to hosts which simply do not respond because of firewall policies.

Page 42: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Code Red Worm "Monologues"

Page 43: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Larry Niven's 1973 SF short story "Flash Crowd" predicted that one consequence of cheap teleportation would be huge crowds materializing almost instantly at the sites of interesting news stories. Twenty years later the term passed into common use on the Internet to describe exponential spikes in website or server usage when one passes a certain threshold of popular interest.

http://www.tuxedo.org/~esr/jargon/html/entry/flash-crowd.html

Flash Crowds

Page 44: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Linux Release Events

Page 45: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

RedHat 7.2 Flows

Page 46: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 47: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

On June 7, 2001, UW-Madison's 8-feet, 5-inch tall titan opened up gradually over the course of six hours

This illustration shows Titan Arum in bud, left, and full bloom, center. Inside the base of the spadix (the fleshy central column of the flower) are over a thousand tiny flowers, right.

The Blooming of the Titan Arum http://www.news.wisc.edu/titanarum/

Photo: Michael Rothbart, Illustration: Kandis Elliot

Page 48: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

The Blooming of the Titan Arum http://www.news.wisc.edu/titanarum/

Page 49: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Outbound Distributed DoS flood from 30+ Campus Hosts

Page 50: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

The Same ICMP DDoS flood was also observed by FlowScan at another campus...

Page 51: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

The Knight IRC RobotCoordinated via Internet Relay Chat (IRC) using "robots".

Independent observations reported aggregates over 500Mbs

The Same DDoS flood was also observed by FlowScan at other campuses...

Page 52: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 53: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Characteristics of Flow Anomalies

http://www.aciri.org/vern/imw-2001/imw2001-papers/47.pdf

Page 54: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Network OutageCampus border router inexplicably stops advertising one of

the class B networks comprising about one fourth of the campus address space.

Page 55: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 56: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 57: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 58: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,
Page 59: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Low "Frequency" Anomaly Detected:Significant bulk-data transfers are performed by four campus

file-sharing hosts in two campus LANs.

Page 60: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Credits & Thanks Flow-related tools:

CAIDA (cflowd, RRDTOOL) Tobi Oetiker (RRDTOOL) Mark Fullmer (flow-tools) Carter Bullard (argus) FlowScan contributors

Anomaly Characteristics & Wavelet Analysis: Paul Barford Amos Ron Jeff Kline

Page 61: IP Flow Measurement & Analysis with FlowScan IPAM Workshop, Los Angeles, March 21, 2002 Dave Plonka plonka@doit.wisc.edu Division of Information Technology,

Resources FlowScan:

http://net.doit.wisc.edu/~plonka/FlowScan/ http://wwwstats.net.wisc.edu

Argus: http://www.qosient.com/argus/ flow-tools:

http://www.splintered.net/sw/flow-tools/ cflowd, CoralReef: http://www.caida.org/

tools/measurement/cflowd/ tools/measurement/CoralReef/

IP Flow Information eXport, an IETF Working Group: http://ipfix.doit.wisc.edu