Reclaiming Networkwide Visibility Using Ubiquitous End System Monitors - PowerPoint PPT Presentation

1 / 15
About This Presentation
Title:

Reclaiming Networkwide Visibility Using Ubiquitous End System Monitors

Description:

Reclaiming Networkwide Visibility Using Ubiquitous End System Monitors – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 16
Provided by: mort98
Category:

less

Transcript and Presenter's Notes

Title: Reclaiming Networkwide Visibility Using Ubiquitous End System Monitors


1
Reclaiming Network-wide Visibility Using
Ubiquitous End System Monitors
  • E Cooke, R Mortier (mort), A Donnelly, P Barham,
    R Isaacs
  • Systems and Networking, Microsoft Research
    Cambridge
  • ( University Michigan)

2
The Visibility Crisis
  • Visibility into the network is essential for
    management security/availability
  • Problem increasingly opaque traffic and complex
    application behavior obfuscates our view of the
    network
  • Even collecting every packet at an upstream
    router is not enough!

3
Opaque Traffic
  • Encryption and tunneling
  • Application-level (SSL)
  • Network-level (IPSec)
  • Where
  • Inter-domain visibility (operations outsourcing)
  • Intra-domain visibility (IDS/IPS, flow-based
    anomaly detection)
  • Experiment 8-day enterprise traffic trace - 93
    of the collected packets were IPSec encapsulated!

4
Complex Application Behavior
  • Example checking your email
  • Connect to authentication server to get
    credentials
  • Authenticate to mail server
  • Connect to different services to download mail,
    headers, attachments
  • While concurrently synchronising address book,
    calendar, etc.
  • Result very challenging to reconstruct
    application behavior from packets/flows
  • Other examples Skype, Kazaa

5
Back to the Edge
  • We must re-think where we measure
  • Only end-systems can correctly attach semantics
    to the traffic they send and receive
  • Solution develop a scalable edge-based
    monitoring platform

6
Edge-Based Flow Monitoring
  • Lots of good work on network monitoring from the
    edge
  • Neti_at_Home, ForNet, DIMES, Spoofer
  • We have a different objective
  • Collect every flow on the network
  • Attach application-level semantics to each flow
    (e.g. process name, userid)

7
Approach
  • Place a monitoring daemon on every end-system in
    a network
  • Each monitor records all flows it sends or
    receives

R
R
R
R
R
R
Enterprise
Capture and store traffic directly on endsystems
8
Feasibility Questions
  • Where can you deploy monitors?
  • How many end-systems must be instrumented?
  • What data should be collected?
  • How can that data be accessed?
  • What is the performance impact on end-system
    monitors?
  • Security/Privacy Implications?

9
Prototype
  • To help answer these questions we constructed
    prototype
  • User-space monitoring daemon
  • Based on Event Tracing for Windows (ETW) facility
  • Logs observed flows

10
Where to deploy
  • Most practical in environments with direct
    control over end-systems
  • Enterprises
  • Governments
  • Integrate monitoring daemon into standard
    client/server OS-images
  • Not targeted at home, broadband ISPs, etc.

11
How many end-systems
A few hosts contribute most of the traffic
If we randomly choose 50 of hosts we get 75 of
the bytes
Total Byte Coverage
8-day packet trace from enterprise network
Percentage of Hosts Instrumented
12
Performance Impact
Typical Max 200 flows/sec
Flows Per Second
Typical Mean 10 flows/sec
Disk/CPU Cost Measurements
  • If we write flows to disk every 30s then across
    all systems
  • Mean 0.73 kB/s
  • Max 71.7 kB/s
  • Over one week total bytes
  • Mean 64 kB
  • Max 1.5 GB

8-day packet trace from enterprise network
13
Novel Applications
  • Network auditing
  • Determine applications/users using expensive WAN
    link
  • Data-centre management
  • Per-user/per-virtual machine packet accounting
  • Capacity Planning
  • Use historical data to predict future network
    usage
  • Network Forensics
  • Application-level intrusion forensics across
    systems
  • Anomaly Detection
  • Produce detailed reports of abnormal application
    usage

14
Thank You
Questions?
15
Security/Privacy
  • Privacy Storing personal information
  • Flow-level data is already collected on many
    networks today
  • System only collects data on what a host already
    sends or receives
  • Security A malicious user could corrupt the flow
    store
  • Correlate flows across hosts to find anomalies
  • Hypervisor/Host-OS does data logging
  • Store flows in central repositories
Write a Comment
User Comments (0)
About PowerShow.com