Northwestern Lab for Internet - PowerPoint PPT Presentation

About This Presentation
Title:

Northwestern Lab for Internet

Description:

The High-Performance Network Anomaly/Intrusion Detection and ... Battling Hackers is a ... Battling Hackers is a Growth Industry (cont'd) Virus and worms ... – PowerPoint PPT presentation

Number of Views:54
Avg rating:3.0/5.0
Slides: 20
Provided by: Hamm169
Category:

less

Transcript and Presenter's Notes

Title: Northwestern Lab for Internet


1
Northwestern Lab for Internet Security
Technology (LIST)http//list.cs.northwestern.edu
2
Personnel
  • Prof. Yan Chen
  • Ph. D. Students
  • Brian Chavez
  • Yan Gao
  • Zhichun Li
  • Yao Zhao
  • M. S. Students
  • Prasad Narayana
  • Leon Zhao
  • Undergraduates
  • Too many to be listed

3
(No Transcript)
4
Projects
  • The High-Performance Network Anomaly/Intrusion
    Detection and Mitigation (HPNAIDM) Systems
  • Overlay Network Monitoring and Diagnostics
  • Adaptive Intrusion Detection and Mitigation
    Systems for WiMAX Networks

5
Our Theme
  • Internet is becoming a new infrastructure for
    service delivery
  • World wide web,
  • VoIP
  • Email
  • Interactive TV?
  • Major challenges for Internet-scale services
  • Scalability 600M users, 35M Web sites, 2.1Tb/s
  • Security viruses, worms, Trojan horses, etc.
  • Mobility ubiquitous devices in phones, shoes,
    etc.
  • Agility dynamic systems/network,
    congestions/failures

6
Battling Hackers is a Growth Industry!
--Wall Street Journal (11/10/2004)
  • The past decade has seen an explosion in the
    concern for the security of information
  • Internet attacks are increasing in frequency,
    severity and sophistication
  • Denial of service (DoS) attacks
  • Cost 1.2 billion in 2000
  • Thousands of attacks per week in 2001
  • Yahoo, Amazon, eBay, Microsoft, White House,
    etc., attacked

7
Battling Hackers is a Growth Industry (contd)
  • Virus and worms faster and powerful
  • Melissa, Nimda, Code Red, Slammer
  • Cause over 28 billion in economic losses in
    2003, growing to gt 75 billion in economic losses
    by 2007.
  • Code Red (2001) 13 hours infected gt360K machines
    - 2.4 billion loss
  • Slammer (2003) 10 minutes infected gt 75K
    machines - 1 billion loss
  • Spywares are ubiquitous
  • 80 of Internet computers have spywares installed

8
The Spread of Sapphire/Slammer Worms
9
Current Intrusion Detection Systems (IDS)
  • Mostly host-based and not scalable to high-speed
    networks
  • Slammer worm infected 75,000 machines in lt10 mins
  • Host-based schemes inefficient and user dependent
  • Have to install IDS on all user machines !
  • Mostly signature-based
  • Cannot recognize unknown anomalies/intrusions
  • New viruses/worms, polymorphism

10
Current Intrusion Detection Systems (II)
  • Statistical detection
  • Hard to adapt to traffic pattern changes
  • Unscalable for flow-level detection
  • IDS vulnerable to DoS attacks
  • Overall traffic based inaccurate, high false
    positives
  • Cannot differentiate malicious events with
    unintentional anomalies
  • Anomalies can be caused by network element faults
  • E.g., router misconfiguration

11
High-Performance Network Anomaly/Intrusion
Detection and Mitigation System (HPNAIDM)
  • Online traffic recording
  • Reversible sketch for data streaming computation
  • Record millions of flows (GB traffic) in a few
    hundred KB
  • Small of memory access per packet
  • Scalable to large key space size (232 or 264)
  • Online sketch-based flow-level anomaly detection
  • Leverage statistical learning theory (SLT)
    adaptively learn the traffic pattern changes
  • As a first step, detect TCP SYN flooding,
    horizontal and vertical scans even when mixed

12
HPNAIDM (II)
  • Integrated approach for false positive reduction
  • Signature-based detection
  • Network element fault diagnostics
  • Traffic signature matching of emerging
    applications
  • Infer key characteristics of malicious flows for
    mitigation
  • HPNAIDM First flow-level intrusion detection
    that can sustain 10s Gbps bandwidth even for
    worst case traffic of 40-byte packet streams

13
Reversible Sketch Based Anomaly Detection
  • Input stream (key, update) (e.g., SIP,
    SYN-SYN/ACK)
  • Summarize input stream using sketches
  • Build forecast models on top of sketches
  • Report flows with large forecast errors
  • Infer the (characteristics) key for mitigation

14
Sketch-based Intrusion Detection
  • RS((DIP, Dport), SYN-SYN/ACK)
  • RS((SIP, DIP), SYN-SYN/ACK)
  • RS((SIP, Dport), SYN-SYN/ACK)

15
Intrusion Mitigation
16
Preliminary Evaluation
  • Evaluated with NU traces (239M flows, 1.8TB
    traffic/day)
  • Scalable
  • Can handle hundreds of millions of time series
  • Accurate Anomaly Detection w/ Sketches
  • Compared with detection using complete flow logs
  • Provable probabilistic accuracy guarantees
  • Even more accurate on real Internet traces
  • Efficient
  • For the worst case traffic, all 40 byte packets
  • 16 Gbps on a single FPGA board
  • 526 Mbps on a Pentium-IV 2.4GHz PC
  • Only less than 3MB memory used

17
Preliminary Evaluation (contd)
  • 25 SYN flooding, 936 horizontal and 19 vertical
    scans detected
  • 17 out of 25 SYN flooding verified w/ backscatter
  • Complete flow-level connection info used for
    backscatter
  • Scans verified (all for vscan, top and bottom 10
    for hscan)
  • Unknown scans also found in DShield and other
    alert reports

Bottom 10 horizontal scans
Top 10 horizontal scans
18
Sponsors
Department of Energy
Motorola
19
Research Methodology Collaborators
  • Combination of theory, synthetic/real trace
    driven simulation, and real-world implementation
    and deployment
Write a Comment
User Comments (0)
About PowerShow.com