SlideShare a Scribd company logo
1 of 22
Download to read offline
Network Anomaly Detection Using
Autonomous
System Flow Aggregates
Thienne Johnson1,2 and Loukas Lazos1
1Department of Electrical and Computer Engineering
2Department of Computer Science
University of Arizona
1
IEEE GLOBECOM 2014 December 8-12, 2014
2
Network Anomalies
3
Characteristics of Network Anomalies
Anomaly Characteristics Variations in
DDoS (D) DoS against
a single victim
Number of packets and
number of flows
Alpha Unusually high rate point
to point byte transfer
Number of packets and
volume
Scan Scanning a host for a
vulnerable port (port scan)
Scanning the network for
a target port (network scan)
Incoming flows to a
host:port
Incoming flows to a port
number
Examples
Deep packet inspection
• scalability problem in terms of computational
and storage capacity
Anomaly detection
Flow aggregation techniques
• merge multiple flow records with similar properties, and
discarding benign flows
• summarize IP flows to statistical metrics
– reduce the amount of state and history information that is maintained
• At IP flow level: computation and storage requirements for an
online NIDS can still be prohibitively large
4
• To reduce communication and storage overheads
– By exploiting the organization of the IP space to
Autonomous Systems (ASes)
• To detect large-scale network threats that create
substantial deviations in network activity compared
with benign network conditions
Our Goals
5
6
AS level anomalies at a monitored network
7
Methodology
1
3 4
5
2
8
– IP-to-AS Flow Translation
Aggregate IP flows
to AS flows
Each AS flow:
- Number of IP flows
- Number of IP packets
- Volume (Bytes)
1
9
– IP-to-AS Flow Translation
Aggregate IP flows
to AS flows
Each AS flow:
- Number of IP flows
- Number of IP packets
- Volume (Bytes)
1b
Source IPA:Port → Destination IPT:Port
Source IPC:Port → Destination IPT:Port
Source IPB:Port → Destination IPT:Port
Source IPD:Port → Destination IPT:Port
Source IPE:Port → Destination IPT:Port
Source IPF:Port → Destination IPT:Port
ASX → AST
ASY → AST
ASZ → AST
10
– Metrics for data aggregation
Different anomalies affect different network flow parameters
During aggregation period A:
1. Packet count (N): number of packets associated with the AS flow
2. Traffic volume (V): traffic volume associated with the AS flow
3. IP Flow count (IP): number of IP flows associated with the AS flow
4. AS Flow count (F): The number of AS flows that are active
.Flows from spoofed IP addresses (network/16) are aggregated as a flow
from Fake AS nodes
.Flows from ASes not contacted before could be an anomalous event
2
11
– Data aggregation
Training Phase: intervals I1,...,Im.
Traffic for each of the m intervals is represented by the same model.
Online Phase: traffic model for the online phase is computed over
an epoch, which is shorter than an interval.
Collect k samples for each metric using the aggregate values over k
aggregation periods
2b
12
– Statistical Analysis
For every AS flow, and every metric:
3
13
– Statistical Analysis
pmf
X D
Training data
Real-time
data
where (KL(P,Q) if the Kullback-Liebler divergence
𝐾𝐿 𝑃, 𝑄 = 𝑝𝑖 × log
𝑝𝑖
𝑞𝑖
𝑘
𝑖=1
Jeffrey distance
Λ 𝑃, 𝑄 =
1
2
(𝐾𝐿 𝑃, 𝑄 + 𝐾𝐿 𝑄, 𝑃 )
Measure statistical divergence
3b
14
– Statistical Analysis
Distances are normalized to ensure equal distance scales when
multiple metrics are combined to one
𝐽 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀) =
Λ 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀)
Λ 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀)
95𝑡ℎ
Value that fall in the 95th
percentile of historical distance
for metric i accumulated over
moving window W
3c
15
– Composite Metrics
To capture the multi-dimensional nature of network behaviors,
composite metrics combine several basic metrics
4
Weights could be adjusted to favor a subset of metrics, depending
on the nature of the anomaly to be detected.
𝑪𝒊 = 𝑮𝒊 𝑱 𝑵 , 𝑱 𝑽 , 𝑱 𝑰𝑷 , 𝑱 𝑭
weighting formula among the
different metrics
Foreach Epoch
Ci > Threshold?
Alert abnormal behavior
16
- Training data update
Moving window mechanism for maintaining the training data
5
D(E,W) < Threshold
Update
17
Case study
MIT LLS DDOS 1.0 intrusion dataset which simulates several DoS attacks
and background traffic.
Anomaly in AS A
18
Anomaly in AS B
Anomaly in AS C
19
Volumetric analysis – no AS distinction
Example of
use with IMap
Fowler, J; Johnson, T; Simonetto,P; Lazos, P; Kobourov, S.; Schneider, M. and Acedo, C. IMap:
Visualizing Network Activity over Internet Maps, Vizsec 2014.
Anomaly
scores per AS
20
Conclusions & Future work
 NIDS based on AS flow aggregates.
• Reduction in storage and computation overhead
 Basic network anomaly detection metrics are adapted to the
AS domain
 Composite metrics of network activity combine several basic
metrics
 New basic metric that counts the number of AS flows for
detecting anomalous events
21
Work supported by Office of Naval Research under Contract N00014-11-D-0033/0002
Formal study on composite metrics targeting known anomalies
Thank you!
http://www.cs.arizona.edu/~thienne
NETVUE website:
http://netvue.cs.arizona.edu/
22IEEE GLOBECOM 2014 December 8-12, 2014

More Related Content

Similar to Network Anomaly Detection Using Autonomous System Flow Aggregates

Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and DesingMd Khaza Main Uddin
 
Anomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsAnomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsCSCJournals
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411IJRAT
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Sreedhar Chowdam
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...IJNSA Journal
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...IJNSA Journal
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDataWorks Summit
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxRineri1
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysisguest23ccda3
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuMyNOG
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...IOSR Journals
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
C241721
C241721C241721
C241721irjes
 
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...Alexander Zhdanov
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...IJECEIAES
 
G03403041052
G03403041052G03403041052
G03403041052theijes
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection finalAkshay Bansal
 

Similar to Network Anomaly Detection Using Autonomous System Flow Aggregates (20)

Internet measurement (Presentation)
Internet measurement (Presentation)Internet measurement (Presentation)
Internet measurement (Presentation)
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
Anomaly Detection of IP Header Threats
Anomaly Detection of IP Header ThreatsAnomaly Detection of IP Header Threats
Anomaly Detection of IP Header Threats
 
Paper id 23201411
Paper id 23201411Paper id 23201411
Paper id 23201411
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
 
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
 
M41028892
M41028892M41028892
M41028892
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Understanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptxUnderstanding Intrusion Detection & Prevention Systems (1).pptx
Understanding Intrusion Detection & Prevention Systems (1).pptx
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
Network Flow Analysis
Network Flow AnalysisNetwork Flow Analysis
Network Flow Analysis
 
Traffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie LiuTraffic analysis for Planning, Peering and Security by Julie Liu
Traffic analysis for Planning, Peering and Security by Julie Liu
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
 
Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
C241721
C241721C241721
C241721
 
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...
Identification of Port-Scans in Honeypot Traffic Using Unsupervised Anomaly D...
 
Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...Web server load prediction and anomaly detection from hypertext transfer prot...
Web server load prediction and anomaly detection from hypertext transfer prot...
 
G03403041052
G03403041052G03403041052
G03403041052
 
Anomaly detection final
Anomaly detection finalAnomaly detection final
Anomaly detection final
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Network Anomaly Detection Using Autonomous System Flow Aggregates

  • 1. Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson1,2 and Loukas Lazos1 1Department of Electrical and Computer Engineering 2Department of Computer Science University of Arizona 1 IEEE GLOBECOM 2014 December 8-12, 2014
  • 3. 3 Characteristics of Network Anomalies Anomaly Characteristics Variations in DDoS (D) DoS against a single victim Number of packets and number of flows Alpha Unusually high rate point to point byte transfer Number of packets and volume Scan Scanning a host for a vulnerable port (port scan) Scanning the network for a target port (network scan) Incoming flows to a host:port Incoming flows to a port number Examples
  • 4. Deep packet inspection • scalability problem in terms of computational and storage capacity Anomaly detection Flow aggregation techniques • merge multiple flow records with similar properties, and discarding benign flows • summarize IP flows to statistical metrics – reduce the amount of state and history information that is maintained • At IP flow level: computation and storage requirements for an online NIDS can still be prohibitively large 4
  • 5. • To reduce communication and storage overheads – By exploiting the organization of the IP space to Autonomous Systems (ASes) • To detect large-scale network threats that create substantial deviations in network activity compared with benign network conditions Our Goals 5
  • 6. 6 AS level anomalies at a monitored network
  • 8. 8 – IP-to-AS Flow Translation Aggregate IP flows to AS flows Each AS flow: - Number of IP flows - Number of IP packets - Volume (Bytes) 1
  • 9. 9 – IP-to-AS Flow Translation Aggregate IP flows to AS flows Each AS flow: - Number of IP flows - Number of IP packets - Volume (Bytes) 1b Source IPA:Port → Destination IPT:Port Source IPC:Port → Destination IPT:Port Source IPB:Port → Destination IPT:Port Source IPD:Port → Destination IPT:Port Source IPE:Port → Destination IPT:Port Source IPF:Port → Destination IPT:Port ASX → AST ASY → AST ASZ → AST
  • 10. 10 – Metrics for data aggregation Different anomalies affect different network flow parameters During aggregation period A: 1. Packet count (N): number of packets associated with the AS flow 2. Traffic volume (V): traffic volume associated with the AS flow 3. IP Flow count (IP): number of IP flows associated with the AS flow 4. AS Flow count (F): The number of AS flows that are active .Flows from spoofed IP addresses (network/16) are aggregated as a flow from Fake AS nodes .Flows from ASes not contacted before could be an anomalous event 2
  • 11. 11 – Data aggregation Training Phase: intervals I1,...,Im. Traffic for each of the m intervals is represented by the same model. Online Phase: traffic model for the online phase is computed over an epoch, which is shorter than an interval. Collect k samples for each metric using the aggregate values over k aggregation periods 2b
  • 12. 12 – Statistical Analysis For every AS flow, and every metric: 3
  • 13. 13 – Statistical Analysis pmf X D Training data Real-time data where (KL(P,Q) if the Kullback-Liebler divergence 𝐾𝐿 𝑃, 𝑄 = 𝑝𝑖 × log 𝑝𝑖 𝑞𝑖 𝑘 𝑖=1 Jeffrey distance Λ 𝑃, 𝑄 = 1 2 (𝐾𝐿 𝑃, 𝑄 + 𝐾𝐿 𝑄, 𝑃 ) Measure statistical divergence 3b
  • 14. 14 – Statistical Analysis Distances are normalized to ensure equal distance scales when multiple metrics are combined to one 𝐽 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀) = Λ 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀) Λ 𝑃𝑖,𝑗 𝑀 , 𝑄𝑗 (𝑀) 95𝑡ℎ Value that fall in the 95th percentile of historical distance for metric i accumulated over moving window W 3c
  • 15. 15 – Composite Metrics To capture the multi-dimensional nature of network behaviors, composite metrics combine several basic metrics 4 Weights could be adjusted to favor a subset of metrics, depending on the nature of the anomaly to be detected. 𝑪𝒊 = 𝑮𝒊 𝑱 𝑵 , 𝑱 𝑽 , 𝑱 𝑰𝑷 , 𝑱 𝑭 weighting formula among the different metrics Foreach Epoch Ci > Threshold? Alert abnormal behavior
  • 16. 16 - Training data update Moving window mechanism for maintaining the training data 5 D(E,W) < Threshold Update
  • 17. 17 Case study MIT LLS DDOS 1.0 intrusion dataset which simulates several DoS attacks and background traffic. Anomaly in AS A
  • 18. 18 Anomaly in AS B Anomaly in AS C
  • 19. 19 Volumetric analysis – no AS distinction
  • 20. Example of use with IMap Fowler, J; Johnson, T; Simonetto,P; Lazos, P; Kobourov, S.; Schneider, M. and Acedo, C. IMap: Visualizing Network Activity over Internet Maps, Vizsec 2014. Anomaly scores per AS 20
  • 21. Conclusions & Future work  NIDS based on AS flow aggregates. • Reduction in storage and computation overhead  Basic network anomaly detection metrics are adapted to the AS domain  Composite metrics of network activity combine several basic metrics  New basic metric that counts the number of AS flows for detecting anomalous events 21 Work supported by Office of Naval Research under Contract N00014-11-D-0033/0002 Formal study on composite metrics targeting known anomalies