0% found this document useful (0 votes)
21 views25 pages

Cips 2012 0023

The document discusses network traffic analysis, which involves capturing and inspecting network traffic to understand communication patterns and detect anomalies. It covers various analysis approaches, including active and passive methods, and emphasizes the importance of tools for monitoring and analyzing traffic. Additionally, it outlines security analysis techniques, flow technologies, and the role of system and application logs in detecting intrusions and conducting forensic analysis.

Uploaded by

Krishnendu Rarhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views25 pages

Cips 2012 0023

The document discusses network traffic analysis, which involves capturing and inspecting network traffic to understand communication patterns and detect anomalies. It covers various analysis approaches, including active and passive methods, and emphasizes the importance of tools for monitoring and analyzing traffic. Additionally, it outlines security analysis techniques, flow technologies, and the role of system and application logs in detecting intrusions and conducting forensic analysis.

Uploaded by

Krishnendu Rarhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Network Traffic Analysis

Mohd Akram Khan, GCIH

Scientist ‘B’
Network Traffic Analysis
• The process of capturing network traffic information and
inspecting it closely to determine communication patterns
and network activities

2
Network Traffic Analysis

• Network monitoring
• Network planning, Performance analysis
and improvement
• Security analysis
– Detect any anomalous traffic

3
Traffic
• Packet
– Header + Payload

– Header
• TCP/UDP, IP Header

– Payload
• Application Layer Data

• Logs
– System
– Application

4
Traffic Analysis Approaches
• Active – relies upon data gathered from probe packets
injected into the network.
– E.g. SNMP based

• Passive – relies upon data gathered from active network


traffic.
– Network Header Based Analysis
• E.g. Netflow based

– Deep Packet Inspection


• E.g. capture Header + Payload

5
SNMP Based Traffic Analysis
• Multi-Router Traffic Grapher (MRTG)
– Is a tool for monitoring traffic loads on a network link.
MRTG generates HTML pages that provide a live,
visual representation of the network traffic.
– It can be used to monitor any SNMP MIB.

Max Average Current


In 4480.3 Mb/s 3042.4 Mb/s 1800.3 Mb/s
Out 4804.3 Mb/s 3046.5 Mb/s 1808.9 Mb/s

6
Network Header Based Analysis
Each packet can be examined for a set of IP packet attributes.
These attributes are the IP packet identity or fingerprint of the
packet and determine if the packet is unique or similar to other
packets.

Some of the most important attributes of a TCP/IP packet:


– The protocol records the following attributes of a TCP/IP packet:
– Source address, i.e. the origin
– Destination address, i.e. the destination
– Source port, i.e. the application
– Destination port, the application
– Layer 3 protocol type
– Type of service, i.e. priority of the traffic

7
Network Header Based Analysis
Protocol Based Traffic Analysis
• Identify the traffic distribution based on different protocols
• Application based
– HTTP
– SMTP
– DNS
• Transport Protocol based
– TCP
– UDP

Application Based Traffic Analysis


• Different application traffic have different pattern
• Web , DNS, FTP , P2P
• Conventional methods uses port numbers in packet header to identify
the application
• - Eg : por t 80 for HTTP, 25 for SMTP etc
8
Network Header Based Analysis
Host Based Traffic Analysis
• Identify the distribution traffic based on IP address
• More useful for detailed understanding of the Host behavior
• Traffic pattern of critical hosts like web server, mail server and DNS
server are important
• Useful for detecting abnormal behaviour of a worm, botnet , malware a
ected host

Security Analysis
• Signature Based
– Patterns of known attacks

• Anomaly Based
– Based on the unusual behavior on a network , host , application etc.
– Flood based attacks, Scanning etc.
9
Network Flow
Flow is a unidirectional series of IP packets of a
given protocol traveling between a source and a
destination (IP, port) pair within a certain period of
time.
– Aggregate information from different packets in to a flow
– Different levels of analysis can be possible
– Compared to packet based analysis , volume of data is
very less
– Suitable for high speed traffic analysis

10
Flow Technologies
• Different vendor specific flow definitions and
exporting mechanisms are available
– Netflow from Cisco
– Sflow from Inmon
– Jflow from Juniper
– NetStream from Huawei
– Cflowd from Alcatel-Lucent

11
Flow Record
Source Port Destination Port Version IHL Type of Service Total Length

Fragment
Sequence Number Identification Flags
Offset

Acknowledgement Number Time to Live Protocol Header Checksum

Data
Offset
Reserved U A P R S F Window Source Address

Destination Address
TCP header
Options Padding

Source Port Destination Port

Length Checksum IP header

UDP header

Source Address

Destination Address

Source Port Destination Port IP header Parameters


Protocol TOS Other aggregated values TCP/UDP header
Parameters
Flow Record 12
Network Traffic Flow Collection

Flow Exports
to central
Server

ISP
Flow Collector

Flow Enabled NetFlow


Device
Analyzer

Netflow Anlaysis
Storage

Flow Packets

13
Network Traffic Flow Analysis
The network traffic flow data could be used for
studying network behaviour, security anomalies and
vulnerabilities in a network as given below:

• Rate-Based Anomaly Detection


• Behavioral Anomaly Detection
• Fingerprint Detection
– Malicious Code Detection

14
Rate-Based Anomaly Detection
• Baseline Traffic
– Normal pattern of traffic in the network
– Maximum and Minimum traffic
– Traffic volumes for different applications
• at different points in the network
• across a span of time to detect a security event

• Distributed Denial-of-Service (DDoS) / Denial-of-


Service (DoS) attacks.

15
Behavioral Anomaly Detection
• Relationships among hosts on the network
– to pinpoint security threats that may blossom in a very short
period of time. e.g. a worm, spyware or some other malicious
behavior.

• Anomalous traffic
– any deviation from the normal traffic pattern which can occur due
to different attacks
– attacks which are not detected by signature based detection
techniques

• Inappropriate Usage
– Free data/one click hosting site access
– Remote Desktop Access

16
Fingerprint Detection

• Identifies any traffic that violates a behavioral fingerprint, e.g.


– Malware
– inappropriate usage & policy violations
– Network Scans
• low scans, fast scans, “stealth” scans and host sweeps.

17
Network Traffic Flow Analysis

Network Traffic Flow Analysis

18
Tools
• NTOP
– (http://www.ntop.org/netflow.html)
• NfSen and NFDUMP
– (http://nfdump.sourceforge.net/)
– (http://nfsen.sourceforge.net/)
• SiLk (System for Internet Level Knowledge) tool kit
– (http://silktools.sourceforge.net/)
• Flow-Tools and FlowScan
– (http://www.splintered.net/sw/flow-tools/)
– (http://net.doit.wisc.edu/~plonka/FlowScan/)
• NetSA Aggregated Flow toolchain
– (http://aircert.sourceforge.net/naf/)

• Scrutinizer
• Cisco Anomaly Detector
• Arbor PeakFlow SP CP 19
Inline Monitoring
• Capturing the full packet
– Real time analysis
– Storing it for forensics
– Extracting only the metadata
• for historical analysis

• Detection of Threats/Scans at all levels (Including Application Level


threats e.g. “buffer overflow” attacks etc)
• Detection of Malicious code threats within the network
• Analysis of Malicious code behavior
• Forensic analysis of detected threats

• Methods:
– Port spanning (i.e. mirroring) of the uplink of the switch to another
interface so that the packet capture device can see the traffic.
– In-line appliance to capture/forward the traffic onto multiple 20
destinations. e.g. Network Tap etc.
Inline Monitoring: Port Spanning

Switch Spanning
Port

Packet
Analyzer

Storage

Network

21
Inline Monitoring: Network Tap

Switch
Network Tap

Packet
Analyzer Network

Storage

22
Tools
• TCPDump
• NetworkMiner
• Wireshark
• Niksun*
• Netwitness*
• Riverbed*

23
System/Application Logs
• Log contains critical event level information and can be used for
– Detecting exploitation and intrusion attempts, e.g. scanning/probing or exploitation attempts,
failed login attempts, data theft etc.
– Forensic analysis of the incidents

• System Logs
– System logs contain the local event logged by the system or host, e.g.
– Windows event logs ( Application Logs, Security Logs, System Logs)
– Linux system logs (usually contained in /var/log, and can be centralized using syslog)

• Application Logs
– Logs of individual server applications e.g.
– Web Server Logs (IIS, Apache)
– Mail Server Logs
– FTP Server Logs
– Database Server Logs (Oracle, SQL Server, MySQL etc.)

• Tools
– LogParser, Sawmill, Webalizer, Notepad etc.

24
Thank You

25

You might also like