Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Is Sampled Data Sufficient for Anomaly Detection Ip Wing Chung Peter (05133660) Ngan Sze Chung (05928650) Abstract Traffic Measurement in Network is important Network management Anomaly detection for security analysis Detect all packet trace? The most accurate Consume network resources Affect normal traffic Sampling a point-to-point link Router A Router B Monitor Abstract Sampling Technique Conserve network resources How many samples? Sampling techniques vs Anomalies detection algorithm Abstract Introduction Background and Methods Impact of Sampling on Volume Anomaly Detection Impact of Sampling on Portscan Detection Conclusion and Future Work Introduction Aim To study the impact of sampling on anomaly detection Objective To study 4 existing sampling techniques To study 3 common anomaly detection algorithm To simulate the result by inputting the sampled data to detect the anomalies To evaluate the impact of sampling on anomaly detection algorithm Background and Methods Sampling Volume Anomaly Detection Portscan Detection Trace Data Methodology Sampling Random packet sampling Sample a packet with a small probability r < 1 Classify sampled packets into flows based on source/destination, IP/port, protocol Flow terminated by timeout (1 min), or explicit TCP semantics (FIN) Sampling Random packet sampling Simple to implement Low CPU power and memory requirement Inaccurate for flow statistic Sampling Random flow sampling Sample a flow with a small probability p < 1 Improve accuracy for flow statistic Classifies packet into flows first Prohibitive memory and CPU power Sampling Where z is a threshold that trades off accuracy Smart sampling Sample a flow of size x with a probability p(x) Determined by threshold z (e.g. z = 40000) Bias towards large flows Flow Flow Flow Flow Flow Flow 1, 2, 3, 4, 5, 6, 40 bytes 15580 bytes 8196 bytes 5350789 bytes 532 bytes 4000 bytes sample with 0.1% probability sample with 100% probability sample with 10% probability Sampling Sample-and-hold (S&H) Sampling Sample-and-hold (S&H) Flow table lookup If found, flow entry gets updated by all the subsequent packets once it is created in S&H table If not found, flow entry created with a probability p (e.g. p = 1/3 on previous case) Sampling biased toward “elephant” flows Volume Anomaly Detection Detect Network traffic anomalies (e.g. DoS attack) Abrupt changes in packet or flow count measurements Induces volume anomalies Discrete wavelet transform (DWT) based detection Proved to be effective at detecting volume anomalies DWT-Based Detection Applies wavelet decomposition on packet or flow time series Detect volume change at various time scale 3 steps Decomposition Re-synthesis Detection DWT-Based Detection Decomposition Decompose original signal to identify changes DWT calculate wavelet coefficient low pass filter original signal high pass filter DWT-Based Detection Re-synthesis Aggregated into high, mid and low bands Low-band signal slow-varying trends High-band signal highlight sudden variations Mid-band sum of the rest DWT-Based Detection Detection Compute variance of high and mid-band signals over a time interval local variance Deviation score = global variance If deviation score is higher than a predefined threshold are marked as volume anomalies Portscan Dectection 2 online portscan detection techniques Threshold Random Walk (TRW) Time Access Pattern Scheme (TAPS) Threshold Random Walk (TRW) 2 Hypothesis H0: a source is a “normal” host H1: a source is a scanner Rationale: A normal host is far more likely to have successful connection than a scanner which randomly probes address space. Threshold Random Walk (TRW) Hypotheses testing on sequence of events To determine which hypothesis is more likely let Y = {Y1, Y2, . . . , Yi} represent the random vector of connections observed from a source, where Yi = 0 if the ith connection is successful and Yi = 1 otherwise Threshold Random Walk (TRW) Likelihood Ratio: When the Likelihood Ratio crosses either one of two predefined thresholds, the corresponding hypothesis is selected as the most likely. requires ~6 observed events to detect scanners successfully Threshold Random Walk (TRW) TRWSYN - backbone adaptation of TRW Backbone traffic usually uni-directional Difficult to predict “failed” / “succeeded” connection TRWSYN oracle: Marks single SYN-packet flows as failed connection Detect TCP portscan ONLY Time Access Pattern Scheme (TAPS) Access Pattern Observation: Scanner initiates connections to a larger spread of destination IP addresses (horizontal scan) port numbers (vertical scan) That means, ratio γ between distinct IP addresses and port number is larger for scanner. Time Access Pattern Scheme (TAPS) Hypotheses test, similar to TRW. Single packet flow failed connection Each time bin (say i), for each source, compute ratio γ, compare with predefine threshold k. Event variable Yi = 0 if γ<k 1 if γ>=k Update Likelihood Ratio Trace Data 2 Links in Tier-1 ISP’s Backbone network 2 OC-48 links between backbone routers on West Coast and East Coast BB-West: Large percentage of scanning traffic BB-East: Large Volume Collected by IPMON Methodology 4 sampling schemes use different parameters Require common metric for fair comparison We choose: Percentage of sampled flows Different in: Memory requirement CPU utilization Methodology Note: Although fixed percentage of sampled flows Smart sampling & Sample-and-Hold bias towards Large flows Impact of Sampling on Volume Anomaly Detection Volume Anomaly Detection Result Feature Variation Due to Sampling Detection from the original trace Total 21 abrupt changes from original trace No. of detection ↓ as sampling interval ↑ Random flow sampling performs the best Smart sampling & Sample-and-hold drops much faster No false positive in detection Feature Variation Due to Sampling Difference in performance on detection Most volume spikes caused by a sudden increase in small packet flows Random flow sampling is unbiased by flow size Others are biased by large flows Smart sampling and Sample-and-hold designed to track heavy hitters Poor performance compare to packet sampling Feature Variation Due to Sampling No false positives Simply, spike in samples must have existed in the original trace Not an artifact of sampling Sampling only ↓ no. of detection and not cause any false detection Feature Variation Due to Sampling No. of detection ↓ as sampling interval ↑ even in random flow sampling Success Technique based on no. of sampled event and local variance Hypothesize sampling introduces distortion in variance Fail Feature Variation Due to Sampling Sampling introduce distortion in variance Sampling scale down original time series by a fraction of p Assume variance = and average rate = New scaled-down variance Sampling involves removal of discrete point Binomial i.e. Sample original point process random var. binomially Total variance Feature Variation Due to Sampling Total variance scaled-down variance removal of discrete pt. > 70% when N = 500 Affect Detection ! Impact of Sampling on Portscan Dectection Metrics Desirable to have HIGH Rs and LOW Rf+ Focus on Success and False Positive Ratio (because Rs+Rf-=1) Impact of Sampling on Portscan Dectection Challenge: Determine true scanners Final list of scanners manually generated by Sridharan (in Impact of Packet Sampling on Portscan Detection) as the ground truth Less interested in absolute accuracy Relative performance as a function of sampling scheme and sampling rate TRWSYN under Sampling Rs and Rf+ ratios for the BB-West trace as functions of effective sampling interval for all four sampling schemes TRWSYN under Sampling Random Packet Sampling As base case for comparison Success Ratio Rs Initially increases slightly for small N (seems advantageous) Drop off for Large N TRWSYN under Sampling Random Packet Sampling As base case for comparison False Positive Ratio Rf+ Follows similar behaviour as Rs but Larger scale Increases 3 times when N from 1 to 10 TRWSYN under Sampling 2 key effects of packet sampling Flow-reduction Number of flows observed reduced Flow-shortening Multi-packet flows reduced to single packet flows Recall: TRWSYN algorithm Single SYN packet flow connection failure potential scanner TRWSYN under Sampling Small sampling interval Flow-reduction slight impact High Rs Flow-shortening substantial impact ↑single packet flow Impact: Scanners’ multi-packet flows initially missed shortened Detected Increase Rs Regular multi-packet flows shortened “Detected” Increase Rf+ TRWSYN under Sampling Large sampling interval Flow-reduction dominates Fewer decisions (detections) Rs and Rf+ decrease TRWSYN under Sampling 3 Flow sampling schemes Decision based on entire flow No Flow-shortening Flow- Reduction dominates the impact Exception: Sample-and-Hold Mid-Flow-Shortening Decision only made on SYN packet flows Introduce NO False Positive TRWSYN under Sampling Both Rs and Rf+ decrease almost monotonically as N increases Rf+ lower than packet sampling TRWSYN under Sampling In terms of Rf+ Flow sampling >> Packet sampling In terms of Rs, Random Flow Sampling > Random Packet Sampling > Smart Sampling > Sample-andHold Cause: Bias towards Large Flows Suffer more from Flow-reduction TAPS under Sampling Critical parameter: Time Bin For each sampling scheme, each sampling rate, Use Optimal Time Bin Maximize Rs Increasing function of sampling interval True for both Packet sampling and Flow sampling schemes TAPS under Sampling Results of portscan detection with TAPS for Trace BB-West TAPS under Sampling Rs decreases as sampling interval increases Random Flow Sampling performs the best Random Packet Sampling performs as well as the remaining 2 Flow sampling schemes Cause: Bias towards Large Flows Tend to miss small (critical) flows TAPS under Sampling Random Packet Sampling Rf+ intially increases Then drop off at large sampling interval due to Flow-shortening due to Flow-reduction Flow Sampling schemes No/Minor Flow-shortening Low Rf+ Monotonically decreases with sampling interval TAPS under Sampling TAPS uses address range distribution for detection Insensitive to the 4 schemes No distortion introduced Low Rf+ e.g. Random Packet Sampling yields 1/10 of Rf+ by TRWSYN Conclusion Random Flow Sampling Random Packet Sampling Performs the best Prohibitive resource requirement Suffers from Flow-shortening Smart Sampling & Sample-and-Hold Bias towards large flows Perform poorer than Random Packet Sampling in volume anomaly detection Conclusion All 4 sampling schemes Degrade all 3 anomaly detection algorithms In terms of Rs and Rf+ Sampled Data Sufficient for Anomaly Detection? Remains an Open Question