Internet Traffic Monitoring and Analysis : Methods and Applications

Download Report

Transcript Internet Traffic Monitoring and Analysis : Methods and Applications

5. Passive Monitoring Techniques
Internet Traffic Monitoring and Analysis:
Methods and Applications
(1)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Packet Capturing
Probe system
Probe system
Mirroring
Splitting
 Packets can be captured using Port Mirroring or Network Splitter (Tap)
How it works
Advantage
Disadvantage
Port Mirroring
Network Splitter
- Copies all packets
passing on a port to
another port
- No extra hardware
required
- Processing overhead
on router/switch
- Splits the signal and send
a signal to original path
and another to probe
- No processing overhead
on router/switch
- Splitter hardware required
Internet Traffic Monitoring and Analysis:
Methods and Applications
(2)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Packet Capturing
 Difficulties in packet capturing
 Massive amount of data
 How much packet data is generated from 100 Mbps network in an hour?
 Port speed ⅹIn&Out ⅹLink Utilization ⅹ sec/hour = throughput
100 Mbps ⅹ 2 ⅹ
0.5
ⅹ 3600
= 360 Gbps
 Throughput / avg. packet lengthⅹ bytes of packet data = data size
360 Gbps / (1500 ⅹ 8) ⅹ
30
= 1 Gbyte
 Processing of high-speed packets
 Processing time for 100 Mbps network
Port speed ⅹ In&Out ⅹ Link Utilization / average packet length
= 8333 packets/sec => 0.12 msec/packet
100 Mbps
1 Gbps
1 Tbps
Data size per hour (assume 0.5 link util) 1 Gbyte
10 Gbyte
10 Tbyte
Processing Time per packet
0.012 msec
0.012 μsec
Internet Traffic Monitoring and Analysis:
Methods and Applications
0.12 msec
(3)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Sampling
 If the rate is too high to capture all packets reliably, there is
no alternative but to sample the packets
 Sampling algorithms: every Nth packet or fixed time interval
1
2
3
4
5
6
7
8
9
10
11
(a) 2:1 sampling
0 msec
1 msec
2 msec
3 msec
4 msec
(b) 1 msec sampling
Internet Traffic Monitoring and Analysis:
Methods and Applications
(4)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Generation
flow 1
flow 2
flow 3
flow 4
 Flow is a collection of packets with the same {SRC and DST IP address,
SRC and DST port number, protocol number, TOS}
 Flow data can be collected from routers directly, or standalone flow
generator having packet capturing capability
 Popular flow formats
 NetFlow (Cisco), sFlow (sFlow.org), IPFIX (IETF)
 Issues in flow generation




What information should be included in a flow data?
How to generate flow data from raw packet information efficiently?
How to save bulk flow data into DB or binary file in a collector?
How long should the data be preserved?
Internet Traffic Monitoring and Analysis:
Methods and Applications
(5)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: NetFlow
 Cisco NetFlow
 is an option configurable in Cisco routers that exports data on
each IP flow passed through an interface
 Cisco IOS NetFlow technology
 is an integral part of Cisco IOS software that collects and
measures data as it enters specific routers or switch interfaces
 enables to perform IP traffic flow analysis without custom probes
 3 key components in a NetFlow system
 Flow Exporter
 Flow Collector
 Network Data Analyzer (Flow Analyzer)
Internet Traffic Monitoring and Analysis:
Methods and Applications
(6)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: NetFlow
 NetFlow Export Datagram
Header
· Sequence number
· Record count
· Version number
Flow
Record
Flow
Record
Flow
Record
Flow
Record
Flow
Record
 Version 1, Version 5, Version 7, Version 8
 Version 1: original format supported in the initial Cisco IOS
software releases.
 Version 5:
Usage
• Packet Count
• Byte Count
• Source IP Address
• Destination IP Address
Time
of Day
• Start Timestamp
• End Timestamp
• Source TCP/UDP Port
• Destination TCP/UDP Port
From/To
Application
Port
Utilization
QoS
Internet Traffic Monitoring and Analysis:
Methods and Applications
• Input Interface Port
• Output Interface Port
• Type of Service
• TCP Flags
• Protocol
(7)
•
•
•
•
•
Next Hop Address
Source AS Number
Dest. AS Number
Source Prefix Mask
Dest. Prefix Mask
Routing
and
Peering
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: NetFlow
 Version 7
 Enhancement that supports Cisco Catalyst 5000 Series switches
equipped with NetFlow Feature Card (NFFC).
 Version 8
 developed mainly to MINIMIZE output size from exporter by
adding Router-Based Aggregation schemes
type UDP datagram
ASMatrix
ProtocolPortMatrix
SourcePrefixMatrix
DestPrefixMatrix
PrefixMatrix
records/datagram
51
51
44
44
35
max udp pktsize
1456
1456
1436
1436
1428
 available on Cisco routers from IOS release 12.0(3)T
Internet Traffic Monitoring and Analysis:
Methods and Applications
(8)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: sFlow
 sFlow is described in RFC 3176: “InMon Corporation's
sFlow: A Method for Monitoring Traffic in Switched and
Routed Networks”
 sFlow is a monitoring technology that gives visibility into
the use of networks, enabling performance optimization,
accounting/billing for usage, and defense against security
threats
 sFlow provides an effective means of embedding traffic
monitoring in high-speed switches and routers
 sFlow samples packets using statistical sampling theory
Internet Traffic Monitoring and Analysis:
Methods and Applications
(9)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: sFlow
 sFlow Datagram Format
 is specified using the XDR standard
 XDR is a standard for the description and encoding of data.
(eXternal Data Representation Standard, RFC1014)
 version 4
 Packet Header Data
 Header Protocol (Format of sampled header)
 Frame_length
 Header bytes
 Packet IP v4 Data






 Packet IP v6 Data






Length
Protocol (IP Protocol Type)
src_ip / dst_ip
src_port / dst_port
TCP flags
tos
Internet Traffic Monitoring and Analysis:
Methods and Applications
(10)
Length
IP next Header
src_ip / dst_ip
src_port / dst_port
TCP flags
IP priority
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: sFlow
 Equipment Supporting sFlow
 Foundry Networks
 BigIron, FastIron, NetIron Series
 InMon’s sFlow Probe
 By attaching to a monitor/SPAN
port
 Gathers mirrored or tapped (using
a splitter) traffic data
 The resulting data is forwarded in
sFlow datagrams to a central sFlow
collector (for example InMon Traffic
Server) for analysis.
Source: InMon
Internet Traffic Monitoring and Analysis:
Methods and Applications
(11)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: IPFIX
 IPFIX (IP Flow Information eXport) Working Group
 http://www.ietf.org/html.charters/ipfix-charter.html
 Background
 There are a number of IP flow export systems in
common use
 These systems differ significantly, even though some
have adopted a common transport mechanism
 such differences make it difficult to develop generalized
flow analysis tools
 Goal
 To produce a standard method for exporting flow info
from network devices, as an eventual replacement for
the various proprietary methods in use now
Internet Traffic Monitoring and Analysis:
Methods and Applications
(12)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Flow Technology: IPFIX
 IPFIX Internet Drafts
 Requirements for IP Flow Information Export
 J. Quittek et al., Jan 2003 (work in progress)
 Architecture Model for IP Flow Information Export
 K.C. Norseth, G. Sadasivan, June 2002 (work in progress)
 Early stage of work….
Internet Traffic Monitoring and Analysis:
Methods and Applications
(13)
POSTECH
DP&NM Lab.
5. Passive Monitoring - Traffic Analysis
 Spatial aspect




The patterns of traffic flow relative to the network topology
Important for proper network design and planning
Identification of bottleneck & avoidance of congestion
Example: Flow aggregation by src, dst IP address or AS number
 Temporal aspect
 The stochastic behavior of a traffic flow, usually described in
statistical terms
 Important for resource management and traffic control
 Important for traffic shaping and caching policies
 Example: Packet or byte per hour, day, week, month
 Composition of traffic
 A breakdown of traffic according to the contents, application,
packet length, flow duration
 Helps to explain its temporal and spatial characteristics
 Example: game, streaming media traffic for a week from peer ISP
Internet Traffic Monitoring and Analysis:
Methods and Applications
(14)
POSTECH
DP&NM Lab.