NetSEC: metrology based-application for network security
Download
Report
Transcript NetSEC: metrology based-application for network security
NetSEC:
metrology-based application
for network security
Jean-François SCARIOT
Bernard MARTINET
Centre
Interuniversitaire
de Calcul de Grenoble
TNC 2002
June 2002
Plan
Metrology
NetSEC
Why, what & how?
Analyze
Goals
Architecture
Available tools
Conclusion
2
why to measure?
To know network usage
To know network availability
To detect dysfunction
To do cost sharing
Also… to improve security
3
What and how to measure?
Qualitative: knowing its network
I/O traffic load, CPU load, collision…
Watch the counters of the equipments
Quantitative: controlling its network
Traffic type, I/O traffic load per host or
group...
extract information from frame analysis
4
Measurement to supervise
Daily supervision (15’ is enough )
Curves or bar graphs
Always the same "look"
“To control and manage a network,
you must visualize its behaviour”
5
Highlighting a problem
A « normal » day
Monday April the 2nd 2001
May be some problems
Monday April the 9th 2001
6
Highlighting a problem
Unfortunately!
Problem discovery is a posteriori
We have to go back
And
analyze the traffic of the involved period.
7
Traffic analyzing
Locate the host(s)
Date, addresses, intrusion method, extend of
the damage…
HOW?
Doing crosschecking
Sorting metrology data on several parameters
Powerful sorting tools are needed!
8
NetSEC goals
To have an evolving software
To analyze “well-known” data
NetMET
IPtrafic
To support open standards
To improve the security of
networking computers
9
NetSEC foundations
Using a relational database
A simple network description
A modular architecture
Using an open source software
10
Open software
Linux system (Redhat)
MySQL database
Apache Web server
JAVA
11
About database
JDBC database access
Basic SQL queries
One loader per collector
12
DB structure
One table for one day (of data)
src@ & dst@
Date
Port & protocol
Volume
One table for the network description
13
Network description
A network
An organism
University Joseph Fourier
An entity
192.168.10.11/24
CICG
A location
Campus of Grenoble
14
Available tools
A data query module
A graphic generator module
A data mining module
15
Architecture
Query
Process
Collector
HTML
Requests
Query Engine
Collected
Data
SQL
Requests
Loader
DB
SQL
Requests
Graphic
Generation
Process
Graphic Generator Engine
Network
Description
SQL
Requests
KDD
Process
Knowledge Discovery
Database Engine
ALARMS
REPPORTS
16
The query tool
To use the SQL power
Sort
Query
Extract
Querying data with a friendly interface
17
Web interface (Question)
18
How does it work?
Parameters processing
JDBC driver loading & connection
Building and executing the SQL query
Displaying the results
19
Web interface (Answer)
20
Graphic generation
A zoom of a network on demand.
A supervision of a determined services
21
Graphic generation: HTTP
22
Functioning
Database system provides data
Querying database (with SQL queries)
Returning results to MRTG for displaying
MRTG Graphics building
23
Graphic generation: SSH
24
Data mining
Produce unknown information
non trivial
Useful
Produce association rules
A and B => C
25
Association rules process
Explanation
Association
Rules
Generation
Corn flakes and sugar milk
Association
rules
Large
Itemsets
Research
Data
Selection
Knowledge
Large
Itemsets
Set of
Transactions
Database
26
Association rule example
"] 14h-19h]"
AND
"SCAN/REGULAR_SERV"
AND
"[0-1KB]"
AND
53
"TUESDAY"
(14.8%, 90.4%)
27
Conclusion
A contribution to improve security
A metrology based-application
Built on a database
Open & Modular
Who would like to participate?
E-mail : [email protected]
28
TIGRE
29