Allot Communications - company presentation

Download Report

Transcript Allot Communications - company presentation

Digging Deeper Into DPI
Network Visibility & Service Management
Jay Klein
May 2007
Outline
 Origins of the Problem
 Complexity
 DPI for Security vs. DPI for Application Control
 DPI - Glance through the basics
2
20 July 2015
Market Trends and Drivers: Bandwidth
 Broadband becoming ubiquitous
 High penetration rates (over 50% in
Korea, Taiwan, Holland and Canada)
 Over 50% of on-line households are BB
 Telcos are upgrading infrastructure:
 ADSL2+ (20-25Mbps)
 VDSL2 (20-30Mbps)
 FTTx
 Bandwidth per user is ramping up:
 BW expected to reach 20M by 2010
(source: IDC,2006)
3
20 July 2015
More
Bandwidth
More
Applications
Market Trends and Drivers: Applications
P2P
VoIP
Ents.
Online
Gaming
 Continue to be highly popular
 Average of 40-60% of overall BW
 More applications use encryption
 BitTorrent, eMule, Ares
 Content providers seem to adopt P2P
 Warner Bros to sell films via BitTorrent
 Scalability
4
20 July 2015
More
Bandwidth
More
Applications
Market Trends and Drivers: Applications
P2P
VoIP
Ents.
Online
Gaming
 Numerous Internet VoIP providers:
 Skype, Vonage, GoogleTalk,
Yahoo!Voice, Net2Phone
 VoBB subscribers increased rapidly in
2005/6
 More SPs offer Voice & Data services
bundled together
5
20 July 2015
More
Bandwidth
More
Applications
Market Trends and Drivers: Applications
P2P
VoIP
Ents.
Online
Gaming
 Usage of streaming applications
increasing dramatically
 YouTube – 100M videos/day
 Numerous new Web-TV services
launched
 BBC, In2TV etc.
 Skype to launch Venice Project – a Web
TV service
 Telcos launching IPTV services: Pay-TV
and VOD
 More than just a service differentiator
6
20 July 2015
More
Bandwidth
More
Applications
Market Trends and Drivers: Applications
P2P
VoIP
Ents.
Online
Gaming
 Consoles & PC offer “over the network”
gaming experience
 Stringent Bandwidth & Latency
requirements
7
20 July 2015
More
Bandwidth
More
Applications
The Complexity
 Numerous Applications - Many Protocols
 Same Application – Different Implementations
 Bittorrent has more than 30 different client implementations
 IM or VoIP may deliver the same experience but don’t use
similar protocols
 Evolving Architectures
 Skype evolved from Kazaa maintaining more or less the
network topology
 Joost (Venice Project) has just done the same
8
20 July 2015
The Complexity
 Mixture of Technologies, Diverse deployment scenarios
 Various Clients: PC, Smartphone, Gaming Console
 Client’s network surroundings: Firewall/NAT, Proxy
 Monitor or Traffic Shape
 Symmetric vs. Asymmetric
 Frequent Updates
 Can vary from twice a year to every month
 Easy to enforce upgrade policy with quick reaction time
 Typically will affect protocol format
9
20 July 2015
The Complexity
 Use of Encryption (Obfuscation)
 Primarily designed for counter measuring operator’s
throttling and monitoring efforts (eMule, Bittorrent)
 In some cases protect proprietary implementation
(Skype)
 Cannot generalize - Need to differentiate use
 “Good” (legit streaming, SW updates) vs. “Bad” (pirated
file sharing) P2P
 Need to recognize application subtleties for proper actions
 Example: MSN IM – block VoIP & Streaming, allow Chat
10
20 July 2015
DPI – Application Space vs. Security Space
 Comparable in the sense of “Deep”, “Packet” & “Inspection”
 Different Core Competence
 Similar tools yet different know-how
 Some “gray area” in the middle (e.g., basic DDoS)
 When DPI aimed at applications
 Applications = Services, typically “invited” by Operator, Enduser or both
 When DPI is aimed at security risks
 Risks = Weaknesses in Network & OS behavior
 Need to deal with hostile “applications”, “services”
11
20 July 2015
DPI – Application Space vs. Security Space
 DPI for Security - Inspects L3/4 and complements with L7
info if required
 DPI for Security often samples the data stream, indicates on
a trend & recommends on action
 When DPI is aimed at applications, starts at L7 , track & learn
the specific service
 DPI for Applications must examine each connection and
accurately identify & classify for any action beyond
monitoring
12
20 July 2015
Packet Inspection
 Analyze encapsulated content in packet’s header
and payload
 Content may be spread over many packets
 Different research and analysis tools are combined
 The end result – a library of “signatures”
 For each protocol/application a “Unique”
Fingerprint set is found
 Signatures may change over time
13
20 July 2015
False Positives
 The likelihood that application connections are
caught by signatures of other applications
 Some traffic is misidentified / misclassified
 Signatures are too weak
 Reason: Different protocols exhibit similar
behavior or data patterns
 Strengthen signature by combing several
techniques leading to a complex & robust
signature
 Target 0% FP for controlling purposes
14
20 July 2015
False Negatives
 The likelihood that application connections are not
caught by their designated signatures
 End result – some portion of the suspected
application traffic is not detected
 Why? Signatures don’t cover all protocol
occurrences
 Examples:
 IM = Chat, Streaming, Gaming, VoIP…
 Environment – Proxy, NAT
15
20 July 2015
Analysis by Port
 Reasoning:
 Many applications and protocols use a default
port
 Example: email
 Incoming POP3: 110 (995 if using SSL)
 Outgoing SMTP: 25
 The Good - It’s easy, The Bad - It’s too easy
 Many applications disguise themselves (e.g.,
Port 80)
 Port hopping  large range, overlapping apps
18
20 July 2015
Analysis by String Match
 Reasoning:
 Many applications have pure textual identifiers
 Easy to search for
 Very easy if in a specific location within a packet
 Uniqueness not always guaranteed
19
20 July 2015
String Match Example
20
20 July 2015
Analysis by Numerical Properties
 Property is not only content:
 Packet size
 Payload/message length
 Position within packet
 In some cases sparse and spread over several
packets
21
20 July 2015
Example: Sparse Match
Identifying John Doe Protocol
22
Connection #1
35
8A
27
7F
Connection #2
15
82
98
71
Connection #3
A5
80
72
7F
Connection #4
95
88
8A
7F
20 July 2015
Skype (Older Versions): Finding a TCP Connection
Client
UDP Messages
N+8
18 byte message
Evolution
11 byte message
N+8+5
23 byte message
Either 18, 51 or 53 byte message
23
20 July 2015
Server
Behavior and Heuristic Analysis
 Behavior = the way in which something functions or
operates
 Heuristic = problem-solving by experimental and
especially trial-and-error methods
 OK, but what does this mean? Examples:
 Statistics: on average payload size is between X to Y
 Actions: Login using TCP connection followed by a
UDP connection on subsequent port number
 Extremely effective analysis when application uses
encryption
24
20 July 2015
Example: HTTP vs. BitTorrent (Handshake)
25
20 July 2015
DPI in Real Life
 Network Visibility – The key for understanding how
bandwidth is utilized
 Which application?
 Which user?
 When? Where?
 Traffic Management (Application Control)
 Block
 Shape (limit, QoS, QoE)
 Service Management (Subscriber Control)
 Associate connection (IP X.Y.Z.W) with a user and its
service use policy
26
20 July 2015
Example - What’s Happening On the Network?
P2P Virtual Channel
congested
Drill down to find out what’s
creating excessive traffic
Graph shows that
eDonkey is congesting
traffic
Drill down to find out who
is using this application
Heavy bandwidth user
identified precisely!
27
20 July 2015
Thank You
28
20 July 2015