Transcript Peakflow SP

Network Monitoring System In CSTNET
Long Chun
China Science & Technology Network
Agenda
1
Introduction of Peakflow SP
2
Basic Traffic Analysis
3
BGP Analysis Function
44
Role of Peakflow SP in Security Area
4
2
Peakflow SP Platform
Managed Services Device
 Customer facing DoS detection and mitigation
Converged Platform Device
 Infrastructure Security
 Traffic and Routing Analysis
Infrastructure Security
 DoS/worm detection
 Traceback
 Analysis
 Mitigation
Traffic and Routing
 Routing management
 Transit/peering mgmt
 Customer accounting
 Backbone mgmt
3
Peakflow Network Appliances
Measurement
 Collect Netflow, Cflow, Sflow, SNMP and optionally
BGP information from network routers/devices
 Collector – collect data from routers, baseline
traffic, detect anomalies.
 Controller –aggregate data from other devices;
create a central network-wide view
Intel 2U Servers
Deployment


Monitor up to 5 routers per Peakflow Device
Up to 15 devices managed by controller
Reporting


Reports available on controller through CLI or GUI
Notifications via email, snmp, or syslog
4
Netflow
Peakflow examines NetFlow packets that are generated by the router or
switch as traffic is forwarded. The NetFlow is analyzed to benchmark network
behavior and identify anomalies.
5
Topology
6
Agenda
1
Introduction of Peakflow SP
2
Basic Traffic Analysis
3
BGP Analysis Function
44
Role of Peakflow SP in Security Area
4
7
Traffic Analysis

Automatically Configured Analysis Objects:
-【Network】
-【Router】
-【Peer】
-【Interface】
No Complex Configuration

Objects Customized by User:
-【Customer】
-【Profile】
Flexibly customize objects we need
8
Traffic Analysis
User define objects:
-【Profile】
Include:
1、IP Address(or Block of IP Addresses)
2、AS Path Regular Expressions
3、Local AS/Sub AS
4、BGP community
5、Peer ASN
6、TCP/UDP port
7、 Interface
Boolean Operation:AND、OR、NOT
We can define analysis objects flexibly:




community '2:20'and not 92.2.1.0/25
aspath ‘^23849’ and not aspath ‘^23849_9800’
community ‘2:20’ and aspath ‘^4134’
9
Traffic Summary
10
Traffic Analysis Base on TCP/UDP Port (1)
11
Traffic Analysis Base on TCP/UDP Port(2)
12
Top Talkers
13
Agenda
1
Introduction of Peakflow SP
2
Basic Traffic Analysis
3
BGP Analysis Function
44
Role of Peakflow SP in Security Area
4
14
Transit Traffic
Analysis Object:【Network】 【Router】【Peer】
【Customer】【Profile】【Interface】
Operation:Network BGP Attribute ASxAS
15
Traffic Analysis Base on AS
16
Traffic Analysis Base on AS Path
17
Peering Evaluation and Visualization
18
Agenda
1
Introduction of Peakflow SP
2
Basic Traffic Analysis
3
BGP Analysis Function
44
Role of Peakflow SP in Security Area
4
19
Peakflow SP Anomaly Reporting

Profiled Anomalies – deviations from normal traffic levels
on the network

Misuse Anomalies – Traffic towards specific hosts that
exceed what should normally be seen on a network

Fingerprint/Worm Anomalies – Traffic that fits a user
specified signature
20
Detect Attack - Profiled Anomalies

Detects network-wide anomalies such as DDoS attacks and worm
outbreaks in non-intrusive data collection methods.

A baseline of normal
behavior leveraging
flow data available
from the routers
deployed on the
network would be built.
In real-time, the
system compares
traffic against the
baseline.

21
Detection Classes: Misuse



Detected independently from the established baselines,
on a set of known attack signatures.
Traffic of specific types exceeding what should be
normal for a network.
Misuse anomalies cover the following types of traffic:







ICMP Anomaly
TCP NULL Flag Anomaly
TCP SYN Flag Anomaly
TCP RST Flag Anomaly
IP NULL (Proto 0) Anomaly
IP Fragmentation Anomaly
IP Private Address Space Anomaly
22
Misuse Anomalies - Dark IP
23
Fingerprint/Worm Anomalies(1)
24
Tracing Anomalies



Automatically trace the source and destination IP/Port,
TCP Flag of abnormal traffic.
Distribution of attack traffic by source and destination
IP/Port.
Trace the network device that the abnormal traffic pass
through.
25
Prevent/Mitigate Network-wide Anomalies

System can recommend appropriate mitigation
measures to mitigate anomalies such as DoS attack and
worm outbreaks.



Generate recommended ACLs or rate limit commands.
Blackhole routing
Sinkhole routing
26
Alert

BGP



Data Source





BGP Instability
BGP Route Hijacking
BGP Down
Flow Down
SNMP Down
DoS Alert
Interface Usage: traffic exceeded configured baseline
Use E-mail, SNMP Traps, Syslog etc to notify
network administrators.
27
Thank you !