Efficient Traffic Monitoring for Science DMZ with Side-Channel Traffic Winnowing
This study explores efficient traffic monitoring for Science DMZ using side-channel based traffic winnowing. It introduces a lightweight detection system to address the limitations of traditional high-performance data transfer methods. The proposed approach enhances security policies, improves network performance, and enables easier performance monitoring. By leveraging Science DMZ architecture and threat modeling, the research identifies the tension between traffic monitoring requirements and high-performance data transfer. The study also discusses the limitations of existing approaches and suggests strategies for improving the processing capacity of Intrusion Detection Systems (IDSes).
- Traffic monitoring
- Science DMZ
- Side-channel
- Lightweight detection system
- High-performance data transfer
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, and Richard R. Brooks SDN-NFV Security 2018
Outline Introduction Approach Overview Lightweight Detection System Development Evaluation
Traditional High Performance Data Transfer Campus Router/Firewall Campus Router/Firewall WAN Campus LAN Campus LAN Data Servers Data Servers
Traditional High Performance Data Transfer 1.Inappropriate security policies Campus Router/Firewall Campus Router/Firewall WAN 2.Low-performance general-purpose networks Campus LAN Campus LAN 3.Hard to monitor performance 4.Low-performance general-purpose data servers Data Servers Data Servers
Science DMZ Campus Router/Firewall Campus Router/Firewall Border Router WAN Border Router Virtual/Dedicated Connection Science DMZ Router Science DMZ Router Campus LAN Campus LAN High performance Data Transfer Nodes High performance Data Transfer Nodes
Threat Model Border Router WAN Traffic monitoring to capture the anomalies Science DMZ Router Compromised Data Transfer Node Malicious programs are installed and launched
Tension Between Two Requirements Border Router WAN Traffic monitoring to capture the anomalies High-performance data transfer 100 Gbps or higher Low-performance traffic monitoring Snort with 800 Mbps per processor Bro with 80 Mbps per core Compromised Data Transfer Node Malicious programs are installed and launched
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Cluster-based IDSes Special hardware IDSes
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Devoting more resources Cluster-based IDSes Special hardware IDSes
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Devoting more resources Cluster-based IDSes Special hardware IDSes Tuning the IDSes based on traffic pattern Predicting the traffic pattern
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Devoting more resources Cluster-based IDSes Special hardware IDSes Tuning the IDSes based on traffic pattern Predicting the traffic pattern Lack of dynamics
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Devoting more resources Cluster-based IDSes Special hardware IDSes Tuning the IDSes based on traffic pattern Predicting the traffic pattern SciPass Lack of dynamics Totally bypassing IDSes
Limitations of Existing Approaches Improving the processing capacity of IDSes Multi-thread/core IDSes Devoting more resources Cluster-based IDSes Special hardware IDSes Tuning the IDSes based on traffic pattern Predicting the traffic pattern SciPass Lack of dynamics Totally bypassing IDSes Lack of visibility after bypassing
Overview of Our Approach Continuous monitoring Border Router Lightweight Detection System WAN Update flow rules Reflected Traffic OpenFlow switch Filtered Traffic IDS Instances Virtualization Platform Dynamically adapting to load variations High Performance Data Transfer Nodes
Lightweight Detection System Requirements Very low false negative rate Malicious traffic is rarely considered as benign Benign traffic can be considered as malicious Efficient detection Process each packet faster Analyze only a small portion of traffic to filter
Insight #1 of Science DMZ Domain-specific applications Lustre/GPFS (high-speed parallel file system) GridFTP/FTD (high-speed data transfer) XRootD (discipline-specific tools)
Insight #1 of Science DMZ Domain-specific applications Lustre/GPFS (high-speed parallel file system) GridFTP/FTD (high-speed data transfer) XRootD (discipline-specific tools) Baseline of what traffic should be deemed as benign
Insight #1 of Science DMZ Domain-specific applications Lustre/GPFS (high-speed parallel file system) GridFTP/FTD (high-speed data transfer) XRootD (discipline-specific tools) Baseline of what traffic should be deemed as benign Side-Channel Analysis Model of benign traffic
Modeling Network Protocols Network protocol modeling via Hidden Markov Models (HMMs) C. Lu, et al. A normalized statistical metric space for hidden markov models. L. Yu, et al. Inferring statistically significant hidden markov models. X. Zhong, et al. Side channel analysis of multiple pmu data in electric power systems. It s been proved feasible to model the network protocol by time intervals of packets
Insight #2 of Science DMZ Elephant flows Size of flows is huge Duration of flows is long
Insight #2 of Science DMZ Elephant flows Size of flows is huge Duration of flows is long Sufficient observation to infer HMMs for each flow Relatively small portion of traffic to analyze
Lightweight Detection System Design Incoming Traffic Symbol Table Online Detection Offline Training Detection Results HMMs Flow Rule Management Flow Rule Update
Offline Training Process Traffic Capturing Extracting Time Intervals Symbolization Symbol Table Inferring HMMs HMMs
Online Detection Process Packet Acquisition Traffic Capturing Compute Time Interval Extracting Time Intervals Symbolization Assign Symbol Symbol Table Count Probability of each Symbol Inferring HMMs HMMs Insufficient sampling Sufficient sampling Chi-square test Malicious Benign Not matched Matched
Evaluation The processing time of each packet Lightweight detection system IDS instances Expectation of the hybrid of two False positive rate lightweight detection system
Evaluation Setup Data Collection GridFTP (benign) vs. SCP (malicious) Each flow transfers 10GB data Generated through VMs on CloudLab at Clemson System Configuration Implement lightweight detection system Bro as IDS instances
Processing Time of Each Packet T: expectation of processing time of each packet L: processing time of lightweight detection system I: processing time of IDS instances : the ratio of traffic to analyze for filtering : the ratio of malicious traffic : false positive rate g a b
Result Analysis Tested Variables Observed Value Parameters a b Value L 0.66 microsecond (Analysis ratio) 0.1 I 44.46 microseconds (Malicious ratio) 0.5 g 0.38 T 32.7 microseconds
Result Analysis Tested Variables Observed Value Parameters a b Value L 0.66 microsecond (Analysis ratio) 0.1 I 44.46 microseconds (Malicious ratio) 0.5 g 0.38 T 32.7 microseconds Processing Time Per Packet (microsecond) 50 40 Saved 26% 30 20 10 0 LDS IDS instance Expectation
Result Analysis T = L+aI +(1-a)(bI +g (1-b)I) 0 a,b,g 1 Malicious ratio and FPR fixed T =a(1-b)(1-g )I +C1 Parameters a b g Value (Analysis ratio) 0.1 (Malicious ratio) 0.5 Analysis ratio and FPR fixed T = b(1-a)(1-g )I +C2 (FPR) 0.38 Analysis ratio and malicious ratio fixed T =g (1-a)(1-b)I +C3 Decreasing any of this parameters will further reduce the expectation of processing time!
Conclusion and Future Work Conclusion Present a new architecture for traffic monitoring in Science DMZ Demonstrate efficiency of side-channel based traffic winnowing Future work Evaluate on real-world Science DMZ data More protocols More use scenarios Investigate more side-channel features Packet size, time interval deviations, etc. Employ advanced machine learning techniques
Q & A Thank you!
Science DMZ Campus Router/Firewall Campus Router/Firewall Border Router WAN Border Router Science DMZ Router Science DMZ Router Campus LAN Campus LAN High performance Data Transfer Nodes High performance Data Transfer Nodes
Threat Model Border Router WAN Compromised Data Transfer Node Malicious programs are installed and launched
Modeling Network Protocols Network protocol modeling via Hidden Markov Models (HMMs) C. Lu, et al. A normalized statistical metric space for hidden markov models. L. Yu, et al. Inferring statistically significant hidden markov models. X. Zhong, et al. Side channel analysis of multiple pmu data in electric power systems.