flow data tools and analysis at fermilab andrey bobyshev / phil demar internet2/escc joint techs...

26
Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Upload: jasmin-jacobs

Post on 21-Jan-2016

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Flow Data Tools and Analysisat Fermilab

Andrey Bobyshev / Phil DeMar

Internet2/ESCC Joint Techs Workshop

Fermilab, July 15-19, 2007

Page 2: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Outline of the talk:

Flow data collection & analysis system at Fermilab Security tools Performance estimation tools Checking of traffic for PBR’d circuits

Page 3: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Netflow Collection and Analysis system

Based on flow-tools (OSU) Collecting data from:

Border routers:1min flow time outs

Internal core routers and large experiment routers:

5 min flow time outs

Specific collector for “near” real-time tools/applications

Central storage system accumulating all flow data

Multiple systems for primary processing Results stored in SQL tables

Local RAID6

EnStore

BlueArc NAS

Fermilab Core Services

Processing andAnalysis systems

mySQL Serverprimary processing data,Application's data

Web Presentation

Flow collectorReal-Time Appls

real-timereplication

NetFlow Storage

Long-Term Archiving

Border & StarLightCMS

WorkGroup & Core

1minsamples

5minsamples

Page 4: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Data Collection details

D a i l y M o n t h l y

B o r d e r 6 0 0 M B 1 7 G B

2 0 0 M B 5 G B

C M S 1 . 2 G B 3 0 G B

C O R E 5 0 0 M B 1 2 G B

StarLight

~2.5GB to disk daily Older data are archived on EnStore, Fermilab’s tape storage facility

Complete flow data collection, not sampled

10GE backbone & offsite links…

Impact on routers is minimal

Page 5: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Origin: onsite, offsite, local, transitTarget: CMS, D0, CDFFilter: particular remote site or group of sites. Ex. Caltech,Tier2, US-Tier2 and etc..

SrcDstOctetsSrcDstFlowsSrcDstPacketsand more

Raw data sets accumulated for 1min,5min, 15min intervals

tableID: router,origin,target,filter,DNS Level mySQL

Sources and Destinations are identifiedby DNS name (host, top level,second leveland so on or statically assigned labels

Tagging

Applications: topN, Network Weather Map, ...

Breakdown of traffic and tagging process

Page 6: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Security Tools

AutoBlocker – quasi real-time detection and automatic block/unblocking onsite and offsite scanners

Automated offsite blocking based on “greedy” data flow pattern Automated unblocking ‘x’ minutes after behavior stops

Top Scanners GUI Slow Scanning detection Raw Flow reader – packets exchange

Page 7: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

The main idea of AB3 is calculating multiple quantified metrics from netflow data to use it for making automated decision on blocking and ublocking of offsite and onsite scanners. In October of this year it will be 5 years since AutoBlocker has been deployed.

AutoBlocker – automatic detection and blocking/unblocking of offsite and onsite

scanners

Calculate metrics

BLOCK

NO scanning – NO actions

REDORANGEYELLOW

BLUE

NOTICE

WATCH

NONE

GREEN

Evaluate triggersto return threat level

Page 8: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Metrics/Triggers/Threats/Actions

●ipDestinationAddressCount●ipDestinationPortCount●ipSourcePortCount●blockCount●activeBlockCount●detectionCount●consecutiveDetection●consecutiveWatch●watchRate●flowsIn●flowsOut●HitByRemotes●excessivePrcTime●tcpSourcePortOut●tcpSourcePortIn●tcpDestPortOut●tcpDestPortIn●udpSourcePortOut●udpSourcePortIn●udpDestPortOut●udpDestPortIn

● excessiveHostCount● excessiveDestinationPort● flowsResponseInconsistency● portScanFlowsResponse● excessiveProcessingRate● DatectionRate● consecutiveDetection● watchRate● consecutiveWatch

● BLOCK/unBLOCK● watch/resetWatch● NONE/flushNONE● NOTICE

Metrics: Triggers: Actions:

Triggers return the threat identified by a color.Threats are mapped into actions

BLOCK

NO scanning – NO actions

REDORANGE

YELLOW

BLUE

NOTICE

WATCH

NONE

GREEN

Page 9: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

AutoBlocker Exceptions System

Core

Events with originallyassigned actions

Exceptions SystemEvaluating of events triggered actionsagainst defined exceptions

Multiple Classes of Exceptions

Network

ServersApplications

Definition in terms of AB metrics +IP Blocks

Definition in terms of AB metrics +IP Blocks

Groups ofApplications

NO exception found

An exception found, original action is converted into unharmed action such as NONE, NOTICE.

Determine usual traffic behavior

Dynamic Definitions

Static Definitions

Traffic

Multiple classes of exceptions:● Network, based on CIDR IP Blocks● Applications defined by combination of event's metrics and specified IP blocks● Groups of applications

Definitions of applications can be created statically or dynamically

Reversed Exception: an “unharmed” action can be converted into BLOCK: AB has triggered an event but did not meet BLOCK criterion. However, AB-Exception system determines a potential dangerous application that needs to be BLOCKed..

Page 10: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

External AutoBlocker detectors

Several external AutoBlocker detectors: DarkNets - analyze traffic to unallocated Fermilab networks and generate alerts to AB3 via SOAP SlowScan – detects slow scanning by analyzing flow for a longer periods (1hour, 1 day) and generate alerts to AB3

Page 11: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Raw Flows Reader

WEB interface to generate raw flow data based on specified criteria, such as time range, port, source/destination addresses

Typical use is for forensic analysis of computer security incidents

Access to the tool (and raw flow data itself) is restricted

Page 12: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Sample of RawFlow Output

Page 13: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

TopScan: Generate tables of topN Scanners

TopScan – on per origin basis (onsite, offsite, local, transit) generate tables of top scanners for specified time intervals: 5min, 1hour, 1day.Information is available via interactive GUI and by E-Mail notifications

Page 14: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Performance Monitoring & Estimation tools

WEB USCMS Network Weather Map topN Traffic Summary (ftsumTraffic) Traffic asymmetry (bfpsum) Multistream flow analysis

Page 15: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS Network Weather Map

Show estimated rates to various sites: Tier0, other Tier1, USCMS Tier2.

Features: ● popup graphs● clickable icons to direct to other informational sources

Page 16: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS WM : popup graphs

Place cursor over UNL icon- Utilization graph appears

Page 17: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS WM: Popup graphs, 16Gbps

Place cursor over central USCMS icon

- Aggregate Tier-1 center traffic graph appears

Page 18: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS WM: Group's rates

Page 19: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS WM: Clickable icons

Click on BlueArc Icon:

hourly summary tables for TopN pairs, senders and receivers

Page 20: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

USCMS WM: TopN conversations

Tables of hourly topN senders, receivers & conversations

Page 21: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

bfpsum: ByteFlowPacket Summary

bfpsum allows to build graphs and tables for traffic of specified targets, such as USCMS to the various remote sites. Single or multiple routers can be selected as well as multiple targets and filters.Traffic can be seen in the terms of bytes, flows and packets. Both rates or amount can seen.

Page 22: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

This tool is used for interactive inspection of USCMS PBR-ed traffic to detect potential asymmetry. When traffic is symmetric flow rates of inbound and outbound traffic is practically the same (see graph on the previous slide).

An example of traffic asymmetry is graph on this slide (caused by Caltech when LS was shutdown and outbound traffic was going through the core network.

bfpsum: Verifying symmetry of PBR-ed traffic

Page 23: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Test: detection of traffic asymmetry

r-s-starlight-fnal(E2E circuits…)

r-cms-fcc2

r-s-bdr(routed IP via ESnet)

WAN

normal (E2E) traffic flow

LambdaStation is turned off, no PBR

USCMS Tier1

Page 24: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Breakdown of multistreams GridFTP sessions

ftGftp: detects and estimates transfer rates for multistreams gridFTP sessions.

- Filtering on remote sites can be selected first before passing it to the detector.

Page 25: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Commercial Products

Always looking for commercial or public domain packages of comparable functionality:

Most commercial packages have similar capabilities & some useful features, but not flexible enough for our purposes Evaluated AdventNet Netflow Analyzer & NetFlow Tracker from Crannog-Software

Purchased AdventNet , ~$1K for 20 interfaces, allows to define IP groups based on the list of IP blocks

Page 26: Flow Data Tools and Analysis at Fermilab Andrey Bobyshev / Phil DeMar Internet2/ESCC Joint Techs Workshop Fermilab, July 15-19, 2007

Future flow data developments

Maintaining the existing scope of monitoring Automate asymmetric path analysis Integrate flow data analysis into our network performance

troubleshooting methodology High impact data movement detection

Lesson learned from Lambda Station: application awareness is hard Wouldn’t it be nice to have the network detect recognizable flow

patterns and modify path/service/whatever, if appropriate? But it almost certainly would require real time flow data

Would be happy to collaborate with others developing flow data tools: Contact us at [email protected]