31
Network monitoring and Security analysis Dr. Mohammed Anbar National Advanced IPv6 Centre of Excellence (NAv6) UNIVERSITI SAINS MALAYSIA

Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

NetworkmonitoringandSecurityanalysis

Dr.MohammedAnbarNationalAdvancedIPv6CentreofExcellence(NAv6)

UNIVERSITISAINSMALAYSIA

Page 2: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

What is network monitoring?

The term network monitoring describes the use of a system that

constantly monitors a computer network for slow or failing components

and that notifies the network administrator in case of outages via email,

pager or other alarms. It is a subset of the functions involved in network

management.

Page 3: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Who?What?Where?How?When?• Whoisaccessingyournetwork?• students,academics,staff,visitorsorothers

• Whataretheyaccessingyournetworkfor?• academicstudy,socialuse,businessuse,illegaluse

• Wherearetheyaccessingyournetworkfrom?• internal,external

• Howaretheyaccessingyournetwork?• remoteuser,localEthernet,WAN,dial-up,Wi-Fi,VPN

• Whendidtheyaccessyournetwork?• today,yesterday,lastweek,lastmonth…

Page 4: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Typesofnetworkmonitoringtools

4

Page 5: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

NetworkMonitoringTechniques

• ActiveMeasurement• PassiveMeasurement

Page 6: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

NetworkTrafficmonitoringApproaches• The passive approach uses devices to watch the traffic as it passes by.

• The passive monitoring devices are polled periodically and information iscollected to assess network performance and status.

• The passive approach does not increase the traffic on the network for themeasurements. It also measures real traffic.

• The passive approach is extremely valuable in network trouble-shooting,however they are limited in their ability emulate error scenarios orisolating the exact fault location.

• Since the passive approach may require viewing all packets on thenetwork, there can be privacy or security issues about how toaccess/protect the data gathered.

Page 7: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

NetworkTrafficmonitoringApproaches• The active approach relies on the capability to inject test packets into thenetwork or send packets to servers and applications, following them andmeasuring service obtained from the network.

• As such it does create extra traffic, and the traffic or its parameters are artificial.The volume and other parameters of the introduced traffic is fully adjustableand small traffic volumes are enough to obtain meaningful measurements

• On the other hand, the active approach provides explicit control on thegeneration of packets for measurement scenarios. This includes control on thenature of traffic generation, the sampling techniques, the timing, frequency,scheduling, packet sizes and types (to emulate various applications), statisticalquality, the path and

Page 8: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Performancel Cricketl IFPFMl flowcl mrtgl netflowl NfSenl ntopl pmacctl rrdtooll SmokePing

NetManagementl BigBrotherl BigSisterl Cactil Hypericl Muninl Nagios*l Netdiscol Netdotl OpenNMSl Sysmonl Zabbix

ChangeMgmtl Mercuriall Rancid(routers)l RCSl SubversionSecurity/NIDSl Nessusl OSSECl Preludel Samhainl SNORTl Untangle

A few Open Source solutions…

Page 9: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

whatiscloudmonitoring?

• Cloud monitoring is primarily part of cloud security andmanagement processes, and it is generally implementedthrough automated monitoring software that provides centralaccess and control over cloud infrastructure. Cloudadministrators can review the operational status and health ofany cloud-baseddevice or component.

• In addition to monitoring and ensuring cloudinfrastructure/solution/service availability, cloud monitoringdata also helps in evaluating the performance of the entireinfrastructure.

• Cloud computing metrics such as server uptime and responserate reportcan help in evaluatingcustomer/user experience.

StudentWorkshopforFrontierofCloudComputing

Page 10: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudComputingCloud:theneedformonitoring

• Monitoring of Cloud is a task of paramount importance forboth Providers and Consumers.

• The continuous monitoring of the Cloud and of its SLAssupplies both the Providers and the Consumers withinformation such as the workload generated by the latterand the performance and QoS offered through the Cloud.

• Allowing to implement mechanisms to prevent or recoverviolations

10

Page 11: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudComputingCloud:theneedformonitoring• Capacityandresourceplanning• Capacityandresourcemanagement• Datacentermanagement• SLAmanagement• Billing• Troubleshooting• Performancemanagement• Securitymanagement

11

Page 12: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Cloudsecurity

• Cloud security is considered as one of the most significantobstacles to the spread of Cloud Computing, especiallyconsidering certain kinds of applications (e.g. business criticalones) and Consumers(e.g. governments).

• For managing the security in Cloud infrastructures and services,propermonitoringsystems areneeded.

• Moreover, for hosting critical services for public agencies, Cloudshave to satisfy strict regulations and prove it. And this can bedone through a monitoringsystem that enables auditing

12

Page 13: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudMonitoring:basicconcepts

• Layers (Facility, Network, Hardware, OperatingSystem (OS), Middleware, Application and user).

• Abstraction levels (low level and high level).

• Testsandmetrics(Computation-basedandnetwork-based)

13

Page 14: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudMonitoring:basicconceptsLayer• Facility: This layer considers the physical infrastructurecomprising the data centers that host the computing andnetworking equipment.• Network: This layer considers the network links and pathsboth in the Cloudand between the Cloud and the user.• Hardware: This layer considers the physical components ofthe computing and networking equipment.• Operating System (OS): This layer considers the softwarecomponents forming the operating system of both the hostand user

14

Page 15: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudMonitoring:basicconceptsLayer(cont.)• Middleware: This layer considers the software layerbetween the OS and the user application. It is typicallypresent only in the Cloud systems offering SaaS and PaaSservice models.• Application:ThisconsiderstheapplicationrunbytheuseroftheCloudsystem.• User:ThisisthefinaluseroftheCloudsystemandtheapplicationsthatrunoutsidetheCloud(e.g.awebbrowserrunningonahostattheuser’spremise).

15

Page 16: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudMonitoring:basicconceptsAbstractionlevels• InthecaseofSaaS,high-levelmonitoringinformationisgenerallyofmoreinterestfortheConsumerthanfortheProvider(beingcloselyrelatedtotheQoS experiencedbytheformer).

• Ontheotherhand,low-levelmonitoringisrelatedtoinformationcollectedby theProviderandusuallynotexposedtotheConsumer,and itismoreconcernedwiththestatusofthephysicalinfrastructureofthewholeCloud(e.g.serversandstorageareas,etc.).

• InthecontextofIaaS,bothlevelsareofinterestforbothConsumersandProviders.

16

Page 17: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudMonitoring:basicconceptsTestsandmetrics• Computation-based

Testsarerelatedtothefollowingmetrics:serverthroughput,definedasthenumberofrequests(e.g.webpageretrieval)persecond;CPUSpeed;CPUtimeperexecution.

• Network-based

Testsarerelatedtothemonitoringofnetwork-layermetrics.Thissetincludesround-triptime(RTT),jitter,throughput,packet/dataloss,availablebandwidth,capacity,trafficvolume,etc

17

Page 18: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Cloudmonitoring:Propertiesandrelatedissues

18

Source:Aceto,G.,Botta,A.,DeDonato,W.,&Pescapè,A.(2013).Cloudmonitoring:Asurvey. ComputerNetworks, 57(9),2093-2115.

Page 19: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

OptionsforCloudmonitoring

• CSP-providednetworkmonitoringtools• Traditionalnetworkmonitoringtools• Cloud-focusednetworkperformancemonitoring

Page 20: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CSP-providednetworkmonitoringtools• By far the cheapest and fastest way to get networkmonitoring up in running in the cloud is to leverage toolsprovided by your cloud provider.

• The primary drawback to using CSP-provided tools is thatthey only work within a single cloud.

Page 21: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Traditionalnetworkmonitoringtools

• Most enterprise organizations opt to deploy traditionalnetwork monitoring tools such as ping, SNMP polling, andNetFlow within a public cloud network -- when possible.

• The benefit here is that it allows network administrator toutilize the same tools within their cloud instances as theyuse to monitor network components on the privatecorporate LAN and WAN.

• For IaaS clouds, it's easily accomplished, but for PaaS andSaaS deployments, many of the traditional networkmanagement toolswon't work.

Page 22: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Cloud-focusednetworkperformancemonitoring

• Many IT departments require even more visibility into the networkthan has traditionally been provided across the enterprise LAN.

• Because a certain level of trust has been handed over to CSPs, ITteams need added visibility to keep closer tabs on the networkperformance inside and between clouds.

• Cloud-focused network performance monitoring platforms fromcompanies such as Cisco, ExtraHop and ThousandEyes.

• Many of these platforms include network probes, cloud agents, andin-depth routing and policy change notifications. These tools can beused to provide granular detail to the health of the network, downto the end-user perspective.

Page 23: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CloudmonitoringplatformsandservicesCommercialplatforms

Opensourceplatforms

Services

CloudWatch Nagios CloudSleuthAzureWatch OpenNebula CloudHarmonyCloudKick CloudStack ZenPack

CloudstoneCloudstone

CloudStatus Nimsoft CloudClimateNimsoft PCMONS CloudCMPMonitis PCMONS CloudClimateLogicMonitor DARGOS Up.time

Page 24: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Traditionalnetworkmonitoringtools(Demo)

24

Page 25: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

TCPportscanning

25

Page 26: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

OSFingerprinting(IPv4)

26

Page 27: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

FIRST LAYER DATABASE : OS FAMILY

Payload Length (NA) =32

Maximum Segment Size (TCP) =1440

Windows Size Value (TCP)

=8192

NOP (TCP) = 3

TTL (NS) = 255

WindowsPayload

Length(NA) =24

Timestamps (TCP)

Windows Size Value (TCP)

= 28800

NOP (TCP) = 1

Payload Length (TCP) = 40

LinuxPayload

Length(NA) =24

Timestamps (TCP)

Windows Size Value (TCP) =

65535

NOP (TCP) = 3

Payload Length (TCP) = 44

Mac

OSFingerprinting(IPv6)

Page 28: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

SECOND LAYER DATABASE : OS TYPES

Windows 7• Windows Scale

(TCP)= 2(Multiply by 4)

• Windows Size Value (TCP) = 8192

• Payload Length (NA) (TCP) = 32

• TCP Option Bytes (TCP) = 12 Bytes

• No TimestampWindows 8.1/ Windows 10• Windows Scale (TCP)

= 8(Multiply by 256)• Windows Size Value

(TCP) = 8192• Payload Length (NA)

(TCP)= 32• TCP Option Bytes

(TCP) = 12 Bytes• No Timestamp

Windows Ubuntu 16.04• Windows Scale

(TCP) = 7(Multiply by 128)

• Windows Size Value (TCP) = 28800

• TTL (TCP) = 64• TCP Option Bytes

(TCP) = 20 Bytes• Timestamps (TCP)

Android 6.0.1• Windows Scale

(TCP) = 7(Multiply by 128)

• Windows Size Value (TCP)=65535

• TTL (TCP) = 255• TCP Option Bytes

(TCP) = 20 Bytes• Timestamps (TCP)

Linux Mac OS 10.11• Windows Scale

(TCP) = 7(Multiply by 128)

• Windows Size Value (TCP) =65535

• End of List ( TCP)• TCP Option Bytes

(TCP) = 24 Bytes• Timestamps (TCP)

Mac

OSFingerprinting(IPv6)

Page 29: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

CSP-providednetworkmonitoringtools(Demo)

29

Page 30: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Links• https://www.wireshark.org/• https://nmap.org/• https://console.aws.amazon.com/console/home

30

Page 31: Network monitoring and Security analysis · 2018-12-04 · Network Traffic monitoring Approaches • The active approach relies on the capability to inject test packets into the network

Thankyou

[email protected]

31