290 likes | 401 Views
NetSEC: metrology-based application for network security. Jean-François SCARIOT Bernard MARTINET Centre Interuniversitaire de Calcul de Grenoble TNC 2002 June 2002. Plan. Metrology Why, what & how? Analyze NetSEC Goals Architecture Available tools Conclusion. why to measure?.
E N D
NetSEC: metrology-based application for network security Jean-François SCARIOT Bernard MARTINET Centre Interuniversitaire de Calcul de Grenoble TNC 2002 June 2002
Plan • Metrology • Why, what & how? • Analyze • NetSEC • Goals • Architecture • Available tools • Conclusion
why to measure? • To know network usage • To know network availability • To detect dysfunction • To do cost sharing • Also… to improve security
What and how to measure? • Qualitative: knowing its network • I/O traffic load, CPU load, collision… Watch the counters of the equipments • Quantitative: controlling its network • Traffic type, I/O traffic load per host or group... extract information from frameanalysis
Measurement to supervise • Daily supervision (15’ is enough ) • Curves or bar graphs • Always the same "look" “To control and manage a network, you must visualize its behaviour”
Monday April the 2nd 2001 Monday April the 9th 2001 Highlighting a problem A « normal » day May be some problems
Highlighting a problem Unfortunately! Problem discovery is a posteriori We have to go back And analyze the traffic of the involved period.
Traffic analyzing • Locate the host(s) • Date, addresses, intrusion method, extend of the damage… • HOW? • Doing crosschecking • Sorting metrology data on several parameters Powerful sorting tools are needed!
NetSEC goals • To have an evolving software • To analyze “well-known” data • NetMET • IPtrafic • To support open standards To improve the security of networking computers
NetSEC foundations • Using a relational database • A simple network description • A modular architecture • Using an open source software
Open software • Linux system (Redhat) • MySQL database • Apache Web server • JAVA
About database • JDBC database access • Basic SQL queries • One loader per collector
DB structure • One table for one day (of data) • src@ & dst@ • Date • Port & protocol • Volume • One table for the network description
Network description • A network • 192.168.10.11/24 • An organism • University Joseph Fourier • An entity • CICG • A location • Campus of Grenoble
Available tools • A data query module • A graphic generator module • A data mining module
Collector Collected Data Loader Loader Graphic Generation Process Graphic Generator Engine Network Description ALARMS REPPORTS KDD Process Query Process HTML Requests Knowledge Discovery Database Engine Query Engine SQL Requests SQL Requests SQL Requests Architecture DB
The query tool • To use the SQL power • Sort • Query • Extract • Querying data with a friendly interface
How does it work? • Parameters processing • JDBC driver loading & connection • Building and executing the SQL query • Displaying the results
Graphic generation • A zoom of a network on demand. • A supervision of a determined services
Functioning • Database system provides data • Querying database (with SQL queries) • Returning results to MRTG for displaying • MRTG Graphics building
Data mining • Produce unknown information • non trivial • Useful • Produce association rules • A and B => C
Explanation Association Rules Generation Large Itemsets Research Association rules Database Large Itemsets Data Selection Set of Transactions Knowledge Association rules process Corn flakes and sugar milk
"] 14h-19h]" AND "SCAN/REGULAR_SERV" AND "[0-1KB]" AND 53 "TUESDAY" (14.8%, 90.4%) Association rule example
Conclusion • A contribution to improve security • A metrology based-application • Built on a database • Open & Modular • Who would like to participate? E-mail : netsec@grenet.fr