760 likes | 790 Views
IRONMAN V1.5. Network Management Environment. IRONMAN V1.5 Traffic Problem Domain. Nodes : 50,000,000 total ; 5000 to protect Protocols : 160 + Ports : 1024 well-known ; 60000+ others Services : 10 - 200 (e.g. WWW, email) Applications : ???
E N D
IRONMAN V1.5 Network Management Environment
IRONMAN V1.5 Traffic Problem Domain • Nodes : 50,000,000 total ; 5000 to protect • Protocols : 160 + • Ports : 1024 well-known ; 60000+ others • Services : 10 - 200 (e.g. WWW, email) • Applications : ??? • Typically 500 ++ instances (packets) per second • Acceptable vs unacceptable combinations
Provides Interactive Management of networks and components Policy Based Modeling, Analysis and Control Passive Monitoring and Active Probing of Networks Dynamic Visualization of Information and Systems Integration of Existing Commercial Tools and Custom Tools Virtual Common Data Repository for all Information Sources Client-Server and Peer-to-Peer Architecture using Standard Technology IRONMAN V1.5 Network Management Environment
Functional Architecture Acquisition Control ADAPTIVE MANIFOLD Representation Presentation Analysis Decision
IRONMAN HTTP Server WWW Browser HTTP Server (Sockets) VRML 2.0 Plugin IRONMAN Agent Server Network IRONMAN HTTP Server IRONMAN HTTP Server Client Manifold Client Support Applications System Architecture
Distributed Interactive Simulation and Control • client-server structure • servers: data-gathering (probes and monitors), analysis, control, representation, persistent storage and decision support • clients: working storage, presentation (display) and command consoles • some analysis in clients but only for network efficiency • collaborative architecture (i.e. shared workspace through servers, storage and presentation space) • streaming data updates • database architecture: local working and global persistent
Probing, Monitoring and Control • Probes: CyberCop, Nessus, Internet Security Scanner, .... • Intrusion Detection: NetRanger, Network Flight Recorder, ….. • Monitoring: SNMP RMON, TCP Dump, …... • Policy/Configuration: SNMP, Telnet, X-Windows, .... • Agents: perform one or more of the above ... • other
Vulnerability Database Schema • Vulnerability Identification(id, title) • Description and impact • System identification • Application information • Reference to the vulnerability • Detailed analysis, detection techniques and fixes analysis, detection, fix, test, workaround, patch • Detailed information about exploitation (exploit, pattern) • Classifications and features (class, category) • Verification of vulnerability • Source of vulnerability information
Agents • several intrusion detection system use agents as collectors /sensors ( e.g. AAFID); • agents are being studied as component of IRONMAN for: • acquisition • analysis • communication • control
IETF IDWG Core Terms and Relationships
Principal Visualization Goals • to identify if system is stable or unstable relative to an identified set of criteria (e.g. a security policy) • to identify if internal changes to the system will move system toward instability • to identify any external events which are tending to move the system towards instability
IRONMAN Visualization • the generation of a set of (visual and aural) sensory stimuli for the user; and • the detection and interpretation of these stimuli by the user • user input to visualization • use VRML 2.0 as implementation framework
VRML 2.0 Scene Graph • Group: Collections and Hierarchies • Transform (Xform): Shape,Colour, Location, Texture of Object • Script: Behaviour of Object and/or connection to Network • Sensor: Connection to User Actions and/or User Avatar Location
Individual Control of Visualization Elements • VRML 2.0 scene is composed of nodes • each node is coupled to data source or network process • very large distributed computational structures can be monitored in real time over the network • each element can display individual characteristics • aggregate provides visualization support through collective morphology and topology
Visualization Toolkit • a basic object editor; • a mapping assignment editor (to map data to parameters); • a basic visualization library manager; • a data set formatter; • a VRML 2.0 generator;
Data Structures Visualization Toolkit • Six data structures are being developed to support models :- • network - main objects (vertices and lines); • permutation - reordering of vertices; • vector - values of vertices; • cluster - subset of vertices (e. g. one class from partition); • partition - mapping of vertices to clusters; • hierarchy - hierarchically ordered clusters and vertices. • Algorithns which operate on these are being developed and evaluated.
VR Server • Uses specification to generate a visualization; • inputs: • one or more data sets; • a set of prototypes or templates; • an algorithm for converting or mapping the data sets into Euclidean space using the available prototypes and templates • distributed compositional architecture
System High-Level Visualization Example: • 676 hosts • Ring is a LAN • White box is a selected host. HUD displays IP of host
System Attribute Visualization • e.g. Mapping Network Components to Vulnerabilities • VRML 2.0 with behaviours and external interfaces
System Behaviour Visualization VRML 2.0 with behaviours and external interfaces • tracking events through topology e.g. Traceroute • Events can be displayed using shapes which travel along links in the visual display. • Events can (1) have any shape, and can either be (2) persistent and aggregate or (3) transient
System Constraint Visualization • e.g. Policy Violations by Multiple Components • VRML 2.0 with behaviours and external interfaces
Partitioned Host Traffic Visualization • Various display layouts are possible • This example shows line and spiral
Partitioned Host Traffic Visualization • Partition Hosts into 2 or more categories • Time-independent Display
Partitioned TCP Dump Visualization External Hosts - red disk Internal Hosts - green line
Partitioned Host Traffic Visualization • shows partition of hosts • time-independent • scan of network displayed
Temporal TCP Dump Traffic Visualization Cartesian Display
Temporal TCP Dump Traffic Visualization Polar Display
Context Displays Top View
Context Displays Textured reference floor providing context status and “bubbles” indicating status of particular machines “Bubbles” indicating status of particular machines Textured reference floor providing context status
Conetrees Conetrees can be used either for user interface ( i.e. selection of options, etc) or to indicate hierarchical structures
Controls and • Level of Detail Elements of the visual presentation can be provided with associated controls and displays. Buttons can be persistent or can become visisble with proximity or external triggers
Controls and • Level of Detail In this case, selecting the red button caused the remainder of the elements in the display to be hidden. Actions associated with each user interface can be dynamically assigned or form part of a standard user interface profile. If buttons are dynamically assigned, they will have information tableaus associated with them.