• DocumentCode
    623730
  • Title

    Pegasus: Precision hunting for icebergs and anomalies in network flows

  • Author

    Gangam, S. ; Sharma, Parmanand ; Fahmy, Sonia

  • fYear
    2013
  • fDate
    14-19 April 2013
  • Firstpage
    1420
  • Lastpage
    1428
  • Abstract
    Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis resort to sampling and sketching to handle large monitoring traffic volumes. We propose a new system, Pegasus, to leverage commercially available co-located compute and storage devices near routers and switches. Pegasus adaptively manages data transfers between monitors and aggregators based on traffic patterns and user queries. We use Pegasus to detect global icebergs or global heavy-hitters. Icebergs are flows with a common property that contribute a significant fraction of network traffic. For example, DDoS attack detection is an iceberg detection problem with a common destination IP. Other applications include identification of “top talkers,” top destinations, and detection of worms and port scans. Experiments with Abilene traces, sFlow traces from an enterprise network, and deployment of Pegasus as a live monitoring service on PlanetLab show that our system is accurate and scales well with increasing traffic and number of monitors.
  • Keywords
    computer network performance evaluation; computer network security; supervisory programs; system monitoring; Abilene traces; DDoS attack detection; Pegasus; PlanetLab; adaptive data transfer management; aggregators; co-located compute-storage devices; enterprise network; global heavy-hitter detection; global icebergs; iceberg detection problem; live monitoring service; monitors; network flows; network traffic; online network monitoring; port scan detection; sFlow traces; top destination detection; top talkers identification; traffic patterns; user queries; worm detection; Accuracy; Bandwidth; Blades; Computer crime; IP networks; Monitoring; Ports (Computers);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2013 Proceedings IEEE
  • Conference_Location
    Turin
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4673-5944-3
  • Type

    conf

  • DOI
    10.1109/INFCOM.2013.6566936
  • Filename
    6566936