DocumentCode
623730
Title
Pegasus: Precision hunting for icebergs and anomalies in network flows
Author
Gangam, S. ; Sharma, Parmanand ; Fahmy, Sonia
fYear
2013
fDate
14-19 April 2013
Firstpage
1420
Lastpage
1428
Abstract
Accurate online network monitoring is crucial for detecting attacks, faults, and anomalies, and determining traffic properties across the network. With high bandwidth links and consequently increasing traffic volumes, it is difficult to collect and analyze detailed flow records in an online manner. Traditional solutions that decouple data collection from analysis resort to sampling and sketching to handle large monitoring traffic volumes. We propose a new system, Pegasus, to leverage commercially available co-located compute and storage devices near routers and switches. Pegasus adaptively manages data transfers between monitors and aggregators based on traffic patterns and user queries. We use Pegasus to detect global icebergs or global heavy-hitters. Icebergs are flows with a common property that contribute a significant fraction of network traffic. For example, DDoS attack detection is an iceberg detection problem with a common destination IP. Other applications include identification of “top talkers,” top destinations, and detection of worms and port scans. Experiments with Abilene traces, sFlow traces from an enterprise network, and deployment of Pegasus as a live monitoring service on PlanetLab show that our system is accurate and scales well with increasing traffic and number of monitors.
Keywords
computer network performance evaluation; computer network security; supervisory programs; system monitoring; Abilene traces; DDoS attack detection; Pegasus; PlanetLab; adaptive data transfer management; aggregators; co-located compute-storage devices; enterprise network; global heavy-hitter detection; global icebergs; iceberg detection problem; live monitoring service; monitors; network flows; network traffic; online network monitoring; port scan detection; sFlow traces; top destination detection; top talkers identification; traffic patterns; user queries; worm detection; Accuracy; Bandwidth; Blades; Computer crime; IP networks; Monitoring; Ports (Computers);
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2013 Proceedings IEEE
Conference_Location
Turin
ISSN
0743-166X
Print_ISBN
978-1-4673-5944-3
Type
conf
DOI
10.1109/INFCOM.2013.6566936
Filename
6566936
Link To Document