Enriching network security analysis with time travel

  • Authors:
  • Gregor Maier;Robin Sommer;Holger Dreger;Anja Feldmann;Vern Paxson;Fabian Schneider

  • Affiliations:
  • TU Berlin / DT Labs, Berlin, Germany;ICSI / LBNL, Berkeley, CA, USA;Siemens AG, Munich, Germany;TU Berlin / DT Labs, Berlin, Germany;ICSI / UC Berkeley, Berkeley, CA, USA;TU Berlin / DT Labs, Berlin, Germany

  • Venue:
  • Proceedings of the ACM SIGCOMM 2008 conference on Data communication
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In many situations it can be enormously helpful to archive the raw contents of a network traffic stream to disk, to enable later inspection of activity that becomes interesting only in retrospect. We present a Time Machine (TM) for network traffic that provides such a capability. The TM leverages the heavy-tailed nature of network flows to capture nearly all of the likely-interesting traffic while storing only a small fraction of the total volume. An initial proof-of-principle prototype established the forensic value of such an approach, contributing to the investigation of numerous attacks at a site with thousands of users. Based on these experiences, a rearchitected implementation of the system provides flexible, highperformance traffic stream capture, indexing and retrieval, including an interface between the TM and a real-time network intrusion detection system (NIDS). The NIDS controls the TM by dynamically adjusting recording parameters, instructing it to permanently store suspicious activity for offline forensics, and fetching traffic from the past for retrospective analysis. We present a detailed performance evaluation of both stand-alone and joint setups, and report on experiences with running the system live in high-volume environments.