Role Classification of Hosts Within Enterprise Networks Based On

Role Classification of Hosts Within Enterprise Networks Based On

Role Classification of Hosts within Enterprise Networks Based on Connection Patterns Godfrey Tan Massimiliano Poletto John Guttag and Frans Kaashoek MIT Mazu Networks MIT [email protected] [email protected] guttag,kaashoek ¡ @mit.edu Abstract unlimited access to external networks while oth- ers may have restricted access. Some users may be Role classification involves grouping hosts into re- limited in the amount of bandwidth they may con- lated roles. It exposes the logical structure of a net- sume, and so on. The number of policies is open- work, simplifies network management tasks such as pol- ended. icy checking and network segmentation, and can be used Monitoring network performance. Almost every to improve the accuracy of network monitoring and anal- complex network suffers from various localized ysis algorithms such as intrusion detection. performance problems. Network managers must This paper defines the role classification problem detect these problems and take action to correct and introduces two practical algorithms that group hosts them. based on observed connection patterns while dealing with changes in these patterns over time. The algorithms Detecting and responding to security violations. have been implemented in a commercial network moni- Increasingly, networks are coming under attack. toring and analysis product for enterprise networks. Re- Sometimes the targets are chosen at random, as sults from grouping two enterprise networks show that in most virus-based attacks, and in other cases the number of groups identified by our algorithms can they are picked intentionally, as with most denial- be two orders of magnitude smaller than the number of of-service attacks. These attacks often involve hosts and that the way our algorithms group hosts highly compromised computers within the enterprise reflect the logical structure of the networks. network. Early detection of attacks plays a critical role in reducing the damage. 1 Introduction Conducting these activities on a host-by-host basis is not feasible for large networks. Network managers need Today, many enterprises have internal networks (in- to extract structure from their networks so that they can tranets) that are as or more complicated than the entire think about them and make decisions at larger levels of Internet of a few years ago. Managing these networks granularity. Today, this structuring is most often done is increasingly costly, and the business cost of network in an ad hoc manner that relies on administrators’ best problems increasingly high. guesses about the computers, services, and users on the Managing an enterprise network involves a number network. Obviously, this method has scaling problems. of inter-related activities, including: This paper presents two algorithms that, used to- gether, partition the hosts on an enterprise network into Establishing a topology. A network’s topology has a groups in a way that exposes the logical structure of a significant impact on its cost, security, and perfor- network. The grouping algorithm classifies hosts into mance. An increasingly important aspect of topol- groups, or “roles,” based on their connection habits. The ogy design is network segmentation. In an effort correlation algorithm correlates groups produced by dif- to provide fault isolation and mitigate the spread ferent runs of the classification algorithm. of worms like Nimda [3] and Code Red [2], enter- The two algorithms together provide the following prises segment their networks using firewalls [4], properties: routers, VLANs [7], and other technologies. 1. They guarantee that a host is only grouped with Establishing policies. Different users of a network other hosts that have the strongest degree of sim- have different privileges. Some users may have ilarity in connection habits. 2. They provide a mechanism to merge groups, and give network administrators fine-grained control Source Revision over the merging process, so that meaningful re- Control sults can be achieved. Sales-1 Eng-1 3. They deal with transient changes in connection pat- Mail terns by analyzing the profiled data over long peri- ods. Web 4. They respond to non-transient changes in connec- Sales-N Eng-M tion patterns by producing a new partitioning and describing the differences between the new parti- Sales tioning and the previous partitioning. Database 5. Their run time grows quadratically with the number of hosts in the enterprise network. Figure 1. Grouping of related hosts based on con- nection patterns. Edge indicates that nodes com- As we demonstrate in Section 6, the algorithms re- municate regularly. The dashed circle represents duce the number of logical units that a network adminis- the group boundary. trator must deal with by one or two orders of magnitude. The algorithms are implemented as part of an enterprise monitoring and analysis system that is in production use at several large enterprises. Section 2 outlines the system in which the algo- might indicate that hosts Sales-1 to Sales-N communi- rithms operate, and introduces an example scenario that cate with three servers: Mail server, Web server, and will be used throughout the paper. Section 3 describes SalesDatabase server. Similarly, the patterns might in- the models used to develop practical solutions. Sec- dicate that hosts Eng-1 to Eng-M communicate mostly tion 4 and Section 5 explain the two practical algorithms with Mail server, Web server, and SourceRevisionCon- for solving the role classification problem. Section 6 trol server. presents preliminary results, and Section 7 discusses re- Based on this information the grouping algorithm can lated work. We conclude with discussions of our current logically divide all machines into five groups: (i) the and future work in Section 8. sales group consisting of hosts Sales-1 to Sales-N, (ii) the engineering group consisting of hosts Eng-1 to Eng- M, (iii) the common server group consisting of Mail 2 System Overview and Web, (iv) the sales server group consisting of Sales- Database and (v) the engineering server group consist- The role classification algorithms are implemented as ing of SourceRevisionControl. part of a system designed to detect and respond to secu- The results of the grouping algorithm are currently rity violations in large enterprise networks. Such net- being used in two major ways: works commonly consist of tens of thousands of com- puters, spread over different geographic locations. The 1. The Mazu network monitoring and detection sys- security system consists of probes and a central aggre- tem decides whether a host’s behavior matches the gator. The probes analyze packets on the link or links expected policy setting, partly based on the history they are attached to, and send relevant information (in- of the host’s group membership. For example, if a cluding IP address/port tuples) to the aggregator. host in the engineering group were to suddenly start The aggregator is a scalable system that consists of opening connections to the SalesDatabase server, it one or more CPUs. It periodically runs several analysis might be a cause for alarm. algorithms on the data it has received from the probes. It 2. The network administrators review the grouping re- uses the role classification algorithms to refine its anal- sults to better understand the structure of their net- yses and to allow the administrators to describe group- works and to get useful insights for conducting net- based policies. work re-organization tasks such as consolidating Figure 1 presents a simple enterprise network and a servers and network segmentation. partitioning of computers into groups that the aggrega- tor might produce based on the communication patterns The system allows a network manager to label each observed by the probes. The communication patterns identified group with descriptive roles and set policies per group. The system continuously monitors the com- ¥ , munication patterns, adjusts groups as computers come § § © ¥ ¤¥ ©¥ and go, flags policy violations, and raises alerts about – similarity ¤¦¥ similarity ¤¦¥§ © ¥ ¤¥ ©¥ potential security violations. Because all this informa- – similarity similarity tion is presented on the level of groups (instead of indi- vidual hosts), a network manager is able to understand We extend this definition of similarity to define the § and process the changes and alerts more easily. The al- average similarity between a host ¥ and a group , § © gorithms also provide network administrators with flex- avg similarity ¤¦¥ , as the ratio of the sum of the ¥ ibility to control the grouping process to achieve results similarity between ¥§ and each to the num- that highly reflect their intuitive notion of the network ber of hosts in : structure. #%$&(')*& § © ¥ The algorithms presented in this paper are solely similarity ¤¥ § © "! avg similarity ¤¥ +¢ based on the connection patterns of hosts such as the ¢ set of neighboring hosts. However, the algorithms can ¡ A partitioning of respects avg similarity if for easily be extended to use other information such as pro- §, § - § § ¤¥ © . all ¥ and , avg similarity tocols and port numbers used and bytes transferred to § © avg similarity ¤¦¥ . achieve desired results. For instance, some network ad- Respecting similarity or avg similarity is not suffi- ministrators may desire that Mail and Web servers be put ¡ cient to generate a useful partitioning of . After all, in different groups. In this case, the protocol informa- a partitioning that puts all the nodes in one group or tion can be

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us