mapping the internet and intranets

72
1 of 75 Mapping the Internet and Intranets

Upload: santo

Post on 19-Mar-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Mapping the Internet and Intranets. Bill Cheswick [email protected] http://www.cheswick.com. Intranets are out of control Always have been Highlands “day after” scenario Panix DOS attacks a way to trace anonymous packets back!. Internet tomography - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Mapping the Internet and Intranets

1 of 75Mapping the Internet and Intranets

Page 2: Mapping the Internet and Intranets

75 slides

Mapping the Internet and

IntranetsBill Cheswick

[email protected]

http://www.cheswick.com

Page 3: Mapping the Internet and Intranets

3 of 75Mapping the Internet and Intranets

Motivations• Intranets are out of

control– Always have been

• Highlands “day after” scenario

• Panix DOS attacks– a way to trace

anonymous packets back!

• Internet tomography

• Curiosity about size and growth of the Internet

• Same tools are useful for understanding any large network, including intranets

Page 5: Mapping the Internet and Intranets

5 of 75Mapping the Internet and Intranets

The Goals• Long term reliable

collection of Internet and Lucent connectivity information– without annoying

too many people

• Attempt some simple visualizations of the data

– movie of Internet growth!

• Develop tools to probe intranets

• Probe the distant corners of the Internet

Page 6: Mapping the Internet and Intranets

6 of 75Mapping the Internet and Intranets

Methods - data collection• Single reliable host connected at the

company perimeter

• Daily full scan of Lucent

• Daily partial scan of Internet, monthly full scan

• One line of text per network scanned– Unix tools

Page 7: Mapping the Internet and Intranets

7 of 75Mapping the Internet and Intranets

Methods - network scanning• Obtain master network list

– network lists from Merit, RIPE, APNIC, etc.– BGP data or routing data from customers– hand-assembled list of Yugoslavia/Bosnia

• Run a traceroute-style scan towards each network

• Stop on error, completion, no data– Keep the natives happy

Page 8: Mapping the Internet and Intranets

8 of 75Mapping the Internet and Intranets

TTL probes• Used by traceroute and other tools

• Probes toward each target network with increasing TTL

• Probes are ICMP, UDP, TCP to port 80, 25, 139, etc.

• Some people block UDP, others ICMP

Page 9: Mapping the Internet and Intranets

9 of 75Mapping the Internet and Intranets

TTL probes

Application level

TCP/UDP

IP

Hardware

Client

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

RouterApplication level

TCP/UDP

IP

Hardware

Server

Hop 1 Hop 2 Hop 3

Hop 3 Hop 4

Page 10: Mapping the Internet and Intranets

10 of 75Mapping the Internet and Intranets

Send a packet with a TTL of 1…

Application level

TCP/UDP

IP

Hardware

Client

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

RouterApplication level

TCP/UDP

IP

Hardware

Server

Hop 1 Hop 2 Hop 3

Hop 3 Hop 4

Page 11: Mapping the Internet and Intranets

11 of 75Mapping the Internet and Intranets

…and we get the death notice from the first hop

Application level

TCP/UDP

IP

Hardware

Client

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

RouterApplication level

TCP/UDP

IP

Hardware

Server

Hop 1 Hop 2 Hop 3

Hop 3 Hop 4

Page 12: Mapping the Internet and Intranets

12 of 75Mapping the Internet and Intranets

Send a packet with a TTL of 2…

Application level

TCP/UDP

IP

Hardware

Client

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

RouterApplication level

TCP/UDP

IP

Hardware

Server

Hop 1 Hop 2 Hop 3

Hop 3 Hop 4

Page 13: Mapping the Internet and Intranets

13 of 75Mapping the Internet and Intranets

… and so on …

Application level

TCP/UDP

IP

Hardware

Client

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

Router

IP

Hardware

RouterApplication level

TCP/UDP

IP

Hardware

Server

Hop 1 Hop 2 Hop 3

Hop 3 Hop 4

Page 14: Mapping the Internet and Intranets

14 of 75Mapping the Internet and Intranets

Advantages• We don’t need access (I.e. SNMP) to the

routers

• It’s very fast

• Standard Internet tool: it doesn’t break things

• Insignificant load on the routers

• Not likely to show up on IDS reports

• We can probe with many packet types

Page 15: Mapping the Internet and Intranets

15 of 75Mapping the Internet and Intranets

Limitations• Outgoing paths only

• Level 3 (IP) only– ATM networks appear as a single node– This distorts graphical analysis

• Not all routers respond

• Many routers limited to one response per second

Page 16: Mapping the Internet and Intranets

16 of 75Mapping the Internet and Intranets

Limitations• View is from scanning host only

• Takes a while to collect alternating paths

• Gentle mapping means missed endpoints

• Imputes non-existent links

Page 17: Mapping the Internet and Intranets

17 of 75Mapping the Internet and Intranets

The data can go either way

A

E F

D

B C

Page 18: Mapping the Internet and Intranets

18 of 75Mapping the Internet and Intranets

The data can go either way

A

E F

D

B C

Page 19: Mapping the Internet and Intranets

19 of 75Mapping the Internet and Intranets

But our test packets only go part of the way

A

E F

D

B C

Page 20: Mapping the Internet and Intranets

20 of 75Mapping the Internet and Intranets

We record the hop…

A

E F

D

B C

Page 21: Mapping the Internet and Intranets

21 of 75Mapping the Internet and Intranets

The next probe happens to go the other way

A

E F

D

B C

Page 22: Mapping the Internet and Intranets

22 of 75Mapping the Internet and Intranets

…and we record the other hop…

A

E F

D

B C

Page 23: Mapping the Internet and Intranets

23 of 75Mapping the Internet and Intranets

We’ve imputed a link that doesn’t exist

A

E F

D

B C

Page 24: Mapping the Internet and Intranets

24 of 75Mapping the Internet and Intranets

Data collection complaints• Australian parliament was the first to

complain• List of whiners (25 nets)• Military noticed immediately

– Steve Northcutt– arrangements/warnings to DISA and CERT

• These complaints are mostly a thing of the past– Internet background radiation

predominates

Page 25: Mapping the Internet and Intranets

25 of 75Mapping the Internet and Intranets

Visualization goals• make a map

– show interesting features– debug our database and collection

methods– hard to fold up

• geography doesn’t matter

• use colors to show further meaning

Page 26: Mapping the Internet and Intranets

26 of 75Mapping the Internet and Intranets

Page 27: Mapping the Internet and Intranets

27 of 75Mapping the Internet and Intranets

Page 28: Mapping the Internet and Intranets

28 of 75Mapping the Internet and Intranets

Infovis state-of-the-art in 1998• 800 nodes was a huge graph

• We had 100,000 nodes

• Use spring-force simulation with lots of empirical tweaks

• Each layout needed 20 hours of Pentium time

Page 29: Mapping the Internet and Intranets

29 of 75Mapping the Internet and Intranets

Page 30: Mapping the Internet and Intranets

75 slides

Visualization of the layout algorithm

Laying out the Internet graph

Page 31: Mapping the Internet and Intranets

31 of 75Mapping the Internet and Intranets

Page 32: Mapping the Internet and Intranets

75 slides

Visualization of the layout algorithmLaying out an intranet

Page 33: Mapping the Internet and Intranets

33 of 75Mapping the Internet and Intranets

Page 34: Mapping the Internet and Intranets

34 of 75Mapping the Internet and Intranets

A simplified map• Minimum distance spanning tree uses 80%

of the data

• Much easier visualization

• Most of the links still valid

• Redundancy is in the middle

Page 35: Mapping the Internet and Intranets

35 of 75Mapping the Internet and Intranets

Colored byAS number

Page 36: Mapping the Internet and Intranets

36 of 75Mapping the Internet and Intranets

Map Coloring• distance from test host

• IP address– shows communities

• Geographical (by TLD)

• ISPs

• future– timing, firewalls, LSRR blocks

Page 37: Mapping the Internet and Intranets

37 of 75Mapping the Internet and Intranets

Colored by IP address!

Page 38: Mapping the Internet and Intranets

38 of 75Mapping the Internet and Intranets

Colored by geography

Page 39: Mapping the Internet and Intranets

39 of 75Mapping the Internet and Intranets

Colored by ISP

Page 40: Mapping the Internet and Intranets

40 of 75Mapping the Internet and Intranets

Colored by distancefrom scanning host

Page 41: Mapping the Internet and Intranets

41 of 75Mapping the Internet and Intranets

US militaryreached by ICMP ping

Page 42: Mapping the Internet and Intranets

42 of 75Mapping the Internet and Intranets

US military networksreached by UDP

Page 43: Mapping the Internet and Intranets

43 of 75Mapping the Internet and Intranets

Page 44: Mapping the Internet and Intranets

44 of 75Mapping the Internet and Intranets

Page 45: Mapping the Internet and Intranets

45 of 75Mapping the Internet and Intranets

History of the Project• Started in August 1998 at Bell Labs

• April-June 1999: Yugoslavia mapping

• July 2000: first customer intranet scanned

• Sept. 2000: spun off Lumeta from Lucent/Bell Labs

Page 46: Mapping the Internet and Intranets

75 slides

YugoslaviaAn unclassified peek at a new

battlefield

Page 47: Mapping the Internet and Intranets

47 of 75Mapping the Internet and Intranets

Page 48: Mapping the Internet and Intranets

75 slides

Intranets: the rest of the Internet

Page 49: Mapping the Internet and Intranets

52 of 75Mapping the Internet and Intranets

The Pretty GoodWall of China

Page 50: Mapping the Internet and Intranets

53 of 75Mapping the Internet and Intranets

Page 51: Mapping the Internet and Intranets

54 of 75Mapping the Internet and Intranets

Page 52: Mapping the Internet and Intranets

55 of 75Mapping the Internet and Intranets

Page 53: Mapping the Internet and Intranets

56 of 75Mapping the Internet and Intranets

Page 54: Mapping the Internet and Intranets

57 of 75Mapping the Internet and Intranets

Page 55: Mapping the Internet and Intranets

58 of 75Mapping the Internet and Intranets

This wasSupposedTo be aVPN

Page 56: Mapping the Internet and Intranets

59 of 75Mapping the Internet and Intranets

Page 57: Mapping the Internet and Intranets

60 of 75Mapping the Internet and Intranets

Page 58: Mapping the Internet and Intranets

75 slides

Anything large enough to be called

an “intranet” isout of control

Page 59: Mapping the Internet and Intranets

62 of 75Mapping the Internet and Intranets

Case studies: corp. networksSome intranet statistics

Min MaxIntranet sizes (devices) 7,900 365,000Corporate address space 81,000 745,000,000% devices in unknown address space 0.01% 20.86%

% routers responding to "public" 0.14% 75.50%% routers responding to other 0.00% 52.00%

Outbound host leaks on network 0 176,000% devices with outbound ICMP leaks 0% 79%% devices with outbound UDP leaks 0% 82%

Inbound UDP host leaks 0 5,800% devices with inbound ICMP leaks 0% 11%% devices with inbound UDP leaks 0% 12%% hosts running Windows 36% 84%

Page 60: Mapping the Internet and Intranets

75 slides

Leak DetectionLumeta’s “special sauce”

Page 61: Mapping the Internet and Intranets

64 of 75Mapping the Internet and Intranets

Leak Detection

Internet intranet

Mapping hostA

Test hostB

mittD

C

• A sends packet to B, with spoofed return address of D

• If B can, it will reply to D with a response, possibly through a different interface

Page 62: Mapping the Internet and Intranets

65 of 75Mapping the Internet and Intranets

Outbound Leak Detection

Internet intranet

Mapping hostA

Test hostB

mittD

C

• Packet must be crafted so the response won’t be permitted through the firewall

• A variety of packet types and responses are used

• Either inside or outside address may be discovered

• Packet is labeled so we know where it came from

Page 63: Mapping the Internet and Intranets

66 of 75Mapping the Internet and Intranets

Inbound Leak Detection

Internet intranet

Mapping hostA

Test hostB

mittD

C

• This direction is usually more important

• It all depends on the site policy…

• …so many leaks might be just fine.

Page 64: Mapping the Internet and Intranets

67 of 75Mapping the Internet and Intranets

Inbound Leak Detection

Internet intranet

Mapping hostA

Test hostB

mittD

C

Page 65: Mapping the Internet and Intranets

68 of 75Mapping the Internet and Intranets

Some Lumeta lessons• Reporting is the really hard part

– Converting data to information• “Tell me how we compare to other clients”• Offering a service was good practice, for a

while• The clients want a device• We have >70 Fortune-200 companies and

government agencies as clients• Need-to-have vs. want-to-have

Page 66: Mapping the Internet and Intranets

69 of 75Mapping the Internet and Intranets

Honeyd – network emulation• Anti-hacking tools by Niels Provos at

citi.umich.edu

• Can respond as one or more hosts

• I am configuring it to look like an entire client’s network

• Useful for testing and debugging

• Product?

Page 67: Mapping the Internet and Intranets

75 slides

Open questions and future work

Page 68: Mapping the Internet and Intranets

71 of 75Mapping the Internet and Intranets

How do you analyze a large graph over time?

• Five years of Internet data, mostly unanalyzed

• Alternate paths to a target country

• Sample insight: “Poland was off the Internet yesterday”

• Placement of monitoring tools?

• Compute a display differences between two complex graphs

Page 69: Mapping the Internet and Intranets

72 of 75Mapping the Internet and Intranets

Visualizations• These graphs are too big for a piece of paper

• Various approaches available, but none really satisfactory

• Build visualization graph as the data comes in, and as the network evolves

Page 70: Mapping the Internet and Intranets

73 of 75Mapping the Internet and Intranets

Page 71: Mapping the Internet and Intranets

75 slides

Mapping the Internet and

IntranetsBill Cheswick

[email protected]

http://www.cheswick.com

Page 72: Mapping the Internet and Intranets

75 of 75Mapping the Internet and Intranets