organisations the network manager will carry out
this task manually, using the current generation of
network monitoring tools. In essence, the network
manager will be expected to learn through
observation the “normal” signs of operation, and
also to spot any variation from “normality” in
sufficient time to react effectively. The most popular
network monitoring tools make use of the Simple
Network Management Protocol (SNMP) in one of its
variants, and monitoring in this situation is a case of
observing trends in the various counters and related
data, with anomalies being revealed as changes in
those trends.
This is a skill which develops over time and with
experience, but unfortunately, the most common
experience is that the onset of a real attack is the first
practical experience many network managers have,
they “learn through doing” in a very direct fashion.
We argue that it is desirable to have a more
structured approach to learning, and we borrow from
the “flight simulator” style of training to propose a
means by which novice network managers can
practice their skills in a controlled environment. We
have developed such a training tool, described in
detail elsewhere, this paper describes how we have
incorporated the effects of a DOS attack into that
tool, to give a student network manager the
opportunity to recognise these symptoms and to
practice their response to the attack.
Our network management simulator tool uses a
combination of synthetically varied SNMP
Management Information Base (MIB-2) objects and
external “messages from other systems and users”
(themselves produced according to a pre-set script),
to create the effect of different network scenarios.
The details of the simulation process has been
described elsewhere
(Pattinson, 2000), where we
also make it clear that we use an existing SNMP-
capable network management platform to collect
and display data from our simulated SNMP data set.
In the case described in this paper, we show how
these input stimuli are manipulated to create the
impression of a DOS attack.
The structure of this paper is as follows: we state the
need to detect and respond to DOS attacks, including
a review of current work in automated detection
systems; we then present the results of our analysis
of the symptoms of such attacks, with particular
reference to the effect on observed SNMP data; we
then describe how these symptoms are represented
in our simulation system, together with the other
related symptoms; we conclude with an analysis of
the effectiveness of our approach and a description
of further work.
2 EARLY ATTACK DETECTION
Early detection of attacks or other anomalies which
could harm a network in some way is the subject of
much current research.
An automated system which is able to recognise and
prevent attacks or other anomalies, and work with
already standardized mechanisms for network
management, is preferable to those systems and
projects whose goal is to design new hardware
equipment such as D-WARD (UCLA, 2002). Some
research groups, such as MINDS, (University of
Minnesota, 2003) use more than one mechanism to
gather data about network behaviour such as
sniffers, syslog, tcpdump or net-flow (capturing
packet headers) while this offers better
understanding of what is really going on in each
packet, it makes the overall system more complex –
data has to be gathered and processed from different
sources. Dokas et al (2001) report work on the
detection of anomalies by setting threshold values
and treating an overstepping of this threshold as an
event worthy of further investigation. The major
concern with these automated systems is that of
reliability – in this context meaning identifying (and
not responding to) false alarms, while remaining
sufficiently alert to detect genuine problems early
enough to mount a defence. Typically, this leads to
the MINDS approach of gathering more, and
different, data, but for our work we are interested in
the situation where the (human) Network Manager
relies on manual interpretation of data, and on
SNMP MIB-2 data alone.
Our research has used only MIB-2 instances to
discover anomalies in the behaviour of network
protocols and resources. The reason for this is that
MIB-2 is a standardised database already installed
on many pieces of network equipment. If all network
devices (routers, switches, PCs etc.) are MIB-2
capable it might be possible to detect an attack or
other anomaly in its early development stages,
allowing enough time to prevent any serious damage
to the attacked systems. Many attacks come from
outside a secured network and are delivered through
network gateways.
Clearly, the collection of counters in MIB-2 (located
at various points across the network) will show the
impact of any attempt to overload a device within
the network. Although this impact will be most
obvious at the node being attacked (as we show
below), there will also be (probably lesser) impacts
on the near neighbour nodes, and particularly on the
gateway router devices. In view of the possible
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
270