Internet DRAFT - draft-li-cats-attack-detection

draft-li-cats-attack-detection




Cats Working Group                                        M.Li.
Internet-Draft                                                   H.Zhou
Intended status: Proposed Standard               S.Deng
Expires: June 13, 2024                                     W.Wang
                                          Beijing Jiaotong University
                                                            

              Computing-aware Traffic Steering for attack detection
                       draft-li-cats-attack-detection-00

Abstract

   This document describes the closed-loop framework for computing-aware 
   traffic steering for attack detection (CATS-AD). The computing-aware 
   traffic steering is determined by composing selected service 
   instances and overlay links. The service instances are selected 
   according to the computing power of service instances. This document 
   describes the closed-loop framework for attacks detection 
   and how to select and combine service instances to form a 
   computing-aware service function chain (SFC).

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

  This Internet-Draft will expire on June 13, 2023.

Copyright Notice

  Copyright (c) 2023 IETF Trust and the persons identified as the 
  document authors. All rights reserved.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

  This document is subject to BCP 78 and the IETF Trust's Legal 
  Provisions Relating to IETF Documents 
  (https://trustee.ietf.org/license-info) in effect on the date of 
  publication of this document. Please review these documents 
  carefully, as they describe your rights and restrictions with respect 
  to this document. Code Components extracted from this document must  
  include Revised BSD License text as described in Section 4.e of 
  the Trust Legal Provisions and are provided without warranty as  
  described in the Revised BSD License.

Table of Contents
 
  1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  CATS-AD Framework and Components . . . . . . . . . . . . .4
     3.1.  Service Sites and Service Instances . . . . .   5
     3.2.  CATS-Network Metric Agent (C-NMA). . . . . . . . . .  5
     3.3.  CATS-Path Selector (C-PS) . . . . . . . . . . . . . . . . .6
     3.4.  CATS service instances manager (C-SM). . . . . 6
     3.5.  CATS Manager (CM) . . . . . . . . . . . . . . . . . . .6
     3.6.  CATS Classifier (CC) . . . . . . . . . . . . . . . . . . . .6
   4.  CATS-AD Framework Workflow. . . . . . . . . . .7
   5.  Security Considerations . . . . . . . . . . . . . . . . . .8
   6.  IANA Considerations . . . . . . . . . . . . . . 9
   7. References  . . . . . . . . . . . . . . . . . . . . . 9
     7.1.  Normative References . . . . . . . . . . . . . . .  9
     7.2.  Informative References . . . . . . . . . . . .  9
   Acknowledgments . . . . . . . . . . . . . . . . . . .  9
   Author's Addresses. . . . . . . . . . . . . . . .10

1. Introduction

   In this document, the computing power includes 
   service instances' detection results, traffic features, 
   and resource usage status. In the    
   CATS-AD framework, the CATS path selector (C-PS) can select 
   service instances based on their computing power, 
   form computing-aware high-level branching path policies and 
   send such data to the CATS service instances manager (C-SM). 
   The C-SM translates high-level branching path policies 
   into low-level branching path policies and 
   sends the low-level branching path policies to CATS manager (CM), 
   in which the CM transforms the low-level branching path policies 
   into the flow tables and deliver the flow tables to the CATS 
   classifier (CC) and service instances. The CC and service 
   instances receive flow tables and service instances are connected 
   sequentially to form computing-aware service    
   function chains (SFC) according to the flow tables
   [I-D. ietf-cats-computing-aware-sfc-usecase].

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

   The computing-aware service instances in the computing-aware SFCs 
   include various malicious traffic detection modules and firewall, 
   which are used to detect different types of malicious traffic, 
   such as DDoS attacks. The traffic is first directed to 
   the computing-aware  SFC through the CC, and 
   then sequentially passes through the selected 
   computing-aware service instances to complete 
   attack detection. Based on the computing power,    
   the C-PS adjust the branching path policies to improve the malicious    
   traffic detection capability. Thus, the framework can form a 
   closed-loop architecture. This document mainly introduces 
   the closed-loop CATS-AD framework and how to select and 
   combine service instances based on 
   the computing-aware service instances.

2. Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", 
   "SHALL NOT", "SHOULD", "SHOULD NOT", 
   "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in BCP14 
   [RFC2119] [RFC8174]. 
   This document makes use of the 
   following terms: Computing-Aware Traffic Steering for 
   Attack Detection (CATS-AD): A traffic engineering 
   approach [I-D. ietf-cats-framework-03] that considers 
   detection results, traffic features, and resource usage  
   status to optimize computing-aware service function
   chains (SFCs) for various security requirements.

   Service instance: An instance is a computing-aware security 
   module that typically run in a service site. 
   Different service sites have different detection capability 
   and apply to various types of attacks, 
   such as DDoS attacks.

   Service site: A service site consists of a service instance and 
   CATS-forwarder, which is required to 
   provide security services.

   CATS-forwarder:A network device that directs traffic to 
   different service sites in the correct order.

   CATS-Network Metric Agent (C-NMA):A functional entity responsible for    
   collecting computing power information, which includes 
   detection results and resource usage status, 
   and for reporting them to a CATS path selector (C-PS).

   CATS path selector (C-PS): A computational logic that selects and 
   combines service instances, generates branching path information 
   based on the detection results, traffic features, 
   and resource usage status.    
   Subsequently, the path information can be delivered to both CATS  
   service instances manager (C-SM) and CATS Manager (CM) 
   for the creation of the flow tables.

   CATS service instances manager (C-SM):An entity that controls 
   and manages service instances, which translates a high-level 
   branching path policy into the corresponding 
   low-level path policy.

   CATS Manager (CM):An entity that receives the path information of 
   low-level policy and updates the flow tables. Based on the 
   flow tables, the CM decides how to modify the 
   original rules for incoming 
   new traffic to guide attack traffic detection.

   CATS classifier (CC):An entity that is responsible for guiding the 
   packets along a computing-aware SFC and deciding packets 
   arrive at which destination host.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

3. CATS-AD Framework and Components

   Facing with attackers' traffic requests, the CATS-AD provides 
   computing-aware SFCs on demand to meet security 
   requirements based on detection results, 
   traffic features, and resource usage status. The main CATS-AD 
   functional elements and their interactions are shown in Figure 1.

+------------------------------------------------------------------+
|   +---------+     +---------+     +---------+     +---------+    |
|   |         |     |         |     |         |     |         |    |
|   |  C-NMA  +---->+  C-PS   +---->+  C-SM   +---->+   CM    |    |
|   |         |     |         |     |         |     |         |    |
|   +---------+     +-------+-+     +-------+-+     +---------+    |
+-------+-------------------|---------------|----------------------+
        ^                   |               |
        |                   v               v
+-------+-------------------+---------------+----------------------+
|                                                    +-----------+ |
| +-----------+   +-------------+  +-------------+   |Destination| |
| |Attack host|   | +---------+ |  | +---------+ |   |    host   | |
| +----+------+   | |  CATS   | |  | |  CATS   | |   +----+------+ |
|      |          | |Forwarder| |  | |Forwarder| |        ^        |
| +----v-----+    | +---------+ |  | +---------+ |  +-----+------+ |
| |Ingress CC|    | +---------+ +->+ +---------+ |  | Egress CC  | |
| +----+-----+    | | Service | |  | | Service | |  +-----+------+ |
|      |          | | instance| |  | | instance| |        ^        |
+------v-------+  | | (BCSM)  | |  | | (ACSM)  | |  +--------------+
|| +---------+ +->+ +---------+ |  | +---------+ +->+ +---------+ ||
|| |  CATS   | |  +-------------+  +-------------+  | |  CATS   | ||
|| |Forwarder| |                                    | |Forwarder| ||
|| +---------+ |  +-------------+  +-------------+  | +---------+ ||
|| +---------+ |  | +---------+ |  | +---------+ |  | +---------+ ||
|| | Service | |  | |  CATS   | |  | |  CATS   | |  | | Service | ||
|| | instance| |  | |Forwarder| |  | |Forwarder| |  | | instance| ||
|| | (LCSM)  | +->+ +---------+ +->+ +---------+ +->+ | Firewall| ||
|| +---------+ |  | +---------+ |  | +---------+ |  | +---------+ ||
+--------------+  | | Service | |  | | Service | |  +--------------+
| Service site    | | instance| |  | | instance| |   Service site  |
|                 | | (DCSM)  | |  | | (NCSM)  | |                 |
|                 | +---------+ |  | +---------+ |                 |
|                 +-------------+  +-------------+                 |
|                  Service site     Service site                   |
+------------------------------------------------------------------+
Figure 1 CATS-AD Functional Components

3.1 Service Sites and Service Instances

   The service site consists of CATS-forwarders and service instances. 
   The CATS-forwarders direct traffic to different service sites 
   in the correct order. The service instances 
   are used to host specific network functions or services, 
   in which these network 
   functions are typically run in a virtualized manner, 
   (i.e. containers). The containers contain one or more 
   specific service instances, such as computing-aware 
   security modules. The service instances have 
   low-rate attack computing-aware 
   security module (LCSM), application computing-aware 
   security module (ACSM), botnet computing-aware security 
   detection module (BCSM), network attack computing-aware 
   security module (NCSM), DRDoS computing-aware security module 
   (DCSM), and firewall. The LCSM detects slow body, shrew, 
   slow headers, and slow read attacks. The ACSM detects 
   CC, HTTP-Get, HTTP-Post, and HTTP-Flood attacks. 
   The BCSM detects Ares, Byob, Mirai, and Zeus attacks. 
   The NCSM detects ACK, UDP, and SYN attacks. 
   The DCSM detects TFTP, SSDP, NTP, and Chargen attacks. 
   The firewall inspects packet payloads and makes decisions 
   on whether to forward or discard the packets. 
   The service sites receive the low-level branching 
   path policy of the  C-SM to configure the service site to 
   implement detection traffic.


3.2 CATS-Network Metric Agent (C-NMA)

   The C-NMA is a functional component that gathers 
   computing power information. The computing power information 
   includes service instances' detection results, traffic 
   features, and resource usage status 
   [I-D. ietf-i2nsf-intelligent-detection-00]. 
   The service instances' detection results reflect the 
   detection performance of the detection module, 
   which are the service instances' accuracy, 
   precision, and recall etc. The traffic features are network traffic 
   attributes and aid in the detection of anomalies and 
   security analysis, which includes packet rate, 
   average packet length, source IP entropy, 
   and destination port entropy etc. 
   The resource usage status reflects the performance of 
   computing-aware SFCs, which includes CPU utilization rate, 
   memory utilization rate, TTL entropy, and packets variance etc.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

3.3 CATS-Path Selector (C-PS)

   The C-PS utilizes computing power information collected by the C-NMA 
   to select the optimal branching path and infer the branching 
   path policy, which can then be delivered to both C-SM and CM to 
   create the flow tables. An algorithm is used to select the best main 
   path for the computing-aware SFC. The implementation details of this 
   algorithm are not elaborated on in the draft. Once the main path 
   is generated, the C-PS can obtain the detection results for 
   each service instance, which serves as a basis for determining 
   whether a service instance (i.e., LCSM in Figure 1) functions 
   as a branching point. The detected attack traffic is directed 
   through branching paths 
   (i.e., DCSM and NCSM as shown in Figure 1) 
   for detection and then forwarded to the firewall for blocking.


3.4 CATS service instances manager (C-SM)

   The C-SM can extract the high-level branching path policy 
   attributes, perform data transformation, and generate 
   low-level branching path policies 
   [I-D. ietf-i2nsf-security-management-automation]. 
   The C-SM extracts attributes from the high-level policy, matches 
   them with corresponding IP addresses, and transforms them 
   into specific path information. Subsequently, the C-SM sends 
   this data to the CM for further path policy conversion.


3.5 CATS Manager (CM)

   The CM receives path policy information from the C-SM and 
   converts it into flow tables, which are subsequently deployed 
   to the CATS-classifiers and CATS-forwarders. The flow tables 
   are collectively determined by integrating classification 
   criteria and path information from the path policy. 
   The CATS-classifiers route different types of traffic through 
   distinct SFCs based on characteristics such as IP addresses, 
   port numbers, protocol numbers, and so on. The role of the 
   CATS-forwarders has been explained in section 3.1.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

3.6 CATS Classifier (CC)

   The CATS-classifiers have ingress classifier and egress classifier. 
   In the ingress classifier, the flow table guides the packets 
   passing through a path, and the forwarders are responsible 
   for forwarding the traffic. In the egress classifier, 
   the flow table decides which packets arrive at 
   which destination host.

4.CATS-AD Framework Workflow

   When network exsits DDoS attacks, the C-SM sends 
   subscription commands to the service sites and collects 
   computing power information from service sites. The algorithm 
   processes and analyzes these data to provide the optimal 
   branching path. The C-SM translates the paths into high-level 
   policies and sends them to the CM. The C-SM extracts data 
   from the high-level policies. This data is then mapped to 
   corresponding path data and generates low-level policies. 
   The path information of the low-level policies is transmitted 
   to the CM to update the flow tables. Subsequently, 
   the flow tables can be passed to the service sites, which use 
   them to forward traffic to the selected service instances. 
   Each computing-aware service instance follows the same 
   operational flow in Figure 2, whereas their detection methods 
   are different. Further details on the computing-aware service 
   sites are described as follows 
   [Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior]:

      +---------+      +-----------------------------------------+
+---->+  C-NMA  |      |                                         |
|     +----+----+      |                                         |
|          |           |                                         |
|          v           |  +-------------+   +-----------------+  |
|     +----+----+      |  |   parsing   |   |     feature     |  |
|     |  C-PS   |      |  |   module    +-->+   extraction    |  |
|     +----+----+      |  +-------------+   +--------+--------+  |
|          |           |                             |           |
|          v           |                             |           |
|     +----+----+      |                             v           |
|     |  C-SM   |      |  +-------------+   +--------+--------+  |
|     +----+----+      |  |   feature   |   |      data       |  |
|          |           |  |  selection  +<--+  preprocessing  |  |
|          v           |  +------+------+   +-----------------+  |
|     +----+----+      |         |                               |
|     |   CM    |      |         |                               |
|     +----+----+      |         v                               |
|          |           |  +------+------+   +-----------------+  |
|          v           |  | well-trained|   |    Security     |  |
|  +---------------+   |  |    model    +-->+    detection    |  |
|  | +-----------+ |   |  +-------------+   +--------+--------+  |
|  | |    CC     | |   |                             |           |
|  | +-----------+ |   |                             |           |
|  | +-----------+ |   |                             v           |
|  | |   CATS    | |   |  +-------------+   +--------+--------+  |
|  | | Forwarder | |   |  |    drop     |   |    Computing    |  |
|  | +-----------+ |   |  |    flow     +<--+  power metrics  |  |
|  | +-----------+ |   |  +-------------+   +-----------------+  |
|  | |  Service  | |   |                                         |
+----+  instance +---->+                                         |
   | +-----------+ |   |                                         |
   +---------------+   +-----------------------------------------+

Figure 2 CATS-AD Framework Workflow

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

   1.The parsing module is responsible for listening to 
    transmitted traffic. Additionally, a network diagnostic tool 
    periodically collects raw traffic using a pcap file.
   2. A network traffic analysis tool extracts flow-based
   features based raw traffic, including statistical attributes, 
   e.g., timestamp, source port, destination port, source IP, 
   destination IP, flow duration, max, mean, and 
   min values of packet's size.
   3. To ensure data quality, data preprocessing is 
   responsible for cleaning flow-based features, 
   including normalization and standardization.
   4. The next step involves feature selection. Feature selection 
   aims to extract and gather the most representative 
   network features for detection in each 
   computing-aware security module. 
   5. The selected features are extracted into the 
   well-trained model to finely classify the traffic. 
   A well-trained model is a machine learning or deep learning 
   model trained on sufficient historical attack traffic and 
   can accurately classify new attack traffic. 
  6. The well-trained model can automatically learn the nonlinear 
   relationship between the selected features, which can 
   quickly complete coarse-grained and fine-grained detections. 
   Coarse-grained detection refers to all computing-aware 
   security modules distinguishing attack traffic from benign traffic, 
   and fine-grained detection is that attack traffic 
   should be classiffied as specific types. 
  7. The well-trained model's computing power metrics are 
   precision, recall, malicious traffic detection capability (MTDC), 
   and F1-score. 
  8. If SIP, DIP, SP, DP, and Pro traffic features are in the blacklist, 
  the malicious traffic will be dropped, in which normal traffic 
  has not interfered with attack traffic, and benign traffic 
  can smoothly reach the destination hosts.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

5. Security Considerations

   Attackers may pose various threats to the operation of 
   the CAT-AD framework, including the theft or tampering of 
   information collected by C-NMA, which is crucial for network 
   management and service delivery. Therefore, CATS-AD should 
   be equipped with anti-attack capabilities to defend against 
   intruders' attacks, ensuring the security of computational and 
   network information, as well as the reliability 
   and stability of the network.


6. IANA Considerations

   This document has no IANA actions

7. References

    
7.1 Normative References
 
   [RFC2119] Bradner, S., "Key words for use in RFCs
   to Indicate Requirement Levels", BCP 14, RFC 2119, 
   DOI 10.17487/RFC2119, March 1997, 
   <https://www.rfceditor. org/info/rfc2119>.

   [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase 
   in RFC 2119 Key Words", BCP 14, RFC 8174, 
   DOI 10.17487/RFC8174, May 2017, 
   <https://www.rfc-editor.org/info/rfc8174>.

7.2 Informative References

    [I-D. ietf-cats-computing-aware-sfc-usecase]
           S. Zhang, X. Chen, "Use Cases of Computing-aware Service 
           Function Chaining (SFC)", Work in Progress, Internet-Draft, 
           draft-zhang-cats-computing-aware-sfc-usecase-00, 
           September 2023.

    [I-D. ietf-cats-framework-03] 
           C. Li, Z. Du, M. Boucadair, L. M. Contreras, J. Drake, 
           G. Huang, and G. Mishra, "A Framework for Computing-Aware 
           Traffic Steering (CATS)", Work in Progress, Internet-Draft, 
           draft-ldbc-cats-framework-03, August 2023.

    [I-D. ietf-i2nsf-intelligent-detection-00] 
           W.Wang, H.Zhou, M.Li, Q.Guo, S.Deng, "YANG Data Models for 
           Attacks Intelligent Detection", 
           Work in Progress, Internet-Draft, 
           draft-wang-i2nsf-intelligent-detection, February 2023.

   [I-D. ietf-i2nsf-security-management-automation] 
          Jeong, J. (., Lingga, P., and J. Park, "An Extension of I2NSF 
          Framework for Security Management Automation 
          in Cloud-Based Security Services", 
          Work in Progress, Internet-Draft, 
          draft-jeong-i2nsf-security-management-automation-04, 
          25 July 2022.

   [Two-Stage Intelligent Model for Detecting Malicious DDoS Behavior] 
          Li, M.; Zhou, H.; Qin, Y. Two-Stage Intelligent Model for 
          Detecting Malicious DDoS Behavior. Sensors 2022, 22, 2532.

Li, et al.            Expires June 13, 2024                [Page 1]

Internet-Draft   Attack detection     October 2023

    8. Acknowledgments

   TBC

Author's Addresses


   Man Li
   Beijing Jiaotong University
   Beijing
   Phone: <86-18810911698>
   Email: 20111018@bjtu.edu.cn


   Huachun Zhou
   Beijing Jiaotong University
   Beijing
   Phone: <86-13718168186>
   Email: hchzhou@bjtu.edu.cn

   Shuangxing Deng
   Beijing Jiaotong University
   Beijing
   Phone: <86-13040062046>
   Email: 21120038@bjtu.edu.cn

  Weilin Wang
  Beijing Jiaotong University
  Beijing
  Phone: <86-15910887582>
  Email: 21111026@bjtu.edu.cn