boosting monitoring centers with ip metadata · monitoring solutions focus on your core business:...

26
Boosting Monitoring Centers with IP Metadata Jerome Tollet October 2011

Upload: others

Post on 14-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Boosting Monitoring Centers

with IP Metadata

Jerome Tollet

October 2011

Page 2: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

What is Network Intelligence Technology?

Feeding Detailed Traffic Visibility to Applications

Page 2

Applications using

metadata and content

feeds

Extracting traffic

metadata and content

Delivering

data

Metadata and

content feeds

IP traffic flows Decoding

protocols

Cyber

Security

Lawful

Interception

Data

Retention Other

Network Intelligence

Technology =

DPI + metadata extraction

+ content extraction Beyond DPI!

Page 3: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Network Intelligence:

An Enabling Technology for Interception Systems

Page 3

Intercepted

traffic

Network

Intelligence

Technology

Monitoring

center

Functions

User interface

Rendering of

communications

Storage

Correlation

Alerts

Functions

Advanced protocol decoding

Supports new/evolving protocols

Traffic classification

Extracts traffic metadata + content

Support for Gbps+ throughput

Network Intelligence

Technology =

DPI + metadata extraction +

content extraction

Page 4: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Network Intelligence Implementation Options

Page 4

Network Intelligence Technology for Monitoring Centers

Software

Development Kit

Developer tool

to embed Qosmos

into a system

ixMOS for

Monitoring Center

Extracts and delivers

metadata + content

in real time

Page 5: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Challenges for Monitoring Centers

Fact Challenge for MC vendors / LEA

1) Exponential growth in HI3 traffic Difficult to scale

2) Decoding software can be

targeted by cyber attacks and

intercepted traffic can be unclean

Need decoding software with built-in

“Triple R” capabilities and ability to

handle unclean traffic

3) Diversity and complexity of

communication applications and

protocols

Wide protocol support with continuous

updates

4) Increase in of number of targets

and communication services

Go beyond rendering of communications

and add support for investigations based

on automatic pattern analysis

Page 5

Page 6: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Exponential growth in Intercepted Traffic:

Use HI3 Load Balancer Based on NI to Scale

Intercepted traffic Monolithic MC

Decoding

Rendering

Intercepted

traffic

Load balancer +

Filter

By application

By IP@

MC1

MC2

Centralized

Rendering

System

Not scalable

Overloaded by

irrelevant traffic

Scalable

Optimized

Irrelevant traffic (IPTV, etc)

1 Gbps

10 Gbps

interface

Network Intelligence

Page 6

IP@

Page 7: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Implementation: Scalability Enabled

Operator 1

Qosmos-based

HI3 Load balancer

HI3 format

Application LB

Tunneled traffic

IP-address LB

Smart LB on traffic

metadata

Gbps interface

HI3

CC

Email

CC

VoIP

CC

IPTV

Email

MC

VoIP

MC

Service

MC

Mon.

Center

Server

Storage

Gbps

interface

Em

ail

CC

Operator 2

HI3

CC

Gbps

interface

LEA

Agent

Page 7

Page 8: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Benefits

Enables monitoring center to scale from Mbps to Gbps

Reduce by 90% the data volume managed by the monitoring center

Flexible: adapts to the MC vendor’s and LEA deployment

requirements

Load balancing by application

Load balancing by IP address

Load balancing using any traffic metadata

Page 8

Page 9: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Fact Challenge for MC vendors / LEA

1) Exponential growth in HI3 traffic Difficult to scale

2) Decoding software can be

targeted by cyber attacks and

intercepted traffic can be unclean

Need decoding software with built-in

“Triple R” capabilities and ability to

handle unclean traffic

3) Diversity and complexity of

communication applications and

protocols

Wide protocol support with continuous

updates

4) Increase in of number of targets

and communication services

Go beyond rendering of communications

and add support for investigations based

on automatic pattern analysis

Challenges for Monitoring Centers

Page 9

Page 10: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Challenge:

DPI Software Must Work Even Under Difficult Conditions

Page 10

Fragmented

Partial Must

continue

to work!

Unclean traffic

Malicious forging

Obfuscation

DDOS

Cyber Attacks

H

E

L

O

Client Server

Client Server HELO Normal SMTP

behavior

Packet by

Packet SMTP

Example: Need to handle packet-by-packet

Data

Canal

RTC

Satellite Operator

Infrastructure

Example: Need to decode unidirectional traffic

Monitoring

center

Page 11: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Tripe R: Accurate and Battle-Proof DPI/NI Technology

Tripe R = Resilience + Robustness + Reliability

ixEngine has been designed with Triple R in mind

Resilience

Functioning even under adverse external conditions

(e.g. maliciously forged packets or flows)

Robustness

Performing well during difficult situations (e.g.

incomplete traffic, SYN flood attacks)

Reliability

Adequately decoding traffic even under unusual

circumstances (e.g. tunnels, obfuscated traffic, non-

standard protocol behavior)

Page 11

Field-proven Technology

Based on continuous

feedback from Qosmos

users in all markets

(telecoms, enterprise,

government) and all regions

of the world

Page 12: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Benefits

Battle-proof: Built-in Tripe R = Resilience + Robustness + Reliability

Accuracy: Advanced protocol parsing drastically limits the risk of

missing a target

Field proven: Protocol parsing technology continuously facing real-

life intercepted IP traffic:

Wired networks / Mobile networks

EMEA, Americas, Asia

Continuously updated technology

Adapted to new traffic characteristics

New protocols and applications

Page 12

Page 13: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Fact Challenge for MC vendors / LEA

1) Exponential growth in HI3 traffic Difficult to scale

2) Decoding software can be

targeted by cyber attacks and

intercepted traffic can be unclean

Need decoding software with built-in

“Triple R” capabilities and ability to

handle unclean traffic

3) Diversity and complexity of

communication applications and

protocols

Wide protocol support with continuous

updates

4) Increase in of number of targets

and communication services

Go beyond rendering of communications

and add support for investigations based

on automatic pattern analysis

Challenges for Monitoring Centers

Page 13

Page 14: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Non standard protocols & applications

Growing number + constant evolution!

Use NI Technology to Outsource Diversity and Complexity of

Communication Protocols and Applications

Is it your core business to keep up with constantly evolving protocols and applications??

Standardized protocols

Few evolutions

Smtp, pop, sip, rtp…

Monitoring

Center

Core business

Enable fast investigation

Analyze networks of

communication

Display information

Role of

Network Intelligence

Support protocol &

application evolution

Support of regional

protocols

Page 14

Page 15: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Benefits of Embedding Network Intelligence Technology into

Monitoring Solutions

Focus on your core business: designing

solution for efficient investigation

Benefit from continuously updated protocol and

application parsing engine

Easy to integrate in your monitoring centers

Page 15

Page 16: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Fact Challenge for MC vendors / LEA

1) Exponential growth in HI3 traffic Difficult to scale

2) Decoding software can be

targeted by cyber attacks and

intercepted traffic can be unclean

Need decoding software with built-in

“Triple R” capabilities and ability to

handle unclean traffic

3) Diversity and complexity of

communication applications and

protocols

Wide protocol support with continuous

updates

4) Increase in of number of targets

and communication services

Go beyond rendering of communications

and add support for investigations based

on automatic pattern analysis

Challenges for Monitoring Centers

Page 16

Page 17: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Exponential Growth in the Number of Targets and

Communication Services

“Rendering” conversations is

no longer enough: need to

also analyze patterns of

communication

Limited number of LEA

agents: need to automate

investigation tasks

Page 17

Page 18: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Leverage Metadata!

Page 18

Explaining what is traffic metadata

Login

password Subject

Attached document name, type

file

Sender

Receiver

Text

Metadata Value

Login [email protected]

Password Qosmos

Subject Explaining what is

traffic metadata

Text Networks are the

common source of

data – and sometimes

Sender [email protected]

Receiver [email protected]

Contact list Roger, john, louise …

Contact

name

Roger Smith

Contact

address

[email protected]

List of contacts with name,

login, email@

60 online

Can analyze this

automatically!

Page 19: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Network Intelligence Enables Automation of Investigation

Process

Metadata can feed a database with:

Events

Contacts

Text messages

Dates

Any data contained in protocols

Rich metadata enables automated process with

Complex event processing

Data processing

Track more events with the same number of agents

Page 19

Explaining what is traffic metadata

Login

passwordSubject

Attached document name, type

f ile

Sender

Receiver

Text

List of contacts with name,

login, email@

60 online

Metadata Value

Login [email protected]

Password Qosmos

Subject Explaining what is

traf f ic metadata

Text Networks are the

common source of

data – and

sometimes …

Sender [email protected]

Receiver [email protected]

Contact list Roger, john, louise …

Contact

name

Roger Smith

Contact

adrress

[email protected]

m

Data

processing

CEP

Page 20: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Analyze Communication Patterns

Page 20

Login

Password

Email address

Content

Login

Password

Email address

Content

Login

Password

Email address

Content

Login

Password

Email address

Content

60 online

Contact List Presence

Page 21: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Increasing Number of Targets and Communications:

Use Metadata to Manage the Huge Amounts

Metadata feeds database

Easy to index

Easy to search / find

Easy to correlate, analyze

Metadata as an additional

layer to index

communication content

Metadata can even replace

communication content

Major storage savings!

Page 21

1) Entire traffic of an

Intercepted IP address

Webmail

IPTV

2) Relevant traffic only

e.g. Webmail

3) Relevant metadata only

Sender, receiver, date

Subject, text

Massive volume

Limited volume

Page 22: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Major storage savings!

Page 22

Read an email from a

webmail page = 2.27 MB Metadata Value

Sender [email protected]

Receiver [email protected]

Date 2011/02/09

Subject Metadata enables major

storage savings

Message Qosmos Network Intelligence

Technology extracts metadata

at all layers, from the network

layer to the application layer

(layer 7), in order to provide a

comprehensive understanding

of network flows at protocol,

application and user levels.

… …

Message36: Metadata enables major storage savings

Qosmos Network Intelligence Technology extracts metadata at all layers, from the network layer

to the application layer (layer 7), in order to provide a comprehensive understanding of network

flows at protocol, application and user levels.

Read an email with

metadata = 15 KB

1 : 150 ratio!

Ad

Page 23: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Benefits

Metadata enables automated investigation

To handle the exploding volume of events to track

Without huge increases in the number of agents

Metadata means more agile investigation

Investigate relationships between targets

Use data/text mining tools based on metadata

Storage savings using metadata instead of full packet payloads

Page 23

Network Intelligence supports

the strategic evolution of monitoring centers

Page 24: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Qosmos, Qosmos ixEngine, Qosmos ixMachine and Qosmos Sessionizer are trademarks or registered trademarks in France and other countries.

Other company and products name mentioned herein are the trademarks or registered trademarks of their respective owners. Copyright Qosmos 2010

Non contractual information. Products and services and their specifications are subject to change without prior notice

© Qosmos 2010

Thank You!

Page 24

Page 25: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Benefits of embedding Qosmos Network Intelligence

Technology & DPI

Page 25

Challenge Benefits of embedding Qosmos

Huge development effort to

implement DPI that is

-Accurate

-Robust

-Scalable

Ready to use, easy and fast to integrate

Hundreds of network protocols &

application variants, and 4500+

metadata recognized

Field proven technology up to core

network speeds (n x 10 Gbps)

Technology needs to be

constantly updated

Continuously updated protocols

SLA on updates when protocols evolve

In-house productivity tools to accelerate

protocol plugin development

Don’t worry about new protocols or applications

Embed DPI and Network Intelligence from Qosmos in your MC solutions

Page 26: Boosting Monitoring Centers with IP Metadata · Monitoring Solutions Focus on your core business: designing solution for efficient investigation Benefit from continuously updated

Checklist When Choosing a DPI/NI Technology Partner

Is the company well-established, with a stable customer base and

investors?

Is the business model aligned for strategic partnership?

Is the technology able to handle a large number of protocols,

applications and metadata?

Does the decoding engine support for all leading processor

architectures (Intel, NetLogic, Cavium, Tilera, etc.)?

Is the company able to provide development assistance and

worldwide technical support?

Page 26