Internet Monitoring System (IMS)
Prepared by Betha Aris <betha.aris@IEEE.org>
Key Point
Intercepting Internet traffic with 100 Gbps speed Hardware-based interception (front-end) Software-based control and monitor (back-end) Realtime Deep Packet Capture/Inspection Data Warehouse Business Intelligence Data Mining
Criterias
Capturing each packet (real-time and without loss) Time-stamping each packet with nanosecond precision Recognizing the sources, destination and protocol Filtering for duplicating packet (relevant packets) Slicing packets to multiple CPUs for processing Recording each packet to disk
Challenges
With 30 million packets (@20Gbps), it means these tasks need to be completed for a packet every 30 nanoseconds. With 10 Gbps in both directions, at least 25 Giga Bytes of data per seconds. It means we need at least 2.160 Tera Bytes of data per day.
Processes
Capturing with passive probe Filtering Mediation and Handover Reconstruction Analysis Back-End Reporting (Software-based
Front-End (Hardware-based Intelligence System)
Intelligence System)
Filtering Criterias
Parameters for Identifying Username & Network Access Identifier L2 L7 Protocol (MAC, VPN, MPLS, IPV4/6, UDP/TCP, FTP, HTTP, DHCP etc) Dial-in Calling Number Identity Cable Modem Identity Generic Keyword Spotting (Regular Expression) RADIUS (Subscribers name) Email (POP, IMAP, SMTP) Webmail Sender and Its Contents Chat/IM Conversation VoIP Encrypted Protocols (Skype, Torrent, VPN and SSL)
Conceptual Framework
Capturing data from the source Filtering Data (Deep Packet Inspection) Decoding and processing data Indexing and data storage Refining data through multiple interactive analysis
Giga Interface Network Processing Units Data Mining & Text Mining Data Warehouse Business Intelligence
Front-End (Provider Edge)
Multiple passive taps (copper/fibre @10Gbps) Multiple network probe (@10Gbps) Mediation Server Network Elements (Switches, Routers, Racks, etc)
Front-End Capabilities
Passive interception IP probes with on-board DPI L2 L7 Protocol detection IP Protocol stack interception MPLS, VLAN, VPN interception
Back-End (LEA Operational Center)
Storage Monitoring Systems Analysis Result Reporting Other customization needs
How IMS Works
Proposed Network Topology
Can be changed based on further requirements/identifications
How NPUs Works
How Indexing Works
Proof of Concept