SlideShare a Scribd company logo
Visualizing Network Flows and Related
Anomalies in Industrial Networks using
Chord Diagrams and Whitelisting
M. Iturbe, I. Garitano, U. Zurutuza, R. Uribeetxeberria
Electronics & Computing Department
Faculty of Engineering
Mondragon University
IVAPP 2016, Rome, Italy
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Agenda
1. Introduction
2. System Description
3. Results
4. Conclusions
2
Introduction
.
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Industrial Control Systems
CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz
4
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Fieldbus Network
Control Network
Demilitarized Zone
Corporate Network
Internet
PLC PLCPLC
HMI
Control
Server Engineering
Workstation
HistorianData Server
Field equipment
Workstations
Corporate
Servers
FieldDevicesFieldControllersSupervisoryDevices
5
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
ICS vs. IT
Industrial Networks IT Networks
Main Purpose
Control of Physical equip-
ment
Data processing and trans-
mission
Failure Severity High Low
Reliability Required High Moderate
Determinism High Low
Data Composition
Small packets of periodic and
aperiodic traffic
Large, aperiodic packets
Average Node Complexity
Low (simple devices, sensors,
actuators)
High (large servers/file sys-
tems/databases)
6
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Whitelisting
Refers to the practice of registering the set of network
flows that are allowed in a network, raising an alarm
or disallowing connections that have not been
explicitly allowed.
7
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Whitelisting
• Recommended security measure by the industry.
• Barbosa et al. [1] demostrated its efficiency to detect flow
anomalies.
8
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Chord diagrams
9
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Chord diagrams
• Conceived initially for genomics
• Previous usage on security visualizations
• ADS visual comparison [4]
• Relationships between Phishing websites [3]
• Relationships between IT subnets [2]
10
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Objectives
• Gaps in related literature
• No security visualizations for Industrial Networks
• Previous works based on whitelisting only detect forbidden
connections
• Objectives
• Provide situational awareness through flow visualizations
• Design a visual flow anomaly detection system
• Detect flow anomalies through temporal whitelists
• Visually highlight detected anomalies
11
System Description
.
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Overview
Industrial
Network
Flow
Collector
Network
Flows
Tagged
Flows
Whitelists
Chord
Diagrams
Flow packets
Learning phase
Flow data Detection phase
Visualization
phase
Online
Offline
13
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Learning Phase
• Whitelists are formed with the detected network traffic.
• Source/Destination IP, Server port, IP protocol and packet
number
• Whitelists of variable time length.
14
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Detection Phase
• The system evaluates and tags incoming flows comparing
them to the whitelists
• Types of tags
• Legitimate flow
• Anomalous flow
• Incorrect port
• Incorrect protocol
• Absent flow
• Anomalous flow size
• The system triggers an alarm if a non-legitimate flow is
detected
15
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Visualization Phase
• The system builds the diagrams based on the tagged
flows:
• A host → A section in the circumference
• Each host type has a distinctive color group
• A bidirectional flow → A chord
• Chords inherit the color of the more active host in the
communication
• Highlights non-legitimate flows:
• Missing flows, in black
• The rest, in red
16
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Visualization Phase
(a) Forbidden flow between
PLC 1 and HMI 2.
(b) Detail of the forbidden
flow.
17
Results
.
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Test network
Switch 2
Switch 1 Gateway
19
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Tools
• NetFlow v5
• Logstash
• ElasticSearch
• D3
20
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Denial of Service
21
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Network scan
22
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Downed host
23
Conclusions
.
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Conclusions
• We propose a visual monitoring system based on
whitelists and chord diagrams for ICSs.
• Collected flows in a time window are tagged and
visualized.
• Highlighting anomalous ones.
25
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
Future work
• Distinguish more anomalous flow types.
• Research into re-creation of whitelists or its edition
consequences.
26
Thank you.
{miturbe,igaritano,uzurutuza,ruribeetxeberria}
@mondragon.edu
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
References I
Rafael Ramos Regis Barbosa, Ramin Sadre, and Aiko Pras.
Flow Whitelisting in SCADA Networks.
International Journal of Critical Infrastructure Protection,
6(3):150–158, 2013.
Siming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna
Schaefer, and Thomas Ertl.
OCEANS: online collaborative explorative analysis on
network security.
In Proceedings of the Eleventh Workshop on Visualization
for Cyber Security, pages 1–8. ACM, 2014.
28
. . . . . . . .
Introduction
. . . .
System Description
. . . . .
Results Conclusions
References II
Robert Layton, Paul Watters, and Richard Dazeley.
Unsupervised authorship analysis of phishing webpages.
In Communications and Information Technologies (ISCIT),
2012 International Symposium on, pages 1104–1109. IEEE,
2012.
Johan Mazel, Romain Fontugne, and Kensuke Fukuda.
Visual comparison of network anomaly detectors with
chord diagrams.
In Proceedings of the 29th Annual ACM Symposium on
Applied Computing, pages 473–480. ACM, 2014.
29

More Related Content

PPTX
Object oriented programming 13 input stream and devices in cpp
PPTX
Introduction To The IBM IoT Foundation
PPTX
Industrial Ethernet, Part 1: Technologies
PPT
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
PDF
Network visibility and control using industry standard sFlow telemetry
PDF
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
PDF
[White paper] detecting problems in industrial networks though continuous mon...
PDF
Traffic analysis for Planning, Peering and Security by Julie Liu
Object oriented programming 13 input stream and devices in cpp
Introduction To The IBM IoT Foundation
Industrial Ethernet, Part 1: Technologies
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
Network visibility and control using industry standard sFlow telemetry
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
[White paper] detecting problems in industrial networks though continuous mon...
Traffic analysis for Planning, Peering and Security by Julie Liu

Similar to Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting (20)

PPTX
BGP FlowSpec experience and future developments
PPTX
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
PDF
Kentik Network@Scale (Dan Ellis)
PDF
Network Security and Visibility through NetFlow
PPT
Network Security Data Visualization
PDF
Introduction to Network Diagramming
PDF
Waterfall: Rapid identification of IP flows using cascade classification
PDF
Flow Monitoring Tools, What do we have, What do we need?
PPTX
Applied Detection and Analysis Using Flow Data - MIRCon 2014
PDF
Clustering-based Analysis for Heavy-Hitter Flow Detection
PDF
SFA: Stateful Forwarding Abstraction in SDN Data Plane
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
PDF
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
PDF
ICCT2017: A user mode implementation of filtering rule management plane using...
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
PDF
slides-117-anrw-sessb-daisy-practical-anomaly-detection-in-large-bgpmpls-and-...
PDF
25 years of firewalls and network filtering - From antiquity to the cloud
PDF
Network Security Data Visualization
BGP FlowSpec experience and future developments
Threat_actors_and_vectors_with_whiiteandblack_boxtesting.pptx
Kentik Network@Scale (Dan Ellis)
Network Security and Visibility through NetFlow
Network Security Data Visualization
Introduction to Network Diagramming
Waterfall: Rapid identification of IP flows using cascade classification
Flow Monitoring Tools, What do we have, What do we need?
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Clustering-based Analysis for Heavy-Hitter Flow Detection
SFA: Stateful Forwarding Abstraction in SDN Data Plane
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
A HYBRID APPROACH COMBINING RULE-BASED AND ANOMALY-BASED DETECTION AGAINST DD...
IT Monitoring in the Era of Containers | Luca Deri Founder & Project Lead | ntop
ICCT2017: A user mode implementation of filtering rule management plane using...
Implementation of ICMP flood detection and mitigation system based on softwar...
slides-117-anrw-sessb-daisy-practical-anomaly-detection-in-large-bgpmpls-and-...
25 years of firewalls and network filtering - From antiquity to the cloud
Network Security Data Visualization
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
sap open course for s4hana steps from ECC to s4
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
Ad

Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting

  • 1. Visualizing Network Flows and Related Anomalies in Industrial Networks using Chord Diagrams and Whitelisting M. Iturbe, I. Garitano, U. Zurutuza, R. Uribeetxeberria Electronics & Computing Department Faculty of Engineering Mondragon University IVAPP 2016, Rome, Italy
  • 2. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Agenda 1. Introduction 2. System Description 3. Results 4. Conclusions 2
  • 4. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Industrial Control Systems CC-BY-SA 3.0 Kreuzschnabel, Schmimi1848, Wolkenkratzer, Brian Cantoni, Hermann Luyken, Beroesz 4
  • 5. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Fieldbus Network Control Network Demilitarized Zone Corporate Network Internet PLC PLCPLC HMI Control Server Engineering Workstation HistorianData Server Field equipment Workstations Corporate Servers FieldDevicesFieldControllersSupervisoryDevices 5
  • 6. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions ICS vs. IT Industrial Networks IT Networks Main Purpose Control of Physical equip- ment Data processing and trans- mission Failure Severity High Low Reliability Required High Moderate Determinism High Low Data Composition Small packets of periodic and aperiodic traffic Large, aperiodic packets Average Node Complexity Low (simple devices, sensors, actuators) High (large servers/file sys- tems/databases) 6
  • 7. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Whitelisting Refers to the practice of registering the set of network flows that are allowed in a network, raising an alarm or disallowing connections that have not been explicitly allowed. 7
  • 8. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Whitelisting • Recommended security measure by the industry. • Barbosa et al. [1] demostrated its efficiency to detect flow anomalies. 8
  • 9. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Chord diagrams 9
  • 10. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Chord diagrams • Conceived initially for genomics • Previous usage on security visualizations • ADS visual comparison [4] • Relationships between Phishing websites [3] • Relationships between IT subnets [2] 10
  • 11. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Objectives • Gaps in related literature • No security visualizations for Industrial Networks • Previous works based on whitelisting only detect forbidden connections • Objectives • Provide situational awareness through flow visualizations • Design a visual flow anomaly detection system • Detect flow anomalies through temporal whitelists • Visually highlight detected anomalies 11
  • 13. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Overview Industrial Network Flow Collector Network Flows Tagged Flows Whitelists Chord Diagrams Flow packets Learning phase Flow data Detection phase Visualization phase Online Offline 13
  • 14. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Learning Phase • Whitelists are formed with the detected network traffic. • Source/Destination IP, Server port, IP protocol and packet number • Whitelists of variable time length. 14
  • 15. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Detection Phase • The system evaluates and tags incoming flows comparing them to the whitelists • Types of tags • Legitimate flow • Anomalous flow • Incorrect port • Incorrect protocol • Absent flow • Anomalous flow size • The system triggers an alarm if a non-legitimate flow is detected 15
  • 16. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Visualization Phase • The system builds the diagrams based on the tagged flows: • A host → A section in the circumference • Each host type has a distinctive color group • A bidirectional flow → A chord • Chords inherit the color of the more active host in the communication • Highlights non-legitimate flows: • Missing flows, in black • The rest, in red 16
  • 17. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Visualization Phase (a) Forbidden flow between PLC 1 and HMI 2. (b) Detail of the forbidden flow. 17
  • 19. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Test network Switch 2 Switch 1 Gateway 19
  • 20. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Tools • NetFlow v5 • Logstash • ElasticSearch • D3 20
  • 21. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Denial of Service 21
  • 22. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Network scan 22
  • 23. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Downed host 23
  • 25. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Conclusions • We propose a visual monitoring system based on whitelists and chord diagrams for ICSs. • Collected flows in a time window are tagged and visualized. • Highlighting anomalous ones. 25
  • 26. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions Future work • Distinguish more anomalous flow types. • Research into re-creation of whitelists or its edition consequences. 26
  • 28. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions References I Rafael Ramos Regis Barbosa, Ramin Sadre, and Aiko Pras. Flow Whitelisting in SCADA Networks. International Journal of Critical Infrastructure Protection, 6(3):150–158, 2013. Siming Chen, Cong Guo, Xiaoru Yuan, Fabian Merkle, Hanna Schaefer, and Thomas Ertl. OCEANS: online collaborative explorative analysis on network security. In Proceedings of the Eleventh Workshop on Visualization for Cyber Security, pages 1–8. ACM, 2014. 28
  • 29. . . . . . . . . Introduction . . . . System Description . . . . . Results Conclusions References II Robert Layton, Paul Watters, and Richard Dazeley. Unsupervised authorship analysis of phishing webpages. In Communications and Information Technologies (ISCIT), 2012 International Symposium on, pages 1104–1109. IEEE, 2012. Johan Mazel, Romain Fontugne, and Kensuke Fukuda. Visual comparison of network anomaly detectors with chord diagrams. In Proceedings of the 29th Annual ACM Symposium on Applied Computing, pages 473–480. ACM, 2014. 29