direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Time Machine (Old information)

The time machine is a joint project of the Technische Universität Berlin, the Technische Universität München, and the ICSI (University of California Berkeley). It is open-source and published under the BSD license.

Outline

There are times when it would be extraordinarily convenient to record the entire contents of a high-volume network traffic stream, in order to later "travel back in time" and inspect activity that has only become interesting in retrospect. Two examples are security forensics—determining just how an attacker compromised a given machine—and network trouble-shooting, such as inspecting the precursors to a fault after the fault.

To perform this task efficiently, the packets are first stored in a ring buffer in the memory (RAM), later the packets are copied to (hard) disk. This allows the time machine to smoothen capture bandwidth peaks in memory and store huge amounts of traffic on disk, covering several days of network traffic. The time machine is designed to work in Gbps environments.

Since it is not feasible to capture the complete load of a fully utilized Gbps link to disk, the time machine utilizes a mechanism called "connection cutoff" to reduce the the amount of data to process. This "connection cutoff" only records the first X bytes of every monitored connection (identified via the 5-tupel of source and destination IP and Port and the transport protocol). Indeed this approach it does not impair the analysis capabilities (unless the cutoff is set to low) because most of the "interessting" data is located in the first few packets of a connection. The effiency of this approach comes from leveraging the heavy-tailed nature of network traffic: because the bulk of the traffic in high-volume streams comes from just a few connections.

To take full advantage of this recording it is import to be able to quickly locate certain packets. For example one might be interested in all packets of a specific connection or all packets from one IP address. This is achieved by indexing stored packets. The indexes to create can be specified, for example one could create indexes for the connection 5-tupel, for IP address pairs, for IP addresses, etc. One can than issue a queries for a specific index to the time machine and the time machine will lookup the query in its index and will return all stored packets matching the query.

To further streamline the analysis capabilities we have coupled the TimeMachine with the Bro network intrusion detection system (IDS) (www.bro-ids.org). Thus the IDS can directly interact with the TimeMachine and request historic traffic to represent it to a security analyst or to do retrospective analysis.

Documentation

Download

Please note, that the current release of the time machine is in an early development stage. Bug reports and comments on the functionality and handling of the time machine and its documentation are appreciated. Please do not hesitate to send an email with your question or comment to tmlists.net.t-labs.tu-berlin.de. Developer release: Download tm-20090206-0.tar.gz Most notable changes since 20080206:

  • Bugfixes in broccoli communication code
  • GCC 4.3 compatability

Most notable changes since 20061220:

  • Many bugfixes and performance improvements.

    • New connection table code (with less locking)
    • New index hash tables
    • Disk write performance

  • Coupling with IDS through broccoli.
  • Support for dynamic classes: The TM can be instructed to (temporarily) assign a particular host to a different storage class (e.g., if an IDS detected suspicious behavior from that host)
  • Better logging facilities.
  • Subscription support for all indexes.

Most notable changes since 20061111:

  • Huge increase in performance due to

    • Changes in internal data structures
    • Index generation and aggregation
    • using ptmalloc on FreeBSD
    • Thread scheduling

  • Documentation Updates
  • Support for running tm in the background as a daemon

(Be sure to subscribe to tm-announce.)

Previous releases:

If you are experiencing packet losses, you might perhaps want to take a look at our recommendations for best packet capturing systems.

Users Mailinglist

For up-to-date Informations on the Time Machine project, new versions, and improvments please be sure to subscribe to tm-announce mailinglist subscription page

Contributors

Authors:

  • Gregor Maier (TU Berlin / DT Laboratories)
  • Stefan Kornexl (TU München)

Contributors:

All of us can be reached via the time machine list: .

Publications

Kornexl, Stefan and Paxson, Vern and Dreger, Holger and Feldmann, Anja and Sommer, Robin (2005). Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. IMC '05: Proceedings of the 5th ACM SIGCOMM Internet Measurement Conference. ACM Press, 267–272.


Kornexl, Stefan (2005). High-Performance Packet Recording for Network Intrusion Detection. Technische Universität München


Dreger, Holger (2007). Operational Network Intrusion Detection: Resource-Analysis Tradeoffs. Technische Universität München, Munich, Germany


Maier, Gregor and Kornexl, Stefan and Feldmann, Anja and Paxson, Vern and Sommer, Robin and Schneider, Fabian and Ager, Bernhard and Dreger, Holger (2007). Time Machine.


Maier, Gregor and Feldmann, Anja and Schneider, Fabian and Sommer, Robin and Paxson, Vern and Dreger, Holger (2007). Time Machine.


Maier, Gregor and Sommer, Robin and Dreger, Holger and Feldmann, Anja and Paxson, Vern and Schneider, Fabian (2008). Enriching Network Security Analysis with Time Travel. SIGCOMM '08: Proceedings of the 2008 conference on Applications, technologies, architectures, and protocols for computer communications. ACM Press, 183–194.


Ager, Bernhard and Schneider, Fabian and Feldmann, Anja (2009). Cacheability of bulk content for ISPs.


Ager, Bernhard and Schneider, Fabian and Feldmann, Anja (2009). Cacheability of bulk content for ISPs. SIGCOMM '09: Poster Session of the 2009 conference on Applications, technologies, architectures, and protocols for computer communications


Zusatzinformationen / Extras

Quick Access:

Schnellnavigation zur Seite über Nummerneingabe

Auxiliary Functions