Network Telemetry with Byte Distribution and Cryptographic Protocol Data Elements

ABSTRACT

In one embodiment, a method includes receiving a traffic flow including a plurality of packets encrypted using a cryptographic protocol, determining cryptographic protocol data of the traffic flow, and transmitting telemetry data of the traffic flow including the cryptographic protocol data. In another embodiment, a method includes receiving telemetry data of a traffic flow including a plurality of packets encrypted using a cryptographic protocol, the telemetry data including cryptographic protocol data of the traffic flow, classifying the traffic flow based on the cryptographic protocol data using a machine learning classifier; and taking a remedial action with respect to the traffic flow based on the classification of the traffic flow.

CROSS-REFERENCES TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 16/436,489, filed on Jun. 10, 2019, and U.S. patent applicationSer. No. 15/083,586, filed on Mar. 29, 2016, both entitled NetworkTelemetry with Byte Distribution and Cryptographic Protocol DataElements, by Anderson et al., and claims priority to U.S. ProvisionalPatent App. Nos. 62/275,917 and 62/275,925, both filed Jan. 7, 2016, theentire contents of which are incorporated herein by reference.

TECHNICAL FIELD

The present disclosure relates generally to network telemetry, and inparticular, to systems, methods and apparatuses enabling networktelemetry data including an indication of the distribution of bytevalues within a flow.

BACKGROUND

The ongoing development, maintenance and expansion of networking systemsoften involve the exchange of encrypted data between devices on anetwork. Encrypted network traffic poses challenges with respect tovisibility and threat detection.

To that end, such systems can employ network telemetry systems thatmonitor traffic flowing through the network. Such network telemetrysystems can collect, analyze, and store a variety of different types ofinformation concerning traffic traversing the network.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the present disclosure can be understood by those of ordinaryskill in the art, a more detailed description may be had by reference toaspects of some illustrative implementations, some of which are shown inthe accompanying drawings.

FIG. 1 is a block diagram of a network including a telemetry backendsystem in accordance with some implementations.

FIG. 2 is a communication diagram showing a data exchange including ahandshake procedure to establish an encrypted connection in accordancewith some implementations.

FIG. 3 is a flowchart representation of a method of transmittingtelemetry data including a byte value distribution metric in accordancewith some implementations.

FIG. 4 is a flowchart representation of a method of classifying a flowbased on a byte value distribution metric in accordance with someimplementations.

FIG. 5 is a flowchart representation of a method of transmittingtelemetry data including cryptographic protocol data in accordance withsome implementations.

FIG. 6 is a flowchart representation of a method of classifying a flowbased on cryptographic protocol data in accordance with someimplementations.

FIG. 7 is a block diagram of a computing device in accordance with someimplementations.

FIG. 8 is a block diagram of another computing device in accordance withsome implementations.

In accordance with common practice various features shown in thedrawings may not be drawn to scale, as the dimensions of variousfeatures may be arbitrarily expanded or reduced for clarity. Moreover,the drawings may not depict all of the aspects and/or variants of agiven system, method or apparatus admitted by the specification.Finally, like reference numerals are used to denote like featuresthroughout the figures.

DESCRIPTION OF EXAMPLE EMBODIMENTS

Numerous details are described herein in order to provide a thoroughunderstanding of the illustrative implementations shown in theaccompanying drawings. However, the accompanying drawings merely showsome example aspects of the present disclosure and are therefore not tobe considered limiting. Those of ordinary skill in the art willappreciate from the present disclosure that other effective aspectsand/or variants do not include all of the specific details of theexample implementations described herein. While pertinent features areshown and described, those of ordinary skill in the art will appreciatefrom the present disclosure that various other features, includingwell-known systems, methods, components, devices, and circuits, have notbeen illustrated or described in exhaustive detail for the sake ofbrevity and so as not to obscure more pertinent aspects of the exampleimplementations disclosed herein.

Overview

Various implementations disclosed herein include apparatuses, systems,and methods for transmitting telemetry data including a byte valuedistribution metric and classifying flows based on telemetry dataincluding a byte value distribution metric. For example, in someimplementations, a method includes receiving a flow including aplurality of bytes, each byte having one of a plurality of byte values,determining a byte value distribution metric based on a number ofinstances of each of the plurality of byte values in the flow, andtransmitting telemetry data regarding the flow, the telemetry dataincluding the byte value distribution metric.

As another example, in some implementations, a method includes receivingtelemetry data regarding a flow, the telemetry data including a bytevalue distribution metric, and classifying the flow based on the bytevalue distribution metric.

As another example, in some implementations, a method includes receivinga flow including a plurality of packets, determining cryptographicprotocol data regarding the flow, and transmitting telemetry dataregarding the flow, the telemetry data including the cryptographicprotocol date.

As another example, in some implementations, a method includes receivingtelemetry data regarding a flow, the telemetry data includingcryptographic protocol data, and classifying the flow based on thecryptographic protocol data.

Example Embodiments

FIG. 1 is a block diagram of a network 100 including a telemetry backendsystem 120. While certain specific features are illustrated, those ofordinary skill in the art will appreciate from the present disclosurethat various other features have not been illustrated for the sake ofbrevity and so as not to obscure more pertinent aspects of the exampleimplementations disclosed herein. To that end, the network 100 includesa number of devices 101 a-101 e that can communicate with each other viaone or more switches 110 a-110 c. The network 100 further includes atelemetry backend system 120 that includes a collection system 122 thatreceives network telemetry data from the switches 110 a-110 c, ananalysis system 124 that processes and analyzes the network telemetrydata, and a storage system 126 that stores the network telemetry dataand/or the results of analyzing the network telemetry data.

A number of flows can traverse the network 100 from a source device to adestination device (e.g., from one device 101 a-101 e to another device101 a-101 e). A flow includes a number of data packets sharing one ormore common characteristics, e.g., a source IP address and a destinationIP address. Each data packet includes a plurality of bytes and each bytehas a byte value from 0 to 255 (e.g., representing 8 bits of data). Invarious implementations, a flow can be a unidirectional flow (e.g., fromone device to another) or a bidirectional flow (e.g., between twodevices).

Each switch 110 a-110 c is configured to route the packets of the flowfrom the source device to the destination device. Each switch 110 a-110c is further configured to monitor the flow (e.g., inspect the packetsof the flow) to determine telemetry data regarding the flow. Forexample, a switch 110 a can determine telemetry data regarding a flowthat includes a source IP address of the flow, a destination IP addressof the flow, a start time of the flow, a stop time of the flow, aprotocol associated with the flow, a number of packets of the flow, anumber of bytes of the flow, and/or a number of bytes of each packet (orat least a subset of the packets, such as the first 50 packets). Thetelemetry data can include other types of information regarding the flowas described further below.

Thus, each switch 110 a-110 c is part of a network telemetry frontendsystem that observes the data transiting the network 100 and reportsinformation regarding that data so that it can be collected, analyzed,and stored (e.g., by the network telemetry backend system 120). Thenetwork telemetry frontend system can further include other observationpoints (e.g., endpoints, Netflow Generating Appliances, or otherdevices). In some implementations, network telemetry is implemented withthe IPFIX (Internet Protocol Flow Information Export) or the Netflowprotocol.

In some implementations described herein, the telemetry data regardingflows transmitted by the switches 110 a-110 c includes a byte valuedistribution metric. As mentioned above, each packet of a flow includesa plurality of bytes. Thus, the flow includes a plurality of bytes. Asalso mentioned above, each byte has a byte value from 0 to 255. Thus,each byte has one of a plurality of byte values. When inspecting a flowto generate telemetry data, each switch 110 a-110 c can determine thebyte value of each byte and maintain a count of the number of instancesof each byte value in the flow. Thus, each switch 110 a-110 c candetermine, for each byte value, a number of instances of the byte valuein the plurality of bytes of the flow. Thus, the switch 110 a-110 c cangenerate a 256 element array (or table) that indicates the number oftimes each byte value appears in a flow. The switch 110 a-110 c cangenerate one or more byte value distribution metrics based on the numberof instances of the byte values and transmit telemetry data regardingthe flow to the telemetry backend system 120, the telemetry dataincluding the byte value distribution metrics.

The byte value distribution metrics can take a number of differentforms. In some implementations, the byte value distribution metric is a256-element array that includes the number of instances of each of thebyte values. In some implementations, the array is normalized such thatthe byte value distribution metric is a byte value probabilitydistribution. In some implementations, the byte value distributionmetric includes a byte value entropy metric generated based on thenumber of instances of the byte values. For example, the byte valueentropy metric can include Shannon's entropy of the byte valueprobability distribution. Shannon's entropy is defined as −Σ_(i=0)²⁵⁵p_(i) log p_(i), where p_(i) is the probability of a byte having abyte value of i. As another example, the byte value entropy metric caninclude Renyi entropy of order two, which is sometimes referred to ascollision entropy.

In some implementations, the byte value distribution metric is aless-than-256-element array that includes the number of instances of anybyte value of a set of byte values. In some embodiments, the sets ofbyte values are sequential, e.g., 0-3, 4-7, 8-11, etc. In someembodiments, the sets of byte values are non-sequential, e.g, [0, 1, 4,8]; [2, 5, 10, 12]; [3, 6, 7, 11]; etc. Thus, in some implementations,the byte value distribution metric includes a plurality of values, eachof the values being indicative of the number of instances of any of twoor more byte values in the flow (or the sum of the number of instancesof two or more byte values in the flow).

In some implementations, the byte value distribution metric isdetermined on a per-flow basis. In some implementations, the byte valuedistribution metric is determined on a per-packet basis. Thus, in someimplementations, the byte value distribution metric includes a pluralityof metrics (each corresponding to one of a plurality of packets of theflow), each of the metrics being a byte value distribution metric basedon the number of instances of each byte value in a respective packet.

Encryption in network traffic, and in data such as files that transitnetworks, is rapidly increasing. This poses major challenges withrespect to visibility and threat detection because traditionaltechnologies, such as deep packet inspection, cannot be applied toencrypted traffic. In terms of visibility, being able to detectencrypted traffic over unconventional ports, such as DNS (Domain NameSystem), could indicate out-of-policy tunnels or data exfiltration. Morespecifically, the detection of cryptographic protocols independent ofthe ports being utilized gives valuable knowledge to networkadministrators. In terms of threat detection, characterizing encryptedtraffic as malicious has obvious benefits. Administrators may also wantto know when encrypted files transit the network in non-encryptedprotocols such as HTTP, which is another data exfiltration method. It isdesirable for network monitoring techniques to detect encrypted datawhenever it appears on the network, regardless of where it appears, togive insight into specific aspects of encrypted traffic, such ascryptographic protocol identification, data exfiltration identification,and malware identification.

Including one or more byte value distribution metrics with traditionalflow information elements can lead to improved results on a number ofproblems, including but not limited to malware detection, cryptographicprotocol detection, tunnel detection, spoofed traffic detection,application detection, and detection of the encoding used (binary, text,base64, Unicode, etc.)

A general framework for using a byte value distribution metric to solveone of these problems would be to collect, as training flows, positiveand negative examples for a problem of interest (for instance, flowsthat make use of TLS (Transport Layer Security) as positive examples andnon-TLS flows as negative examples) and extract the normalized bytevalue probability distribution and other elements of the training flows.Then, a machine learning classifier (e.g., 11-logistic regression) canbe trained on this data. The classifier can then be applied to newtelemetry data being exported by the switch 110 a-110 c or to datapreviously collected and stored by the telemetry backend system 120.

Thus, the telemetry backend system 120 can be configured to receivetelemetry data regarding a flow, the telemetry data including a bytevalue distribution metric, and to classify the flow based (at least inpart) on the byte value distribution metric. The telemetry backendsystem 120 can classify the flow using a machine learning classifier asdescribed above. In some embodiments, the telemetry backend system 120can take further action based on the classification. For example, thetelemetry backend system 120 can generate an alert based on aclassification of the flow as a malicious flow. As another example, thetelemetry backend system 120 can kill the flow based on a classificationof the flow as a malicious flow. As another example, the telemetrybackend system 120 can restrict a flow based on a classification of theflow as a tunneled flow. As another example, the telemetry backendsystem can quarantine a device in response to one or more flowsclassified as malicious coming from that device. As another example, thetelemetry backend system can set billing parameters (or take otheractions) based on a classification of a flow as a tunneled flow. Asanother example, the telemetry backend system can initiate a full packetcapture for flow classified as malicious.

In various implementations, packets in the flow are encrypted. Onemethod of encryption is TLS (Transport Layer Security). There is a largeamount of variety in the implementations and configurable parameters ofthe TLS standard found even within a single enterprise network. Withnumerous weaknesses reported for older versions of TLS, specific TLSimplementations, and the associated TLS options (e.g. the selectedciphersuite or a specific TLS extension), it can be beneficial to have astronger understanding of how TLS is being utilized on a network.Additionally, it can be beneficial to be able to detect malwarecommunications and other unauthorized communications, even when it isencrypted.

In implementations described herein, the telemetry data regarding flowsby the switches 110 a-110 c includes cryptographic protocol data, whichcan be unencrypted (e.g., during a handshake procedure) and interceptedby the switches 110 a-110 c. In various implementations, the telemetrydata includes a byte value distribution metric, cryptographic protocoldata, or both. For example, in the context of TLS, the cryptographicprotocol data can include:

-   -   TLS major/minor version numbers    -   The set of ciphersuites offered by the client    -   The ciphersuite selected by the server    -   TLS SRLT (Sequence of (TLS) Record Lengths and Times)    -   The record type of the records in the SRLT    -   The handshake type of the records in the SRLT that are handshake        records    -   The ExtensionType of any Hello extensions that are present    -   The size of important cryptographic elements such as        Diffie-Hellman (DH) public keys    -   The list of supported elliptic curves and supported points        formats

FIG. 2 shows a data exchange between a client 201 and a server 202(e.g., two devices 101 a-101 e) including a handshake procedure 210-240to establish an encrypted connection using a cryptographic protocol andexchange of application data 250 encrypted according to thecryptographic protocol. The handshake procedure begins with a ClientHello message 210, sent from the client 201 to the server 202.Cryptographic protocol data that can be extracted from this messageincludes a TLS version number, a set of ciphersuites offered by theclient 201, and TLS extensions used by the client 201. The handshakeprocedure continues with a Server Hello message 220 that includes acertificate of the server 202. Cryptographic protocol data that can beextracted from this message includes the ciphersuite selected by theserver 202. The handshake procedure continues with a Client Key Exchangemessage 230 that can include a Change Cipher Spec message. Cryptographicprotocol data that can be extracted from this message includes theclient key length. The handshake procedure optionally includes a ChangeCipher Spec message 240 from the server 202 to the client 201. Thehandshake procedure 210-240 is followed by the exchange of encryptedapplication data 250 from which other telemetry data can be derived,such as a sequence of record lengths and times (e.g., a series of valuesindicative of the size and time of packets in the application data 250).

In the context of SSH (Secure Shell), the cryptographic protocol datacan include (as derived from a KEXINIT message), kex_algorithms,server_host_key_algorithms, encryption_algorithms_client_to_server,encryption_algorithms_server_to_client, mac_algorithms_client_to_server,mac_algorithms_server_to_client,compression_algorithms_client_to_server,compression_algorithms_server_to_client, languages_client_to_server, andlanguages_server_to_client.

The cryptographical protocol data can include data regarding IKE(Internet Key Exchange) or Kerebos or any other cryptographic protocol.In general, the cryptographic protocol data can include a protocolversion number, a public key length, a cryptographic algorithm offeredor employed, or any other cryptographic protocol information.

FIG. 3 is a flowchart representation of a method 300 of transmittingtelemetry data including a byte value distribution metric in accordancewith some implementations. In some implementations (and as detailedbelow as an example), the method 300 is performed by a switch, such asthe switch 110 a of FIG. 1. In some implementations, the method 300 isperformed by processing logic, including hardware, firmware, software,or a combination thereof. In some implementations, the method 300 isperformed by a processor executing code stored in a non-transitorycomputer-readable medium (e.g., a memory). Briefly, the method 300includes receiving a flow, determining a byte value distribution metricbased on the number of instances of each byte value in the bytes of theflow, and transmitting telemetry data including the byte valuedistribution metric. The method 300 can be performed for a number offlows and can be performed by a number of switches, endpoints, or otherdevices.

The method 300 begins, in block 310, with the switch receiving a flowincluding a plurality of bytes, each byte having one of a plurality ofbyte values. For example, a first byte may have a byte value of 0, asecond byte may have a byte value of 145, a third byte may have a bytevalue of 255, and a fourth byte may have byte value of 145 (e.g., thesame byte value as the second byte). In some implementations, the flowincludes a plurality of packets and each of the plurality of packetsincludes a subset of the plurality of bytes.

At block 320, the switch determines a byte value distribution metricbased on a number of instances of each of the plurality of byte valuesin the flow. As noted above, the byte value distribution metric can takemany forms. In some implementations, the switch maintains a count ofeach of the plurality of byte values (e.g., 0 to 255) and the switchincrements the corresponding count when a byte has the correspondingbyte value. Following the example above, the switch would have a countof 1 for the byte value of 0, a count of 0 for byte values between 1 and143, a count of 2 for the byte value of 145, a count of 0 for bytevalues between 146 and 254, and a count of 1 for the byte value of 255.In some implementations, the byte value distribution metric is a256-element array of such counts.

In some implementations, the counts are used to generate more compressedbyte value distribution metrics. For example, in some implementations,the counts are used to determine a byte value entropy metric, such asShannon's entropy of the byte value probability distribution. Followingthe example above, the switch would normalize the counts by dividing bythe number of bytes (e.g., four), to produce byte value probabilities of¼, ½, and ¼. From these probabilities, Shannon's entropy can bedetermined as 3/2. In some implementations, the byte value entropymetric can by Renyi entropy of order 2 or another entropy metric.

In some implementations, the byte value distribution metric is aless-than-256-element array that includes the number of instances of anyof sets of byte values (e.g., sums of the above-described counts). Insome embodiments, the sets of byte values are sequential, e.g., 0-3,4-7, 8-11, etc. In some embodiments, the sets of byte values arenon-sequential, e.g, [0, 1, 4, 8]; [2, 5, 10, 12]; [3, 6, 7, 11]; etc.Thus, in some implementations, the byte value distribution metricincludes a plurality of values, each of the values being indicative ofthe number of instances of any of two or more byte values in the flow.

For example, in some implementations, the sets of byte values are 0 to127 and 128 to 255. Thus, the byte value distribution metric for theexample set of bytes described above would be 1 byte having a byte valuebetween 0 and 127, and 3 bytes having a byte value between 128 and 255.

In some implementations, the counts are normalized by the maximum of thecounts and the normalized counts are rounded such that each byte valueis associated with either a ‘1’ or a ‘0’ indicating whether the bytevalue is prominent in the flow or not. Thus, the byte value distributionmetric can be a 256-bit array indicative of the prominence of each bytevalue. In another implementation, the byte value distribution metric canbe a set of the most common (or least common) byte values.

Thus, the byte value distribution metric can include multiple values(e.g., in the form of 256-element array or other formats). In someimplementations, the byte value distribution metric includes a pluralityof metrics, each of the plurality of metrics being a byte valuedistribution for a respective packet, based on the number of instancesof each of the plurality of byte values in the respective packet.

At block 330, the switch transmits telemetry data regarding the flow,the telemetry data including the byte value distribution metric. Thetelemetry data regarding the flow can further include at least one of asource IP address of the flow, a destination IP address of the flow, astart time of the flow, a stop time of the flow, a protocol associatedwith the flow, a number of the plurality of bytes, or a number of theplurality of packets. The telemetry data can include other types ofinformation regarding the flow. In some implementations, the telemetrydata includes a sequence of packet lengths and times for at least someof the packets.

In some implementations, the telemetry data further includescryptographic protocol data as described above. For example, thecryptographic protocol data can include at least one of a TransportLayer Security (TLS) version number, one or more ciphersuites offered bya source device, a ciphersuite selected by a destination device, a TLSsequence of record lengths and times, a record type, a handshake type,an extension type, a size of a cryptographic key, or one or moresupported elliptical curves and supported point formats.

FIG. 4 is a flowchart representation of a method 400 of classifying aflow based on a byte value distribution metric in accordance with someimplementations. In some implementations (and as detailed below as anexample), the method 400 is performed by a telemetry backend system,such as the telemetry backend system 120 of FIG. 1. In someimplementations, the method 400 is performed by processing logic,including hardware, firmware, software, or a combination thereof. Insome implementations, the method 400 is performed by a processorexecuting code stored in a non-transitory computer-readable medium(e.g., a memory). Briefly, the method 400 includes receiving telemetrydata regarding a flow including a byte value distribution metric andclassifying the flow based on the byte value distribution metric. Themethod 400 can be performed for a number of flows based on telemetrydata received from a number of different switches, endpoints, or otherdevices.

The method 400 begins, at block 410, with the telemetry backend systemreceiving telemetry data regarding a flow, the telemetry data includinga byte value distribution metric. The telemetry data can further includeat least one of source IP address of the flow, a destination IP addressof the flow, a start time of the flow, a stop time of the flow, aprotocol associated with the flow, a number of bytes in the flow, or anumber of packets of the flow. The telemetry data can include othertypes of information regarding the flow. In some implementations, thetelemetry data includes a sequence of packet lengths and times for atleast some of the packets of the flow.

In some implementations, the telemetry data further includescryptographic protocol data. The cryptographic protocol data can includeat least one of a TLS version number, one or more ciphersuites offeredby a source device, a ciphersuite selected by a destination device, aTLS sequence of record lengths and times, a record type, a handshaketype, an extension type, a size of a cryptographic key, or one or moresupported elliptical curves and supported point formats.

The byte value distribution metric is based on the number of instancesof each of a plurality of byte values in the flow. As described above,the byte value distribution metric can take many forms. In someimplementations, the byte value distribution metric includes the numberof instances of the byte values, e.g., as a 256-element array. In someimplementations, the byte value distribution metric includes a byteentropy metric, such as Shannon's entropy of the byte value probabilitydistribution.

At block 420, the telemetry backend system classifies the flow based onthe byte value distribution metric. In some implementations, thetelemetry backend system classifies the flow using a machine learningclassifier. In some implementations, the telemetry backend systemclassifies the flow as a benign flow or a malicious flow. In someimplementations, the telemetry backend system classifies the flow as atunneled flow or a non-tunneled flow (e.g., a direct flow). In someimplementations, the telemetry backend system classifies the flow as aTLS flow or a non-TLS flow.

As noted above, in some implementations, the telemetry data includescryptographic protocol data. Thus, in some implementations, classifyingthe flow is further based on the cryptographic protocol data.

The method 400 can further include actions taken in response to and/orbased on the classification. In some implementations, the telemetrybackend system generates an alert based on the classification or killsthe flow based on the classification. For example, the telemetry backendsystem can kill the flow based on a classification of the flow as amalicious flow. As another example, the telemetry backend system canquarantine a device in response to one or more flows classified asmalicious coming from that device. As another example, the telemetrybackend system can set billing parameters (or take other actions) basedon a classification of a flow as a tunneled flow.

FIG. 5 is a flowchart representation of a method of transmittingtelemetry data including cryptographic protocol data in accordance withsome implementations. In some implementations (and as detailed below asan example), the method 500 is performed by a switch, such as the switch110 a of FIG. 1. In some implementations, the method 500 is performed byprocessing logic, including hardware, firmware, software, or acombination thereof. In some implementations, the method 500 isperformed by a processor executing code stored in a non-transitorycomputer-readable medium (e.g., a memory). Briefly, the method 500includes receiving a flow, determining cryptographic protocol dataregarding the flow, and transmitting telemetry data including thecryptographic protocol data. The method 500 can be performed for anumber of flows and can be performed by a number of switches, endpoints,or other devices.

The method 500 begins, in block 510, with the switch receiving a flowincluding a plurality of packets. Some of the packets can be encryptedusing a cryptographic protocol. To that end, some of the packets (e.g.,packets associated with a handshake procedure) can be unencrypted andcan include information to establish an encrypted connection using thecryptographic protocol.

At block 520, the switch determines cryptographic protocol dataregarding the flow. Various cryptographic protocol data are describedabove. For example, the cryptographic protocol data can include dataincludes at least one a TLS version number, one or more ciphersuitesoffered by a source device, a ciphersuite selected by a destinationdevice, a TLS sequence of record lengths and times, a record type, ahandshake type, an extension type, a size of a cryptographic key, or oneor more supported elliptical curves and supported point formats. Theswitch can determine the cryptographic protocol data by inspecting theunencrypted packets.

At block 530, the switch transmits telemetry data regarding the flow,the telemetry data including the cryptographic protocol data. Thetelemetry data regarding the flow can further include at least one of asource IP address of the flow, a destination IP address of the flow, astart time of the flow, a stop time of the flow, a protocol associatedwith the flow, a number of the plurality of bytes, or a number of theplurality of packets. The telemetry data can include other types ofinformation regarding the flow. In some implementations, the telemetrydata includes a sequence of packet lengths and times (SRLT) for at leastsome of the packets. In some implementations, the telemetry dataincludes a byte value distribution metric, as described above.

FIG. 6 is a flowchart representation of a method of classifying a flowbased on cryptographic protocol data in accordance with someimplementations. In some implementations (and as detailed below as anexample), the method 600 is performed by a telemetry backend system,such as the telemetry backend system 120 of FIG. 1. In someimplementations, the method 600 is performed by processing logic,including hardware, firmware, software, or a combination thereof. Insome implementations, the method 600 is performed by a processorexecuting code stored in a non-transitory computer-readable medium(e.g., a memory). Briefly, the method 600 includes receiving telemetrydata regarding a flow including cryptographic protocol data andclassifying the flow based on the cryptographic protocol data. Themethod 600 can be performed for a number of flows based on telemetrydata received from a number of different switches, endpoints, or otherdevices.

The method 600 begins, at block 610, with the telemetry backend systemreceiving telemetry data regarding a flow, the telemetry data includingcryptographic protocol data. The telemetry data can further include atleast one of source IP address of the flow, a destination IP address ofthe flow, a start time of the flow, a stop time of the flow, a protocolassociated with the flow, a number of bytes in the flow, or a number ofpackets of the flow. The telemetry data can include other types ofinformation regarding the flow. In some implementations, the telemetrydata includes a sequence of packet lengths and times (SRLT) for at leastsome of the packets of the flow. In some implementations, the telemetrydata includes a byte value distribution metric.

At block 620, the telemetry backend system classifies the flow based onthe cryptographic protocol data. In some implementations, the telemetrybackend system classifies the flow using a machine learning classifier.In some implementations, the telemetry backend system classifies theflow as a benign flow or a malicious flow. In some implementations, thetelemetry backend system classifies the flow as a tunneled flow or anon-tunneled flow (e.g., a direct flow). In some implementations, thetelemetry backend system classifies the flow as a secure flow or aninsecure flow.

In some implementations, the telemetry backend system classifies theflow by classifying a source device of the flow. For example, thetelemetry backend system can classify the flow as a flow originatingfrom an insecure source device.

In some implementations, classifying the flow includes determining oneor more cryptographic libraries of a source device or a destinationdevice of the flow. For example, the telemetry backend system can inferthe cryptographic libraries of the source device and/or the end devicebased on the cryptographic protocol data.

The method 600 can further include actions taken in response to and/orbased on the classification. In some implementations, the telemetrybackend system generates an alert based on the classification or killsthe flow based on the classification. For example, the telemetry backendsystem can kill the flow based on a classification of the flow as amalicious flow. As another example, the telemetry backend system canquarantine a device in response to one or more flows classified asmalicious coming from that device. As another example, the telemetrybackend system can initiate an upgrade of a source device based on aclassification of a flow as originating from an insecure or vulnerablesource device.

Thus, the telemetry backend system can find devices using insecure TLSconfigurations. This can be accomplished with the collection ofTLS-aware telemetry (telemetry including cryptographic protocol dataregarding the TLS cryptographic protocol) by looking for devicescommunicating with outdated versions of TLS or inadequate key sizesand/or devices that offer insecure ciphersuites such as “export”ciphersuites, or those using obsolete algorithms such as MD5 and RC4.This level of inspection does not require any machine learning and canbe easily implemented with no “false positives.”

TLS implementation (as opposed to TLS configuration) detection is morenuanced. Even if a device is using the latest version of TLS and onlyoffering secure ciphersuites, there can still be vulnerabilities in theactual implementation. The telemetry backend system can receiveTLS-specific features, in addition to other telemetry elements, to builda machine learning classifier that is able to determine the actual TLSimplementation (e.g. CiscoSSL 4.0). This machine learning classifier canthen monitor the live TLS-aware telemetry being collected to detect anyvulnerable TLS implementations.

FIG. 7 is a block diagram of a computing device 700 in accordance withsome implementations. In some implementations, the computing device 700corresponds to the switch 110 a of FIG. 1 and performs one or more ofthe functionalities described above with respect to the switch 110 a.While certain specific features are illustrated, those skilled in theart will appreciate from the present disclosure that various otherfeatures have not been illustrated for the sake of brevity, and so asnot to obscure more pertinent aspects of the embodiments disclosedherein. To that end, as a non-limiting example, in some embodiments thecomputing device 700 includes one or more processing units (CPU's) 702(e.g., processors), one or more output interfaces 703 (e.g., a networkinterface), a memory 706, a programming interface 708, and one or morecommunication buses 704 for interconnecting these and various othercomponents.

In some implementations, the communication buses 704 include circuitrythat interconnects and controls communications between systemcomponents. The memory 706 includes high-speed random access memory,such as DRAM, SRAM, DDR RAM or other random access solid state memorydevices; and, in some implementations, include non-volatile memory, suchas one or more magnetic disk storage devices, optical disk storagedevices, flash memory devices, or other non-volatile solid state storagedevices. The memory 706 optionally includes one or more storage devicesremotely located from the CPU(s) 702. The memory 706 comprises anon-transitory computer readable storage medium. Moreover, in someimplementations, the memory 706 or the non-transitory computer readablestorage medium of the memory 706 stores the following programs, modulesand data structures, or a subset thereof including an optional operatingsystem 730 and a telemetry module 740. In some implementations, one ormore instructions are included in a combination of logic andnon-transitory memory. The operating system 730 includes procedures forhandling various basic system services and for performing hardwaredependent tasks. In some implementations, the telemetry module 740 isconfigured to generate and transmit telemetry data. To that end, thetelemetry module 740 includes an interface module 741 and an inspectionmodule 742.

In some implementations, the interface module 741 is configured toreceive a flow including a plurality of bytes, each byte having one of aplurality of byte values. To that end, the interface module 741 includesa set of instructions 741 a and heuristics and metadata 741 b. In someimplementations, the inspection module 742 is configured to determine abyte value distribution metric based on a number of instances of each ofthe plurality of byte values in the flow. To that end, the inspectionmodule 742 includes a set of instructions 742 a and heuristics andmetadata 742 b. The inspection module can inspect the flow to generatetelemetry data regarding the flow. In some implementations, theinterface module 741 is further configured to transmit telemetry dataregarding the flow, the telemetry data including the byte valuedistribution metric.

In some implementations, the interface module 741 is configured toreceive a flow including a plurality of packets. To that end, theinterface module 741 includes a set of instructions 741 a and heuristicsand metadata 741 b. In some implementations, the inspection module 742is configured to determine cryptographic protocol data regarding theflow. To that end, the inspection module 742 includes a set ofinstructions 742 a and heuristics and metadata 742 b. The inspectionmodule can inspect the flow to generate telemetry data regarding theflow. In some implementations, the interface module 741 is furtherconfigured to transmit telemetry data regarding the flow, the telemetrydata including cryptographic protocol data.

Although the telemetry module 740, the interface module 741, and theinspection module 742 are illustrated as residing on a single computingdevice 700, it should be understood that in other embodiments, anycombination of the telemetry module 740, the interface module 741, andthe inspection module 742 can reside in separate computing devices invarious implementations. For example, in some implementations each ofthe telemetry module 740, the interface module 741, and the inspectionmodule 742 reside on a separate computing device.

FIG. 8 is a block diagram of a computing device 800 in accordance withsome implementations. In some implementations, the computing device 800corresponds to the telemetry backend system 120 of FIG. 1 and performsone or more of the functionalities described above with respect to thetelemetry backend system 120. While certain specific features areillustrated, those skilled in the art will appreciate from the presentdisclosure that various other features have not been illustrated for thesake of brevity, and so as not to obscure more pertinent aspects of theembodiments disclosed herein. To that end, as a non-limiting example, insome embodiments the computing device 800 includes one or moreprocessing units (CPU's) 802 (e.g., processors), one or more outputinterfaces 803 (e.g., a network interface), a memory 806, a programminginterface 808, and one or more communication buses 804 forinterconnecting these and various other components.

In some implementations, the communication buses 804 include circuitrythat interconnects and controls communications between systemcomponents. The memory 806 includes high-speed random access memory,such as DRAM, SRAM, DDR RAM or other random access solid state memorydevices; and, in some implementations, include non-volatile memory, suchas one or more magnetic disk storage devices, optical disk storagedevices, flash memory devices, or other non-volatile solid state storagedevices. The memory 806 optionally includes one or more storage devicesremotely located from the CPU(s) 802. The memory 806 comprises anon-transitory computer readable storage medium. Moreover, in someimplementations, the memory 806 or the non-transitory computer readablestorage medium of the memory 806 stores the following programs, modulesand data structures, or a subset thereof including an optional operatingsystem 830 and a classification module 840. In some implementations, oneor more instructions are included in a combination of logic andnon-transitory memory. The operating system 830 includes procedures forhandling various basic system services and for performing hardwaredependent tasks. In some implementations, the classification module 840is configured to classify flows based on telemetry data regarding theflows. To that end, classification module 840 includes an interfacemodule 841 and a classifier module 842.

In some implementations, the interface module 841 is configured toreceive telemetry data regarding a flow, the telemetry data including abyte value distribution metric. To that end, the interface module 841includes a set of instructions 841 a and heuristics and metadata 841 b.In some implementations, the classifier module 842 is configured toclassify the flow based on the byte value distribution metric. To thatend, the classifier module 842 includes a set of instructions 842 a andheuristics and metadata 842 b. The classifier module 842 can include,for example, a machine learning classifier.

In some implementations, the interface module 841 is configured toreceive telemetry data regarding a flow, the telemetry data includingcryptographic protocol data. To that end, the interface module 841includes a set of instructions 841 a and heuristics and metadata 841 b.In some implementations, the classifier module 842 is configured toclassify the flow based on the cryptographic protocol data. To that end,the classifier module 842 includes a set of instructions 842 a andheuristics and metadata 842 b. The classifier module 842 can include,for example, a machine learning classifier.

Although the classification module 840, the interface module 841, andthe classifier module 842 are illustrated as residing on a singlecomputing device 800, it should be understood that in other embodiments,any combination of the classification module 840, the interface module841, and the classifier module 842 can reside in separate computingdevices in various implementations. For example, in some implementationseach of the classification module 840, the interface module 841, and theclassifier module 842 reside on a separate computing device.

Moreover, FIGS. 7 and 8 are intended more as functional description ofthe various features which are present in a particular implementation asopposed to a structural schematic of the embodiments described herein.As recognized by those of ordinary skill in the art, items shownseparately could be combined and some items could be separated. Forexample, some functional modules shown separately in FIGS. 7 and 8 couldbe implemented in a single module and the various functions of singlefunctional blocks could be implemented by one or more functional blocksin various embodiments. The actual number of modules and the division ofparticular functions and how features are allocated among them will varyfrom one embodiment to another, and may depend in part on the particularcombination of hardware, software and/or firmware chosen for aparticular embodiment.

The present disclosure describes various features, no single one ofwhich is solely responsible for the benefits described herein. It willbe understood that various features described herein may be combined,modified, or omitted, as would be apparent to one of ordinary skill.Other combinations and sub-combinations than those specificallydescribed herein will be apparent to one of ordinary skill, and areintended to form a part of this disclosure. Various methods aredescribed herein in connection with various flowchart steps and/orphases. It will be understood that in many cases, certain steps and/orphases may be combined together such that multiple steps and/or phasesshown in the flowcharts can be performed as a single step and/or phase.Also, certain steps and/or phases can be broken into additionalsub-components to be performed separately. In some instances, the orderof the steps and/or phases can be rearranged and certain steps and/orphases may be omitted entirely. Also, the methods described herein areto be understood to be open-ended, such that additional steps and/orphases to those shown and described herein can also be performed.

Some or all of the methods and tasks described herein may be performedand fully automated by a computer system. The computer system may, insome cases, include multiple distinct computers or computing devices(e.g., physical servers, workstations, storage arrays, etc.) thatcommunicate and interoperate over a network to perform the describedfunctions. Each such computing device typically includes a processor (ormultiple processors) that executes program instructions or modulesstored in a memory or other non-transitory computer-readable storagemedium or device. The various functions disclosed herein may be embodiedin such program instructions, although some or all of the disclosedfunctions may alternatively be implemented in application-specificcircuitry (e.g., ASICs or FPGAs) of the computer system. Where thecomputer system includes multiple computing devices, these devices may,but need not, be co-located. The results of the disclosed methods andtasks may be persistently stored by transforming physical storagedevices, such as solid state memory chips and/or magnetic disks, into adifferent state.

The disclosure is not intended to be limited to the implementationsshown herein. Various modifications to the implementations described inthis disclosure may be readily apparent to those skilled in the art, andthe generic principles defined herein may be applied to otherimplementations without departing from the spirit or scope of thisdisclosure. The teachings of the invention provided herein can beapplied to other methods and systems, and are not limited to the methodsand systems described above, and elements and acts of the variousembodiments described above can be combined to provide furtherembodiments. Accordingly, the novel methods and systems described hereinmay be embodied in a variety of other forms; furthermore, variousomissions, substitutions and changes in the form of the methods andsystems described herein may be made without departing from the spiritof the disclosure. The accompanying claims and their equivalents areintended to cover such forms or modifications as would fall within thescope and spirit of the disclosure.

What is claimed is:
 1. A method comprising: receiving, by a device in acomputer network, a traffic flow including a plurality of packetsencrypted using a cryptographic protocol; determining, by the device,cryptographic protocol data of the traffic flow, wherein thecryptographic protocol data of the traffic flow includes at least oneof: a Transport Layer Security (TLS) version number, one or moreciphersuites offered by a source device, a ciphersuite selected by adestination device, a TLS sequence of record lengths and times, a recordtype, a handshake type, an extension type, a size of a cryptographickey, a supported elliptical curve, and a supported point format; andtransmitting, from the device, telemetry data of the traffic flow, thetelemetry data of the traffic flow including the cryptographic protocoldata of the traffic flow.
 2. The method of claim 1, wherein the trafficflow further includes one or more unencrypted packets.
 3. The method ofclaim 2, further comprising: inspecting, by the device, the one or moreunencrypted packets to determine the cryptographic protocol data of thetraffic flow.
 4. The method of claim 2, wherein the one or moreunencrypted packets include information to establish an encryptedconnection using a cryptographic protocol.
 5. The method of claim 1,wherein the telemetry data of the traffic flow further includes at leastone of: a source IP address of the traffic flow, a destination IPaddress of the traffic flow, a start time of the traffic flow, a stoptime of the traffic flow, a protocol associated with the traffic flow, anumber of bytes of the traffic flow, and a number of the plurality ofpackets.
 6. The method of claim 1, wherein the telemetry data of thetraffic flow further includes a sequence of packet lengths and times(SRLT) for one or more of the plurality of packets.
 7. The method ofclaim 1, wherein the telemetry data of the traffic flow further includesa byte value distribution metric.
 8. A method comprising: receiving, viaa computer network, telemetry data of a traffic flow including aplurality of packets encrypted using a cryptographic protocol, thetelemetry data of the traffic flow including cryptographic protocol dataof the traffic flow, wherein the cryptographic protocol data of thetraffic flow includes at least one of: a Transport Layer Security (TLS)version number, one or more ciphersuites offered by a source device, aciphersuite selected by a destination device, a TLS sequence of recordlengths and times, a record type, a handshake type, an extension type, asize of a cryptographic key, a supported elliptical curve, and asupported point format; classifying, using a machine learningclassifier, the traffic flow based on the cryptographic protocol data ofthe traffic flow, resulting in a classification of the traffic flow; andtaking a remedial action with respect to the traffic flow based on theclassification of the traffic flow.
 9. The method of claim 8, whereinthe telemetry data of the traffic flow further includes at least one of:a source IP address of the traffic flow, a destination IP address of thetraffic flow, a start time of the traffic flow, a stop time of thetraffic flow, a protocol associated with the traffic flow, a number ofbytes of the traffic flow, and a number of the plurality of packets. 10.The method of claim 8, wherein the telemetry data of the traffic flowfurther includes a sequence of packet lengths and times (SRLT) for oneor more of the plurality of packets.
 11. The method of claim 8, whereinthe telemetry data of the traffic flow further includes a byte valuedistribution metric.
 12. The method of claim 8, further comprising:classifying, using the machine learning classifier, the traffic flow aseither a malicious flow or a benign flow based on the cryptographicprotocol data of the traffic flow.
 13. The method of claim 8, furthercomprising: classifying, using the machine learning classifier, thetraffic flow as either a tunneled flow or a non-tunneled flow based onthe cryptographic protocol data of the traffic flow.
 14. The method ofclaim 8, further comprising: classifying, using the machine learningclassifier, the traffic flow as either a secure flow or an insecure flowbased on the cryptographic protocol data of the traffic flow.
 15. Themethod of claim 8, wherein the classifying of the traffic flowcomprises: classifying a source device of the traffic flow, wherein theclassification of the traffic flow is based further on theclassification of a source device of the traffic flow.
 16. The method ofclaim 8, wherein the classifying of the traffic flow comprises:determining one or more cryptographic libraries of a source device ofthe traffic flow or a destination device of the traffic flow, whereinthe classification of the traffic flow is based further on thedetermined one or more cryptographic libraries.
 17. The method of claim16, wherein the determining of the one or more cryptographic librariesof the source device of the traffic flow or the destination device ofthe traffic flow comprises: inferring the one or more cryptographiclibraries of the source device of the traffic flow or the destinationdevice of the traffic flow based on the cryptographic protocol data ofthe traffic flow.
 18. The method of claim 8, wherein the taking of theremedial action with respect to the traffic flow comprises: performingone or more remedial actions based on the classification of the trafficflow, wherein the one or more remedial actions are selected from a groupconsisting of: generating an alert, stopping the traffic flow,quarantining a source device of the traffic flow, and initiating anupgrade of the source device of the traffic flow.
 19. The method ofclaim 8, further comprising: identifying a device associated with thetraffic flow using an insecure TLS configuration based on thecryptographic protocol data of the traffic flow.
 20. An apparatuscomprising: a network interface configured to interface with a computernetwork; one or more processors coupled to the network interface; and anon-transitory memory comprising instructions that when executed causethe one or more processors to perform operations comprising: receiving,via the network interface, a traffic flow including a plurality ofpackets encrypted using a cryptographic protocol; determiningcryptographic protocol data of the traffic flow, wherein thecryptographic protocol data of the traffic flow includes at least oneof: a Transport Layer Security (TLS) version number, one or moreciphersuites offered by a source device, a ciphersuite selected by adestination device, a TLS sequence of record lengths and times, a recordtype, a handshake type, an extension type, a size of a cryptographickey, a supported elliptical curve, and a supported point format; andtransmitting, via the network interface, telemetry data of the trafficflow, the telemetry data of the traffic flow including the cryptographicprotocol data of the traffic flow.