Characteristics of Internet Background Radiation

Slides:



Advertisements
Similar presentations
Internet Protocol How does information get sent from one device to another across a WAN?
Advertisements

A First Look at Modern Enterprise Traffic
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Leveraging Good Intentions to Reduce Unwanted Network Traffic Marianne Shaw (U. Washington) USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on.
(4.4) Internet Protocols Layered approach to Internet Software 1.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Statistical based IDS background introduction. Statistical IDS background Why do we do this project Attack introduction IDS architecture Data description.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Report by: Loizos Konomou EL933 Fall 2005 Prof: Yong Liu Ruoming Pang, Mark Allman, Mike Bennett, Jason Lee, Vern Paxson, Brian Tierney Princeton University,
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Server Load Balancing. Introduction Why is load balancing of servers needed? If there is only one web server responding to all the incoming HTTP requests.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Chapter 4: Managing LAN Traffic
Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Presented by Rebecca Meinhold But How Does the Internet Work?
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Characteristics of Internet Background Radiation ACM Internet Measurement Conference (IMC), 2004 Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford,
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Topics discussed in this section:
Network Layer: IP Addressing
Chapter 5 Network and Transport Layers
Networking Devices.
Chapter 3 Internet Applications and Network Programming
Part III – Gathering Data
Principles of Computer Security
Introduction to Networking
Introduction to Networking
Introduction to Computers
Firewalls.
Magda El Zarki Professor, ICS UC, Irvine
NET323 D: Network Protocols
Client-Server Interaction
Firewall Exercise.
Transport Layer Unit 5.
I. Basic Network Concepts
TCP/IP Networking An Example
Application layer Lecture 7.
CPSC 641: WAN Measurement Carey Williamson
NET323 D: Network Protocols
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Lecture 4 Communication Network Protocols
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
Starting TCP Connection – A High Level View
Firewalls Jiang Long Spring 2002.
Mapping Internet Sensors With Probe Response Attacks
Lecture 3: Secure Network Architecture
CS4470 Computer Networking Protocols
Carey Williamson Department of Computer Science University of Calgary
Network and the internet
Mobility Support in Wireless LAN
OSI Reference Model Unit II
Statistical based IDS background introduction
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

Characteristics of Internet Background Radiation Authors: Ruomind Pang, Vinod Yegneswaran, Paul Bartfod, Vern Paxson, Larry Peterson Appeared in IMC 2004, Taormina, Sicily, Italy, October 2004 Presenter: Charles Ahern

Introduction Older (mid 90’s) internet traffic studies make no mention of an appreciable amount of on-going nonproductive traffic Today, this traffic, either malicious or benign (misconfigurations) is prevalent The goal of this paper is to categorize this traffic, determine where it comes from and what it is doing

Outline The magnitude of the problem How to decide what traffic is “nonproductive” Determining the nature of the traffic Filtering Responding (to gain further insight) Brief Experiment Details Quantifying & Qualifying Weaknesses & Contributions

Magnitude The magnitude of nonproductive traffic on the internet is not minor Example: Traffic logs from Lawrence Berkeley Laboratory (LBL) for an arbitrary day show: 138 different remote hosts each scanned 25,000 or more LBL addresses for a total of over 8 million connection attempts This is more than DOUBLE the site’s entire successfully-established incoming connections, originated by 47,000 distinct remote hosts

Given the traffic’s pervasive nature, they have termed it “Internet radiation”

Determining What is Unwanted If we include all unsuccessful connection attempts, this will be an inaccurate statistic Transient failures Instead, measure traffic sent to hosts that don’t exist Likely to eliminate most transient failures and yield unwanted activity You can safely respond to this traffic

Taming the large Traffic Volume Listening to traffic on thousands to millions of IP addresses… MUST handle efficiently Nearly 30,000 packets per second of background radiation on the Class A network they are monitoring Filtering schemes must be sound and effective

Filtering Source-Connection Filtering Source-Port Filtering Keep first N initiated by the source Disadvantages: Inconsistent view of the network N value is attack and service dependant Source-Port Filtering Keep first N connections for each source/destination port pair Allows wider variety of activities Still same downsides though

Filtering Source-Payload Filtering One instance of each type of activity per source Good idea, hard to sometimes implement Hard to tell if two activities are similar until several packets are responded to Source-Destination Filtering (their choice) Assume one source will try the same activities on every IP it tries to connect to

Filter Effectiveness

Responders Highly efficient responder network Found that most radiation is TCP SYN packets, which means they must respond Approach to building responders was “data driven”: the determined which responders to build based on traffic volumes Pick the most common form, build a responder Once the traffic could be differentiated into specific types of activity, repeat with the next largest type of traffic

Responders Created HTTP (port 80) NetBIOS (port 137/139) CIFS/SMB (port 139/445) DCE/RPC (port 135/1025) Dameware (port 6129) MyDoom (port 3127) Beagle (port 2745)

Responders Responders need to stick to the protocol (“how” to say it) They also need to know “what” to say to keep communication going Differences in connections can be difficult to determine at the network or transport level, leading to needing an application level understanding required Responses are developed manually, and many are intricate and take research to determine their format

Brief Experiment Details Two separate network sites with two different systems iSink and LBL Sink. Each system performed the same responses but used different underlying mechanisms

iSink Class A network 224 addresses And 2 /19 subnets (16k addresses) on two adjacent UW campus class B networks One filter for each network Filtered requests passed to the iSink Did both passive (no responders) and active measurements

iSink Setup

LBL Sink Two sets of 10 contiguous /24 subnets First is passive and unfiltered Active analysis is divided into two sets of 5 subnets and filtered All traffic then tunneled to a Honeyd responder

LBL Setup

Summary of Data Collection

Quantifying Traffic rate breakdown by protocol (rate is number of packets per destination IP per day) Traffic breakdown by # of sources

Qualifying Activities are ranked by number of source IP’s, not by byte or packet volume Their filtering algorithm is biased to a source IP that tries to reach too many destinations The number of source IP’s reflects the popularity of the activity across the internet Single-source activities might be eccentric, while multi-source activity is more likely to be intentional

Qualifying To qualify activities, all connections between a source-destination pair on a given port are looked at Only common ports are considered What about uncommon ports???

Ports Background radiation traffic is highly concentrated on popular ports. Example, on Mar 29, they saw 32,072 distinct source IP’s at LBL and only 0.5% of the source hosts contacted a port not among “popular” ports they monitored Thus by only looking at popular ports, most internet radiation is monitored

Qualifying

Weaknesses IP addresses were heavily used in filtering and statistical analysis. Because DHCP servers can assign different IP addresses, this can flaw the data Many attacks must be known beforehand so that they can build responders A new worm might be propagating heavily for the short period of time during their tests which would skew typically observed numbers Heavier weights put on “more popular” attacks due to IP filtering, however “less popular” attacks may generate much more traffic

Contributions Were able to quantify how much typical internet traffic is nonproductive Were able to qualify this nonproductive traffic into categories and show much of it is malicious