Yan Chen Lab for Internet & Security Technology (LIST)

Slides:



Advertisements
Similar presentations
Sketch-based Change Detection Balachander Krishnamurthy (AT&T) Subhabrata Sen (AT&T) Yin Zhang (AT&T) Yan Chen (UCB/AT&T) ACM Internet Measurement Conference.
Advertisements

 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
High-Performance Network Anomaly/Intrusion Detection & Mitigation System (HPNAIDM) Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
High-Performance Network Anomaly/Intrusion Detection & Mitigation System (HPNAIDM) Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
1 Reversible Sketches for Efficient and Accurate Change Detection over Network Data Streams Robert Schweller Ashish Gupta Elliot Parsons Yan Chen Computer.
Internet Intrusions: Global Characteristics and Prevalence Presented By: Elliot Parsons Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Router-based Anomaly/Intrusion Detection and Mitigation (RAIDM) Systems Scalable.
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller 1, Zhichun Li 1, Yan Chen 1, Yan Gao 1, Ashish.
Welcome to EECS 354 Network Penetration and Security.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
High-Performance Network Anomaly/Intrusion Detection & Mitigation System (HPNAIDM) Zhichun Li Lab for Internet & Security Technology (LIST) Department.
Reverse Hashing for Sketch Based Change Detection in High Speed Networks Ashish Gupta Elliot Parsons with Robert Schweller, Theory Group Advisor: Yan Chen.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Towards a High-speed Router-based Anomaly/Intrusion Detection System (HRAID) Zhichun Li, Yan Gao, Yan Chen Northwestern.
Welcome to EECS 450 Internet Security. Why Internet Security The past decade has seen an explosion in the concern for the security of information –Malicious.
School of Computer Science and Information Systems
Report on statistical Intrusion Detection systems By Ganesh Godavari.
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Lab for Internet and Security Technology.
1 Towards Anomaly/Intrusion Detection and Mitigation on High-Speed Networks Yan Gao, Zhichun Li, Manan Sanghi, Yan Chen, Ming- Yang Kao Northwestern Lab.
1 Network Intrusion Detection and Mitigation Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Department of Computer Science Northwestern.
What Learned Last Week Homework qn –What machine does the URL go to?
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
High-Performance Network Anomaly/Intrusion Detection & Mitigation System (HPNAIDM) Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
1 Towards Anomaly/Intrusion Detection and Mitigation on High-Speed Networks Yan Gao, Zhichun Li, Yan Chen Northwestern Lab for Internet and Security Technology.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Towards a High speed Router based Anomaly/Intrusion detection System Yan Gao & Zhichun Li.
1 Network-based Intrusion Detection, Mitigation and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
1 HPNAIDM: the High-Performance Network Anomaly/Intrusion Detection and Mitigation System Yan Chen Lab for Internet & Security Technology (LIST) Department.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
A Dos Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Department of EECS, Northwestern University.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
1 Network Intrusion Detection and Mitigation Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Department of Computer Science Northwestern.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Monitoring, Diagnosing, and Securing the Internet 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
Northwestern Lab for Internet & Security Technology (LIST)
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Network-based Intrusion Detection, Prevention and Forensics System
Intrusion Detection/Prevention Systems
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Yan Chen Department of Electrical Engineering and Computer Science
Network Intrusion Detection and Mitigation
The Current Internet: Connectivity and Processing
End-user Based Network Measurement and Diagnosis
Northwestern Lab for Internet and Security Technology (LIST)
Statistical based IDS background introduction
Lu Tang , Qun Huang, Patrick P. C. Lee
PCAV: Evaluation of Parallel Coordinates Attack Visualization
Presentation transcript:

HPNAIDM: the High-Performance Network Anomaly/Intrusion Detection and Mitigation System Yan Chen Lab for Internet & Security Technology (LIST) Department of EECS Northwestern University http://list.cs.northwestern.edu Morris Moore, vice president and director of Systems/Architecture, Wireless Broadband and Systems Group, Motorola Semiconductor Products Sector.

Battling Hackers is a Growth Industry! --Wall Street Journal (11/10/2004) The past decade has seen an explosion in the concern for the security of information Denial of service (DoS) attacks Cost $1.2 billion in 2000 Thousands of attacks per week in 2001 Yahoo, Amazon, eBay, Microsoft, White House, etc., attacked Virus and worms faster and powerful Melissa, Nimda, Code Red, Code Red II, Slammer … Cause over $28 billion in economic losses in 2003, growing to over $75 billion in economic losses by 2007 2.4 billion loss: http://www.gao.gov/docdblite/summary.php?recflag=&accno=A01693&rptno=GAO-01-1073T Economic loss: http://www.mxlogic.com/PDFs/IndustryStats.2.28.04.pdf

Current Intrusion Detection Systems (IDS) Mostly host-based and not scalable to high-speed networks Slammer worm infected 75,000 machines in <15 mins Flash worm can take less than 1 second to compromise 1M vulnerable machines in the Internet [Staniford04] Host-based schemes inefficient and user dependent Have to install IDS on all user machines ! Existing network IDS unscalable: In a 10Gbps link, each 40-byte packet only has 10ns for processing ! Many DOE national labs have over 10Gbps high-performance networks

The Spread of Sapphire/Slammer Worms In the first 30 minutes of Sapphire’s spread, we recorded nearly 75,000 unique infections. As we will detail later, most of these infections actually occurred within 10 minutes. This graphic is more for effect rather than technical detail: We couldn’t determine a detailed location for all infections, and the diameter of each circle is proportional to the lg() of the number of infections, underrepresenting larger infections. Nevertheless, it gives a good feel for where Sapphire spread. We monitored the spread using several “Network Telescopes”, address ranges where we had sampled or complete packet traces at single sources. We also used the D-shield distributed intrusion detection system to determine IPs of infected machines, but we couldn’t use this data for calculating the scanning rate.

Current Intrusion Detection Systems (II) Mostly signature-based Cannot recognize unknown anomalies/intrusions New viruses/worms, polymorphism Statistical detection Hard to adapt to traffic pattern changes Unscalable for flow-level detection IDS vulnerable to DoS attacks Overall traffic based: inaccurate, high false positives Cannot differentiate malicious events with unintentional anomalies Anomalies can be caused by network element faults E.g., router misconfiguration

High-Performance Network Anomaly/Intrusion Detection and Mitigation System (HPNAIDM) Online traffic recording Design reversible sketch for data streaming computation Record millions of flows (GB traffic) in a few hundred KB Small # of memory access per packet Scalable to large key space size (232 or 264) Online sketch-based flow-level anomaly/intrusion detection Leverage statistical learning theory (SLT) adaptively learn the traffic pattern changes As a first step, detect TCP SYN flooding, horizontal and vertical scans even when mixed

HPNAIDM (II) Integrated approach for false positive reduction Signature-based detection Network element fault diagnostics Traffic signature matching of emerging applications Infer key characteristics of malicious flows for mitigation HPNAIDM: First flow-level intrusion detection that can sustain 10s Gbps bandwidth even for worst case traffic of 40-byte packet streams

Intrusion or anomaly alarms to fusion centers HPNAIDM Architecture Remote aggregated sketch records Sent out for aggregation Reversible k-ary sketch monitoring Part I Sketch-based monitoring & detection Normal flows Local sketch records Sketch based statistical anomaly detection (SSAD) Streaming packet data Keys of suspicious flows Filtering Keys of normal flows Statistical detection Signature-based detection Per-flow monitoring Network fault detection Part II Per-flow monitoring & detection Suspicious flows Traffic profile checking Intrusion or anomaly alarms to fusion centers Modules on the critical path Modules on the non-critical path Data path Control path

Reversible Sketch Based Anomaly Detection Error Sketch Sketch module Forecast module(s) Anomaly detection module (k,u) … Sketches Alarms Input stream: (key, update) (e.g., SIP, SYN-SYN/ACK) Summarize input stream using sketches Build forecast models on top of sketches Report flows with large forecast errors Infer the (characteristics) key for mitigation

Sketch-based Intrusion Detection RS((DIP, Dport), SYN-SYN/ACK) RS((SIP, DIP), SYN-SYN/ACK) RS((SIP, Dport), SYN-SYN/ACK) Attack types RS((DIP, Dport), SYN-SYN/ACK) RS((SIP, DIP), RS((SIP, Dport), SYN flooding Yes Vertical scans No Horizontal scans

Intrusion Mitigation Attacks detected Mitigation Denial of Service (DoS), e.g., TCP SYN flooding SYN defender, SYN proxy, or SYN cookie for victim Port Scan and worms Ingress filtering with attacker IP Vertical port scan Quarantine the victim machine Horizontal port scan Monitor traffic with the same port # for compromised machine

Preliminary Evaluation Evaluated with NU traces (239M flows, 1.8TB traffic/day) Scalable Can handle hundreds of millions of time series Accurate Anomaly Detection w/ Reversible Sketch Compared with detection using complete flow-level logs Provable probabilistic accuracy guarantees Even more accurate on real Internet traces Efficient For the worst case traffic, all 40 byte packets 16 Gbps on a single FPGA board 526 Mbps on a Pentium-IV 2.4GHz PC Only less than 3MB memory used Annopalis wildstar board

Preliminary Evaluation (cont’d) 25 SYN flooding, 936 horizontal scans and 19 vertical scans detected (after sketch-based false positive reduction) 17 out of 25 SYN flooding verified w/ backscatter Complete flow-level connection info used for backscatter Scans verified (all for vscan, top and bottom 10 for hscan) Unknown scans also found in DShield and other alert reports Top 10 horizontal scans Bottom 10 horizontal scans Description Dport count Remote desktop scan 3389 1 SQLSnake 1433 3 W32.Rahack 4899 2 unknown scan 3632 Scan SSH 22 10202 Proxy scan 8118 Description Dport count W32.Sasser.B.Worm 5554 1 Backdoor.CrashCool 9898 2 Unknown scan 42 VNC scan 5900 3 6101 Scan SSH 22

Activities Publications Invited talk Z. Li, Y. Gao, and Y. Chen, “Towards a High-speed Router-based Anomaly/Intrusion Detection System”, poster in ACM SIGCOMM, 2005. Also, Work in Progress talk with the same title at USENIX Security Symposium, Aug. 2005. P. Ren, Y, Gao, Z. Li, Y. Chen and B. Watson, “IDGraphs: Intrusion Detection and Analysis Using Histographs”, Proc. of the IEEE Workshop on Visualization for Computer Security (VizSEC), 2005 R. Schweller, A. Gupta, E. Parsons, and Y. Chen, “Reversible Sketches for Efficient and Accurate Change Detection over Network Data Streams”, in ACM SIGCOMM Internet Measurement Conference (IMC), 2004 Y. Chen, D. Bindel, H. Song, and R. H. Katz, “An Algebraic Approach to Practical and Scalable Overlay Network Monitoring”, in Proceedings of ACM SIGCOMM, 2004 B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-based Change Detection: Methods, Evaluation, and Applications”, Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC), 2003 Y. Chen, D. Bindel, and R. H. Katz, “Tomography-based Overlay Network Monitoring”, Proceedings of ACM SIGCOMM Internet Measurement Conference (IMC), 2003 Invited talk Y. Chen, “Adaptive Intrusion Detection and Mitigation Systems for WiMAX Networks“, Motorola Research Lab, 2005

Potential Collaboration with DOE National Labs Dr. Wu-chun Feng Integrate w/ RADIANT Dr. Don Petravick and Dr. Matt Crawford Collaborated on a NSF proposal Dr. Nageswara Rao (UltraScience testbed) Traffic data collection, intrusion detection and analysis On-site testing SANS (SysAdmin, Audit, Network, Security) Institute was established in 1989