Mapping Internet Sensors With Probe Response Attacks

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Polytechnic University,ECE Department1 Detection of “Hot Spots” Paper Title : Joint Data Streaming and Sampling Techniques for Detection of Super Sources.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
“On Scalable Attack Detection in the Network” Ramana Rao Kompella, Sumeet Singh, and George Varghese Presented by Nadine Sundquist.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
seminar on Intrusion detection system
Fast and Robust Worm Detection Algorithm Tian Bu Aiyou Chen Scott Vander Wiel Thomas Woo bearhsu.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Bottleneck Bandwidth Estimation Instructor: Dr. Aggarwal Present by: Jason Wei.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.
By John Bethencourt, Jason Franklin, and Mary Vernon Computer Sciences Department University of Wisconsin, Madison Published in the Proceedings of the.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Source-End Defense System against DDoS attacks Fu-Yuan Lee, Shiuhpyng Shieh, Jui-Ting Shieh and Sheng Hsuan Wang Distributed System and Network Security.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Chapter 5: Implementing Intrusion Prevention
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
PART3 Data collection methodology and NM paradigms 1.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
DoS/DDoS attack and defense
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Introduction Wireless devices offering IP connectivity
DDoS Attacks on Financial Institutions Presentation
Jennifer Rexford Princeton University
FIREWALL configuration in linux
POLYGRAPH: Automatically Generating Signatures for Polymorphic Worms
NETWORKS Fall 2010.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Characteristics of Internet Background Radiation
Data Streaming in Computer Networking
SOUTHERN TAIWAN UNIVERSITY ELECTRICAL ENGINEERING DEPARTMENT
Firewalls.
Data collection methodology and NM paradigms
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Memento: Making Sliding Windows Efficient for Heavy Hitters
Intrusion Detection system
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
Intrusion Detection Systems
Author: Ramana Rao Kompella, Kirill Levchenko, Alex C
Presentation transcript:

Mapping Internet Sensors With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Presented: Usenix Security Symposium, 2005 Tracy Wagner CDA 6938 February 22, 2007

Outline Introduction Probe Response Attacks Case Study: SANS Internet Storm Center Improvements Simulation Analysis Countermeasures Summary Contributions / Weaknesses / Future Work

Introduction Internet Sensor Networks Publicly Reported Statistics Secrecy Protects Integrity of Information Little Attention Given To Determining Sensor Locations Probe Response Attack Techniques and Algorithm

Case Study – SANS ISC Internet Storm Center Challenging network to map DShield Project - Firewall and IDS logs Analyzes and aggregates information Automatically publishes public reports http://www.dshield.org/ Challenging network to map Large number of sensors Non-contiguous IP addresses

Case Study – SANS ISC ISC Port Reports Port: Destination Port Reports: # Log Entries with destination port Sources: # Distinct Source IPs Targets: # Distinct Destination IPs SANS ISC Port Report from http://isc.sans.org February 19, 2007

Case Study – SANS ISC Basic Idea: Probe an IP address with port activity Check the published reports for activity Send enough packets to distinguish from other activity Use for every possible valid IP address

Case Study – SANS ISC Two observations: Majority of IP addresses correspond to no host or to a non-monitored host Reports list activity by port Preprocessing: Filter Invalid IPs Leaves ~2.1 billion IP addresses

Basic Probe Response Algorithm: Stage One If n ports can be used for probes: {p1, p2,…,pn} Divide list of IPs into n intervals: {S1, S2, …, Sn} For (1 ≤ i ≤ n) Send a SYN packet on port pi to each address in Si

Basic Probe Response Algorithm: Stage One Retrieve Updated Port Report Traffic on monitored IPs will be reported Tells us the number of monitored IPs in each Si Each non-monitored interval is discarded Each interval that has monitored IPs is kept

Basic Probe Response Algorithm: Stage Two Input: Remaining k intervals, R1, R2,…, Rk Number of monitored IPs in each interval Assign n/k ports to each interval For (1 ≤ i ≤ k) Divide Ri into (n/k + 1) subintervals While (1 ≤ j ≤ n/k) Send a packet on pj to each address in subinterval j

Basic Probe Response Algorithm: Stage Two

Dealing With Noise Other sources may be sending packets to monitored IPs on same ports Tradeoff Tolerate some noise, but must send more packets Report Noise Cancellation Factor If < 5 for a given port, send 5 packets instead of one Divide reported number by 5, round down to nearest integer Number of Ports Reports 561 ≤ 5 19,364 ≤ 10 41,357 ≤ 15 51,959 ≤ 20 56,305 ≤ 25

Improvements – Speed Up Attack Stop working on an interval when some percentage of monitored IPs are found Creates a Superset of Sensor IPs (False Positives) Discard an interval when monitored IPs are below some threshold Creates a Subset of Sensor IPs (False Negatives)

Improvements – Speed Up Attack Multiple Source Technique Further divide interval into some number of pieces – Multiple Source Factor Send packets from 2i-1 source addresses to each address in ith piece Use number of sources reported to determine if any intervals did not have monitored IPs

Improvements – Speed Up Attack Example: Multiple Source Technique Interval Sources 1 2 3 4 Divide interval into three pieces Five sources reported Know monitored addresses are in first and third intervals More efficient – reduces size of intervals for next iteration Limited use – exponential increase in number of packets

Simulation Analysis Three Attacker Models T1 Attacker T3 Attacker 1.544 Mbps upload bandwidth T3 Attacker 38.4 Mbps upload bandwidth OC6 Attacker 384 Mbps upload bandwidth

Simulation Analysis Actual Set of Monitored IP Addresses T1 Attacker Report Noise Cancellation Factor of 2 Do not use Multiple Source Technique 33 days, 17 hours; 9.5 billion packets T3 Attacker Multiple Source Factor of 2 4 days, 16 hours; 14 billion packets

Simulation Analysis Actual Set of Monitored IP Addresses OC6 Attacker Noise Report Cancellation Factor of 8 Multiple Source Factor of 2 Source Based Noise Cancellation Factor of 4 70 hours

Simulation Analysis Superset T3 Attacker Maximum false positive rate .94 Report Noise Cancellation Factor of 4 Multiple Source Factor of 2 Reduction from 112 hours to 78 hours 3.5 million false positives Number of probes reduced by less than 1%

Simulation Analysis Subset T1 Attacker Maximum false negative rate .001 Report Noise Cancellation Factor of 2 Use only a single source 33 days, 17 hours reduced to 15 days, 18 hours Reduction from 9.5 billion to 4.4 billion packets Miss 26% of sensors

Countermeasures Current Methods Do Not Prevent Probe Response Attacks Hashing/Encrypting source IP addresses Bloom Filters Impractical Methods Information Limiting also limits use of network IPv6 adoption out of control of sensor network Delayed Reporting More time to complete Use non-adaptive algorithm

Summary Consequences of an attacker mapping a set of sensor IPs are severe Could avoid monitored IPs in any future scanning Include blacklist in any released worms Flood monitored addresses; real alerts unnoticed Recovery would be extremely time consuming

Contributions Introduction of a new class of attacks Case study and extensive simulations to determine optimal parameters and produce time estimates Insight into factors affecting success Modifications to map other networks

Weaknesses Algorithm is sensor network-specific Time and resources involved Countermeasures are brief

Future Work Development and evaluation of nonadaptive approach for determining sensor locations Study of effectiveness of delayed reporting countermeasures