The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
1 Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster.
Virtual Switching Without a Hypervisor for a More Secure Cloud Xin Jin Princeton University Joint work with Eric Keller(UPenn) and Jennifer Rexford(Princeton)
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Nicholas Weaver Vern Paxson Stuart Staniford UC Berkeley ICIR
Programmable Measurement Architecture for Data Centers Minlan Yu University of Southern California 1.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Xen , Linux Vserver , Planet Lab
- 1 - Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic Michael Bailey, Evan Cooke, David Watson and Farnam Jahanian University.
Worm and Botnet Trapper System Using Honeypots Yan Gao & Usman Jafarey.
Stopping Worm/Virus Attacks Chiu Wah So (Kelvin).
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Vigilante and Potemkin Presenter: Ýmir Vigfússon Based in part on slide sets from Mahesh Balakrishnan and Raghavan Srinivasan.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
Inferring Internet Denial-of- Service Activity David Moore, Geoffrey M Voelker, Stefan Savage Presented by Yuemin Yu – CS290F – Winter 2005.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Virtualization for Cloud Computing
Lecture 11 Intrusion Detection (cont)
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm Authors: Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex.
UCSD Potemkin Honeyfarm Jay Chen, Ranjit Jhala, Chris Kanich, Erin Kenneally, Justin Ma, David Moore, Stefan Savage, Colleen Shannon, Alex Snoeren, Amin.
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Presenter: Martin Krogel.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Introduction to Honeypot, Botnet, and Security Measurement
BotNet Detection Techniques By Shreyas Sali
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
HyperSpector: Virtual Distributed Monitoring Environments for Secure Intrusion Detection Kenichi Kourai Shigeru Chiba Tokyo Institute of Technology.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Collaborative Center for Internet Epidemiology and Defenses (CCIED) Stefan Savage Department of Computer Science & Engineering University of California,
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
A Multifaceted Approach to Understanding the Botnet Phenomenon Authors : Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis Computer Science.
Our work on virtualization Chen Haogang, Wang Xiaolin {hchen, Institute of Network and Information Systems School of Electrical Engineering.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex C. Snoeren,
Full and Para Virtualization
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
6.894: Distributed Operating System Engineering Lecturers: Frans Kaashoek Robert Morris
DoS/DDoS attack and defense
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Characteristics of Internet Background Radiation ACM Internet Measurement Conference (IMC), 2004 Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford,
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department, University.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft,
Real-time protection for web sites and web apps against ATTACKS
Chapter 1: Introduction
Jonas Pfoh, Daniel Angermeier
Honeypots at CESNET/MU
Determined Human Adversaries: Mitigations
THE INTERNET MOTION SENSOR: A Distributed Blackhole Monitoring System
Determined Human Adversaries: Mitigations
Introduction to Internet Worm
Presentation transcript:

The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter: Anup Goyal

What is a Blackhole?

Telescope/ Blackhole/ DarkNet/ Sink  Monitoring of unused Address space is very useful CAIDA-Network Telescope Internet Motion Sensor – blackhole Team Cymru – DarkNets IUCC/IDC Internet Telescope Isink  Investigating DDOS  Tracking Worms  Characterizing emerging Internet Thread

Motivation Passive Monitoring has been around for a while, why build another one?  Need broader coverage  Need to be able to differentiate threats Our Solutions:  Distributed Monitoring Infrastructure Increas coverage of threat activity  Lightweight Active Responder Capture payloads to differentiate threats  Payload signature and caching Improve performance and scalability

Why do you need to be distributed?

Local Preference across sensors

Distributed Monitoring Infrastructure

Differentiate Threats?

Why not Build Service Modules?

Lightweight Active Responder  Goal: obtain enough fidelity to differentiate threats with the minimum resource cost  TCP needs to establish a connection before data is sent  Use Lightweight SYN-ACK active Responder

Blaster Worm – Live Host

Blaster Worm – Passive Monitor

Blaster Worm - IMS

Active Responder Limitations  Application-level responder may be required to differentiate threats (e.g. Agobot) -Threats like Agobot can be differentiated using scanning behaviour  Sensors can be fingerprinted and avoided IMS focused on globally scoped threats (threat model does not include targated manual attacks) Many sensors of different sizes in many networks near live hosts makes avoidance very hard Rotate active responders within address block

Payload Signature and Caching

IMS Deployment  Initial /8 deployment in Currently 60 address blocks at 18 networks on 3 continent  Tier 1 ISPs, Large Enterprise, Broadband, Academic, National ISPs, Regional ISPs

Deployment Statistics  17,094,016 IPs monitored  27 /8 block with an IMS sensor  1.25% of routed IPv4 space  21% of all routable /8 blocks have at least one sensor IMS Has provided insight into: 1.Internet Worms 2.Reconnaissance/Scanning 3.DDos

Internet Worms

Scanning

SCO DDoS

Summary & Outreach Summary:  IMS provides a lightweight but effective platform for tracking, and characterizing Internet threats  Successful deployment on 60 address blocks at 18 organization Outreach:  IMS currently used daily by operator community to investigate new threats  We provide reports and forensics to NSP-SEC  We are now focusing academic networks  Data traces will be available through DHS PREDICT project

Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker,Stefan Savage Presenter: Anup Goyal

Background  Large-scale host exploitation a serious problem  Worms, viruses, bots, spyware …  Supports an emerging economic criminal enterprise  SPAM, DDoS, phishing, piracy, ID theft …  Quality and sophistication of malware increasing rapidly

Motivation  Intelligence about new threats is critical for defenders  Principal tool is the network honeypot Monitored system deployed for the purpose of being attacked  Honeyfarm: Collection of honeypots Provide early warning, accurate inference of global activity,cover wide range of software  Design issues Scalability: How many honeypots can be deployed Fidelity: How accurately systems are emulated Containment: How well innocent third parties are protected  Challenge: tension between scalability and fidelity

Honeyfarm Scalability/Fidelity Tradeoff

Approach  Dedicated honeypot systems are overkill  Can provide the illusion of dedicated systems via aggressive resource multiplexing at network and host levels

Network-level Multiplexing  Most addresses don ’ t receive traffic most of the time -Apply late binding of IP addresses to honeypots  Most traffic that is received causes no interesting effects - Allocate honeypots only long enough to identify interesting behavior -Recycle honeypots as soon as possible  How many honeypots are required? - For a given request rate, depends upon recycling rate

Effectiveness of Network-Level Multiplexing

Host-Level Multiplexing  CPU utilization in each honeypot quite low (milliseconds to process traffic) -Use VMM to multiplex honeypots on a single physical machine  Few memory pages actually modified when handling network data -Share unmodified pages among honeypots within a machine  How many virtual machines can we support? - Limited by unique memory required per VM

Effectiveness of Host-Level Multiplexing Further 2-3 order of magnitude improvement

The Potemkin Honeyfarm Architecture  Two components: -Gateway -VMM  Basic operation: -Packet received by gateway -Dispatched to honeyfarm server -VM instantiated -Adopts IP address

Potemkin VMM Requirements  VMs created on demand -VM creation must be fast enough to maintain illusion  Many VMs created - Must be resource- efficient

Potemkin VMM Overview  Modified version of Xen 3.0 (pre-release)  Flash cloning -Fork copies from a reference honeypot VM -Reduces VM creation time — no need to boot -Applications all ready to run  Delta virtualization -Copy-on-write sharing (between VMs) -Reduces per-VM state — only stores unique data -Further reduces VM creation time

Flash Cloning Performance  Time required to clone a 128 MB honeypot: Control tools overhead 124 ms Low-level clone 11 ms Device setup 149 ms Other management overhead 79 ms Networking setup & overhead 158 ms Total 521 ms  0.5 s already imperceptible to external observers unless looking for delay, but we can do even better

Delta Virtualization Performance  Deployed using 128 MB Linux honeypots  Using servers with 2 GB RAM, have memory available to support ~ 1000 VMs per physical host  Currently tested with 100 VMs per host  Hits artificial resource limit in Xen, but this can be fixed

Containment Policies  Must also care about traffic going out  We deliberately run unpatched, insecure software in honeypots  Containment: Should not permit attacks on third parties  As with scalability, there is a tension between containment and fidelity  Various containment policies we support:  Allow no traffic out  Allow traffic over established connections  Allow traffic back to original host

Containment Implementation in Gateway  Containment policies implemented in network gateway  Tracks mappings between IP addresses, honeypots,  connections  Modular implementation in Click  Gateway adds insignificant overhead ( 1 ms)

Traffic Reflection Example gateway policy: Redirect traffic back to Honeyfarm  Packets sent out to third parties... ...may be redirected back into honeyfarm Reuses honeypot creation functionality

Challenges  Honeypot detection  If malware detects it is in a honeypot, may act differently  How easy it is to detect virtualization?  VMware detection code used in the wild  Open arms race between honeypot detection and camouflage  Resource exhaustion  Under high load, difficult to maintain accurate illusion  Large-scale outbreak  Honeypot denial-of-service  Challenge is intelligently shedding load

Summary  Can achieve both high fidelity and scalability  Sufficient to provide the illusion of scale  Potemkin prototype: 65k addresses -> 10 physical hosts  Largest high-fidelity honeypot that we are aware of  Provides important tool for study of and defenses against malware