Internet Intrusions: Global Characteristics and Prevalence Presented By: Zhichun Li Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS 2003.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
University of Massachusetts at Amherst 1 Flooding Attacks by Exploiting Persistent Forwarding Loops Jianhong Xia, Lixin Gao and Teng Fei University of.
CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)
Internet Intrusions: Global Characteristics and Prevalence Presented By: Elliot Parsons Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Delayed Internet Routing Convergence Craig Labovitz, Abha Ahuja, Abhijit Bose, Farham Jahanian Presented By Harpal Singh Bassali.
Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Allocations vs Announcements A comparison of RIR IPv4 Allocation Records with Global Routing Announcements Geoff Huston May 2004 (Activity supported by.
Chapter 5: Descriptive Research Describe patterns of behavior, thoughts, and emotions among a group of individuals. Provide information about characteristics.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
Global Intrusion Detection Using Distribute Hash Table Jason Skicewicz, Laurence Berland, Yan Chen Northwestern University 6/2004.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
1 Impact of IT Monoculture on Behavioral End Host Intrusion Detection Dhiman Barman, UC Riverside/Juniper Jaideep Chandrashekar, Intel Research Nina Taft,
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Session 1341: Case Studies of Security Studies of Intrusion.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Information Fusion By Ganesh Godavari. Outline of Talk Problem Definition –Attack Types Correlation Solutions OSSIM Work Status.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Measurement in the Internet Measurement in the Internet Paul Barford University of Wisconsin - Madison Spring, 2001.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Security System for KOREN/APII-Testbed
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
Defending against Hitlist Worms using NASR Khanh Nguyen.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Fraud Mobility Ken Meiser VP- Identity Solutions.
Data Streaming in Computer Networking
CS4622 Team 4 Worms, DoS, and Smurf Attacks
A Distributed DoS in Action
Memento: Making Sliding Windows Efficient for Heavy Hitters
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Internet Intrusions: Global Characteristics and Prevalence Presented By: Zhichun Li Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS 2003

Overview Data Sources Data Sources Intrusion Characteristics Intrusion Characteristics –Port and source Distribution Projection to the global address space Projection to the global address space Implications of Shared Information Implications of Shared Information –Does information sharing help? –How much information is needed?

Goals This papers aims to: Show the volume of intrusions attempts Show the volume of intrusions attempts Show the distribution of intrusions Show the distribution of intrusions –In terms of both source and victim Show the impact of various scan types Show the impact of various scan types Expand findings to the global scope Expand findings to the global scope

Data Sources To extend the findings to the global scope, the data must: Come from many ASes Come from many ASes Be spread both geographically and over the IP address space Be spread both geographically and over the IP address space

DSHIELD (part of SANS Institute) (part of SANS Institute) Firewall / NIDS logs, ~ 1600 networks Firewall / NIDS logs, ~ 1600 networks –BlackIce Defender, CISCO PIX Firewall, IP chains –Snort, Zonealarm Pro, Portsentry 4 months (aug 2001, may-july 2002) 4 months (aug 2001, may-july 2002) –60 million scans, 375K dest IPs per month –5 Class B, 45 Class C, many others

DSHIELD Data Lowest common denominator approach Lowest common denominator approach –simplicity, diversity, unbiased Pitfalls Pitfalls –packet headers, active connection info –flooding intentional, misconfiguration (broadcast, half- life) intentional, misconfiguration (broadcast, half- life) –Spoofed sources

DSHIELD Red dots represent participating ASes Grey lines demonstrate connectivity between ASes Dots closer to the center indicate ASes closer to the internet backbone

Worms Code-red I Code-red I –July 12, 2001, 2 phase attack, random propagation Code-red II Code-red II –Aug 4, 2001, “local-random propagation” Nimda Nimda –Sep 18, 2001, “local-random propagation” SQL-snake SQL-snake –May 2002, port 1433, random propagation – passwords and sysinfo

Scan Types Vertical Scan Vertical Scan –Multiple ports on 1 victim by 1 source Horizontal Scan Horizontal Scan –1 port on multiple victims by 1 source Coordinated Scans Coordinated Scans –Multiple sources aimed at a /24 space Stealth Scans Stealth Scans –Horizontal or vertical –Characterized by a very low frequency

Intrusion Characteristics Port Distribution Port Distribution –Monitor the destination port for intrusion attempts Source Distribution Source Distribution –Look for trends in the source address associated with intrusions –Group intrusions into port 80, port 1433, and non-worm scans

Port Distribution

Source Distribution port 80 port 1433 non-worm (June 2002) (June 2002) (June 2002)

Persistence of Worm Activity 3 months data: May-July 2002 (CDF) Half life ~ 18 days (/24), 6 hours (/32)

Date Characteristics Code Red 1 was still very much alive!!

Top Sources Mainly applies to non-worm scans Mainly applies to non-worm scans Results will show that only a few sources are responsible for a significant amount of the scans Results will show that only a few sources are responsible for a significant amount of the scans –Zipf Distribution Argument for a blacklist Argument for a blacklist

Top Sources Zipf distribution (power law) CDF (source IP rank vs num scans : log-log scale)

Top Sources May 2002 scan volume: overall vs top 100 sources Top 100 sources account for 50% of all scans in any month

Source Coordination Aug 2001: 8 of the top 20 sources display identical ON/OFF behavior Such clusters common among top 20 sources of all 4 months! All sources scan more than 5 distinct /16s.

Source Coordination May 2002: ON/OFF pattern (4 out of top 20 sources) Staggering behavior (identical attack or attack tool)

Identification of Scan Types Still look at only non-worm scans Still look at only non-worm scans Horizontal scans make up the majority of the scans Horizontal scans make up the majority of the scans More vertical scan episodes More vertical scan episodes Surprisingly high number of coordinated scans Surprisingly high number of coordinated scans Stealth scans occur much less frequently, but are usually vertical scans Stealth scans occur much less frequently, but are usually vertical scans

Scan Types Number of Scans

Scan Types Number of Episodes

Global Projections Question: How has the scanning trend changed over the past year? Question: How has the scanning trend changed over the past year? –Must extend the data to the entire internet Simply average the data and multiply by 2 32 Simply average the data and multiply by 2 32 –Possible because data comes from a broad range of sources

Projection of Port 80 Scans Port 80 scans show a decreasing trend – biased by release of CR I/II May-july 2002 relatively steady with small upward slope

Projection of Non-worm Scans Projection: (avg scan per IP) * num IPs – similar projections for /24 and /16 aggregates 25B scans / day

Implications of Shared Information Many have looked to pool resources Many have looked to pool resources Do not identify speed of attacks Do not identify speed of attacks Can gain a view of trends in attacks, though Can gain a view of trends in attacks, though

Information Theoretic Approach Relative Entropy – measure of the distributional similarity between two variables Relative Entropy – measure of the distributional similarity between two variables Marginal Utility – amount of information gained by adding more samples Marginal Utility – amount of information gained by adding more samples

Information Theoretic Approach Goal – how much does adding intrusion logs improve the resolution of identifying “worst offenders” Goal – how much does adding intrusion logs improve the resolution of identifying “worst offenders” Can be measured using marginal utility Can be measured using marginal utility –Number of experiments is the number of logs identified

Evaluation of Marginal Utility Approach Use 100 /16’s and 100 /24’s from the total data sets Use 100 /16’s and 100 /24’s from the total data sets –Chosen at random Received promising results about the amount gained from adding more data sets Received promising results about the amount gained from adding more data sets

Marginal Utility for Worst Offenders Random day, 100 random /16s and /24s Diminished returns after 40 /16s and 50 /24s

Marginal Utility for Detecting Target Ports Random day, 100 random /16s and /24s Diminished returns after 40 nodes.

Conclusion A lot of scanning directed away from port 80 A lot of scanning directed away from port 80 –25B scans per day, 25% non port 80 A set of worst offenders does exist who are responsible for a lot of the scanning A set of worst offenders does exist who are responsible for a lot of the scanning Combining data from multiple sites gives more information Combining data from multiple sites gives more information –Data from larger sites is more useful

Backup for discussion Data bias Data bias –Different platforms: BlackIce Defender, CISCO PIX, ZoneAlarm, Linux IPchains, Portsentry and Snort –1600 firewall/NIDS across geography and IP space

Internet Intrusion vs. Scan Scan is the most common and versatile type of intrusion Scan is the most common and versatile type of intrusion Normally, before compromising hackers need to use scan to find out venerability Normally, before compromising hackers need to use scan to find out venerability From scans we can know the attempts from hackers From scans we can know the attempts from hackers

spoof bounce Up to now, not widely used Up to now, not widely used Although we cannot track where you send the scan packet but still can track the receiver or sensor. Although we cannot track where you send the scan packet but still can track the receiver or sensor. Known existing tools: Idlescan Known existing tools: Idlescan

projection of whole Internet Pretty rough but should work Pretty rough but should work The set of provider networks are reasonably well distributed (both geographically and over the IP space) The set of provider networks are reasonably well distributed (both geographically and over the IP space) Using the routable IP space from BGP table should be a better plan. Using the routable IP space from BGP table should be a better plan.

Information sharing vs. privacy What shared are scanning attempts, which may be malicious, so share them normally won’t hurt people’s privacy. What shared are scanning attempts, which may be malicious, so share them normally won’t hurt people’s privacy. We also may build in BGP like policy control into information sharing. We also may build in BGP like policy control into information sharing.

scan episodes The scans sent by one attacker The scans sent by one attacker

100 16's and ’s DSHIELD Data set: 5 Class B, 45 Class C, many others DSHIELD Data set: 5 Class B, 45 Class C, many others Here the ’s is 100 /16 prefix, although only 5 is full. Here the ’s is 100 /16 prefix, although only 5 is full. Same thing for ’s Same thing for ’s

Scan Speed Stealth scan Stealth scan –Internal between scans should less 180seconds. horizontal scans and vertical scans horizontal scans and vertical scans –1 hour is the upper bound –Normal time interval is much less.

Service Distribution of Scans