Multi-Route Anomaly detection using Principal Component Analysis Adnan Iqbal Superviser Dr. Waqar Mahmood 21-06-05.

Slides:



Advertisements
Similar presentations
Bro: A System for Detecting Network Intruders in Real-Time Vern Paxson Lawrence Berkeley National Laboratory,Berkeley, CA A stand-alone system for detecting.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
ITP 457 Network Security Network Hacking 101. Hacking Methodology (review) 1. Gather target information 2. Identify services and ports open on the target.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Multi-Route Anomaly detection using Principal Component Analysis Adnan Iqbal Superviser Dr. Waqar Mahmood.
1 Weekly Progress (MAGGIE) Adnan Iqbal Superviser Dr. Waqar Mahmood
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Chapter 11 Phase 5: Covering Tracks and Hiding. Attrition Web Site  Contains an archive of Web vandalism attacks
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
Ana Chanaba Robert Huylo
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Sales Kickoff - ARCserve
Penetration Testing Security Analysis and Advanced Tools: Snort.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Networking and the Internet ITSC 1458.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 6: Name Resolution.
CIS 450 – Network Security Chapter 3 – Information Gathering.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Inetd...Server of Servers Looks at a number of ports Determines when a service is needed on any of those ports Calls the appropriate server Restarts new.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Linux Services Configuration
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Agenda Networking with Linux & UNIX OS –Overview –Setup –Common Utilities.
DoS/DDoS attack and defense
Linux Operations and Administration
Information Fusion Ganesh Godavari. DDoS Data Set DARPA DDoS data set (2000) is available –MIT Lincoln Laboratory –Data Set spans approximately 3 hours.
Information Fusion Ganesh Godavari. DDoS Data Set DARPA DDoS data set (2000) is available –MIT Lincoln Laboratory –Data Set spans approximately 3 hours.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Principles of Computer Security
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Intrusion Detection Systems (IDS)
A Distributed DoS in Action
Computer Security Distributed System Security
Web Servers / Deployment
Operating System Security
Crisis and Aftermath Morris worm.
Presentation transcript:

Multi-Route Anomaly detection using Principal Component Analysis Adnan Iqbal Superviser Dr. Waqar Mahmood

The concept Idea is to discover anomalies in the whole network and then to compare these network wide anomalies with those of single route anomalies To find out relationship between network wide anomalies and its constituent single route anomalies

Summary Discover a scheme that can be used to get relationship between network wide anomalies and single route anomalies Implement the scheme Perform Regularization of Data Apply the scheme to suitable routes Analyze Results Analysis of Data used in Anomaly Detection Study of MIT Lincoln Lab intrusion detection data (Completed)

Current Work Study of MIT Lincoln Lab intrusion detection data (contd) Data Sets

Dataset data set (scenario based) LLDOS Scenario One LLDOS Scenario Two Windows NT Attack Data Set Data is in multiple files Tcpdump of inside Tcpdump of DMZ Syslog of different hosts Scenario 1 Data Set DDoS Level 1.0 Adversary :Novice Goal:Install components for, and carry out, a DDOS attack Defender: Naive Spread over multiple phases

Phases of Attack - 1 Phase 1: The adversary performs a scripted IPsweep of multiple class C subnets on the Air Force Base. The following networks are swept from address 1 to 254: /24, /24, /24, /24. The attacker ICMP echo-requests in this sweep and listens for echo-replies to determine which hosts are "up". Phase 2: Those hosts that are found to be alive in the previous phase probed to determine which ones are configured to run the "sadmind" remote administraion tool.

Phases of Attack - 2 Phase 3: The attacker then tries to break into those hosts that are found to be running the sadmind service in the previous phase. The attacker needs to execute two commands, one to "cat" an entry onto the victim's /etc/passwd file and one to "cat" an entry onto the victim's /etc/shadow file. The new root user's name is 'hacker2' and hacker2's home directory is set to be /tmp. To test weather or not a break-in was sucessful, the attack script attempts a login, via telnet, as hacker2, after each set of two breakin attempts. When sucessful the attackers script moves on to the next potential victim.

Phases of Attack - 3 Phase 4: Entering this phase, the attack script has built a list of those hosts on which it has sucessfully installed the 'hacker2' user. These are mill ( ), pascal ( ), and locke ( ). For each host on this list, the script performs a telnet login, makes a directory on the victim called "/tmp/.mstream/" and uses rcp to copy mstream server software. The attacker also installs a ".rhosts" file for themselves in /tmp, so that they can rsh in to startup the binary programs. On the first victim on the list, the attacker also installs the "master-sol" software, which is the mstream master. After installing the software on each host, the attacker uses rsh to startup first the master, and then the servers. as they come up, each server "registers" with the master that it is alive. The master writes out a database of live servers to a file called "/tmp/.sr".

Phases of Attack - 4 Phase 5: In the final phase, the attacker manually launches the DDOS. This is peformed via a telnet login to the victim on which the master is running, and then, from the victim, a "telnet" to port 6723 of the localhost. Port 6723/TCP is the port on which the master listens for connections to its user-interface. After entering a password for the user-interface, the attacker is given a prompt at which he/she enters two commands. The command "servers" causes the UI to list the mstream servers which have registerd with it and are ready to attack. the command "mstream " causes a DDOS attack, of 5 second duration, against the given IP address to be launched by all three servers simulataneously. The mstream DDOS consists of many, many connection requests to a variety of ports on the victim. All packets have a spoofed, random source IP address. The attacker then logs out. The tiny duration was chosen so that it would be possible to easily distribute tcpdump and audit logs of these events -- to avoid them being to large. In real life, one might expect a DDOS of longer duration, several hours or more.

LLDDoS v ADVERSARY: Novice -- scripted attack, fairly blatant ADVERSARY_GOAL: Install components for, and carry out, a DDOS attack DEFENDER: Naive -- sunrpc allowed through firewall, HINFO DNS records contain some valid host information. DIFFERENCES FROM VERS. 1.0: The main difference between and 1.0 is that in the attacker probes for host, platform, operating system by doing DNS HINFO queries, rather than sweeping IP's and rpc ports, and that they break-into one host at Eyrie first, then fan out from there, rather than attacking each host individually.

Phases of Attack v Probe of mill.eyrie.af.mil, Eyrie's public DNS server, via the HINFO query Breakin-to mill.eyrie.af.mil via the sadmind exploit FTP upload of mstream DDoS software and attack script, to break-into more Eyrie hosts. Initiate attack on other Eyrie hosts: Telnet to mill.eyrie.af.mil, setup DDoS master and initiate probing and attack of other Eyrie hosts. Probes are via the HINFO record query and attacks are via the sadmind exploit. Two break-ins are attempted: robin.eyrie.af.mil (a linux host listed as Solaris in the HINFO, breakin fails!) and pascal.eyrie.af.mil (breakin succeeds since the host is Solaris!) Launching the DDoS: Telnet to mill, telnet to localhost port 6723, connect to the master, and launch attack at

Data Files For every phase different files For each phase.fulllist - ASCII.list - ASCII.warn - ASCII.dump.tcpdump-out-dump.xml - it has alerts

Future Work Analysis of Fermi Lab Data