- 1 - Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic Michael Bailey, Evan Cooke, David Watson and Farnam Jahanian University.

Slides:



Advertisements
Similar presentations
Network Security Highlights Nick Feamster Georgia Tech.
Advertisements

The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
By Hiranmayi Pai Neeraj Jain
Network Measurements: Unused IP address space traffic analysis at SSSUP Campus Network Francesco Paolucci, Piero Castoldi Research Unit at Scuola Superiore.
ARP Traffic Study Jim Rees, Manish Karir Research and Development Merit Network Inc.
Questions on “Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic” Yao Zhao.
Internet Intrusions: Global Characteristics and Prevalence Presented By: Elliot Parsons Using slides from Vinod Yegneswaran’s presentation at SIGMETRICS.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
Inferring Internet Denial-of- Service Activity David Moore, Geoffrey M Voelker, Stefan Savage Presented by Yuemin Yu – CS290F – Winter 2005.
10/21/20031 Framework For Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Kavita Chada & Viji Avali CSCE 790.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Presentation by Kathleen Stoeckle All Your iFRAMEs Point to Us 17th USENIX Security Symposium (Security'08), San Jose, CA, 2008 Google Technical Report.
Harness Your Internet Activity. Zeroing in On Zero Days DNS OARC Spring 2014 Ralf Weber
Introduction to Honeypot, Botnet, and Security Measurement
Honeypot and Intrusion Detection System
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Mitsubishi Research Institute, Inc Analyses on Distribution of Malicious Packets and Threats over the Internet August 27-31, 2007 APAN Network Research.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Carleton University School of Computer Science Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte, P.C. van Oorschot, Evangelos.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Presented by: Akbar Saidov Authors: M. Polychronakis, K. G. Anagnostakis, E. P. Markatos.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
Published: Internet Measurement Conference (IMC) 2006 Presented by Wei-Cheng Xiao 2015/11/221.
An Internet-Wide View of Internet-Wide Scanning.  Scanning  IPv4  Horizontal scanning – individual ports  Network telescope - darknet What is internet.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
DoS/DDoS attack and defense
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Mapping Internet Sensor With Probe Response Attacks Authors: John Bethencourt, Jason Franklin, and Mary Vernon. University of Wisconsin, Madison. Usenix.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
Role Of Network IDS in Network Perimeter Defense.
Characteristics of Internet Background Radiation ACM Internet Measurement Conference (IMC), 2004 Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford,
Inferring Internet Denial-of-Service Activity Authors: David Moore, Geoffrey M. Voelker and Stefan Savage; University of California, San Diego Publish:
Unit 2 Personal Cyber Security and Social Engineering Part 2.
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Botnets A collection of compromised machines
Internet Quarantine: Requirements for Containing Self-Propagating Code
A lustrum of malware network communication: Evolution & insights
Characteristics of Internet Background Radiation
Firewalls.
Botnets A collection of compromised machines
DDoS Attack Detection under SDN Context
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Lecture 3: Secure Network Architecture
THE INTERNET MOTION SENSOR: A Distributed Blackhole Monitoring System
Presentation transcript:

- 1 - Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic Michael Bailey, Evan Cooke, David Watson and Farnam Jahanian University of Michigan Karl Rosaen, Niels Provos Google, Inc Internet Measurement Conference 2005 Thursday, October 20th, 2005

- 2 - Roadmap Motivation for hybrid sensors and filtering Explore the bounds of source IP filtering at individual sensors Show how source IP filtering across sensors is limited Discuss and evaluate a new scheme for filtering across sensors

- 3 - Fundamental Shift Not about big splash, about big cash Increasing robust and complex tools enabling increasingly sophisticated attacks without a corresponding increase in attacker knowledge. As a result there is shift from a need to understand how the system was compromised to a need to understand how the compromised system is used. How do you observe behavior AND continue to catch new exploits and characterize global threat dynamics?

- 4 - Hybrid Frameworks In order to address needs of new threats we look to combine two existing techniques: A Blackhole/Dark IP/Network Telescope sensor monitors an unused globally advertised address block that contains no active hosts. Traffic is the result of DDoS backscatter, worm propagation, misconfiguration, or other scanning (Breadth) Honeyfarms are collections of high-interaction honeypots often running actual operating systems and applications along with (complex) forensic monitoring software (Depth) Fast and comprehensive data about the emergence of the threat with detailed forensics on the way threat behaves

- 5 - Hybrid Architecture Some hybrid projects: Internet Motion Sensor (IMS) Potemkin iSink Collapsar ications/collapsar.pdf

- 6 - The key problem The biggest problem for hybrids today is scalability A single wide address darknet (/8) can see Tens or Hundreds of Gigabytes of packet data per day One approach is to scale the honeypots to the offered connection load Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm. SOSP 2005 Volume of forensic data E.g. a single honeypot instrumented to capture all sources of non- determinism (ala ReVirt/Backtracker) can capture over a GB per day per IP In this paper we examine filtering of darknet traffic in order to reduce the offered connection load and volume of data to be analyzed

- 7 - Filtering at an individual DarkNet Begin with existing work on filtering at individual darknets: Characteristics of Internet Background Radiation. IMC 2004 Proposed a variety of Source IP-* methods and showed that Source-Destination filtering saw from 96%-98% reductions in packets Great! So let’s apply these methods to 14 IMS sensors in August 2004 Explore the methods that were proposed and validate the results Determine why they are so effective

- 8 - Internet Motion Sensor (IMS) Tier 1 ISPs, Large Enterprise, Broadband, Academic, National ISPs, Regional ISPs Initial /8 deployment in Currently 60 address blocks at 18 networks on 3 continents /26 x 5 /25 x 1 /24 x 18 /23 x 2 /22 x 4 /21 x 2 /20 x 8 /19 x 1 /18 x 6 /17 x 3 /16 x 9 /8 x 1

- 9 - % reduction in packets via source-* filtering MEANInter- Sensor STDDEV MIN Source- Connection 95%2.7%53.8% Source- (dst) Port 93%3.1%46.7% Source- Payload 91%3.9%49.1% Supported previous results, with differences that can be plausibly explained by monitor block size and monitoring time effects Two additional observations relevant to a run time system The effectiveness of filtering is different between sensors The effectiveness of filtering is different over time Why is the filtering at individual sensors so good?

Role of a source IP in traffic at a sensor 90% of the packets are from 10% of the unique source IP addresses

Role of a port in traffic seen at a sensor Over 90% of the packets target.5% of the TCP/UDP destination ports

How many ports did they contact? 55% contact a single port, 99% did less than 10 A small number did a very large number of ports Filtering at individual sensors works because a relatively small number of sources send a lot of packets to a small number of ports.

How many sources are there? Cumulative number of unique sources at 41 sensors for 21 days from March 19th - April 8th 2005 Small sensors (/24) see several thousand unique sources per day and large sensors (/8) see several million We need additional filtering!

Sources are not prevalent across locations Examine the AVERAGE overlap in unique sources per day between sensors over a month period. While some blocks do see large overlap (d/8 and f/17 saw 82%) most blocks have very little Reduction of source based methods across sensors is very small. Each new sensor brings with it its own unique sources

Intersection in Top Ten Ports Examine the top ten ports over a day, week and month time frame. Determine how many of those ports appear at each of the sensors. Only a few ports are visible at all sensors (e.g. TCP/1433, TCP/445, TCP/135, TCP/139). Many are only visible at one.

Why are we seeing different things? Impact on monitored block size, scanning rate and observation time on the probability of identifying a random scanning event Network telescopes. Technical Report CS , UC San Diego, July Lifetime of the events Targeted behaviors The zombie roundup: Understanding, detecting, and disrupting botnets. SRUTI 2005 Workshop Maleware Internals Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. IMC 2005

So now what? Source based methods are effective at filtering because sources repeat themselves However: there are lots of unique sources at each sensor neither the sources nor the ports overlap between sensors We need to devise a scheme for additional filtering between sensors: that addresses visibility into remote scanning events that accounts for target attack behavior

Filtering Algorithm At each sensor compare the average number of unique source IP addresses contacting a destination port over the most recent window to the history window Calculate the number of sensors for which this ratio is greater than an EVENT_THRESHOLD. If the number of sensors are greater than the COVERAGE_THRESHOLD, create and event and forward traffic

Filtering Insights Examine only traffic that demonstrates a significant increase in number of unique sources contacting a specific port, rather than examining individual IPS Similar to the observation in the context of scanning patterns from: An effective architecture and algorithm for detecting worms with various scan techniques. NDSS 2004 Eliminate targeted behavior by only evaluating if a significant number of sensors see this behavior

Evaluation Deployment on IMS sensors during first quarter of 2005 Evaluation showed 13 unique events in 5 groups Validation against security lists and operator logs (e.g. NANOG, ISC) showed the scheme to capture all the human detected events. DescriptionPortDateMultipleCoverage WINStcp4201/13/05 17: tcp4201/14/05 05: tcp4201/14/05 17: Squid andtcp312802/05/05 11: Alt-HTTPtcp312802/05/05 23: SYN Scantcp808002/05/05 10: tcp808002/05/05 22: MYSQLtcp330601/26/05 09: tcp330601/26/05 21: tcp330601/27/05 09: Syn Scantcp500001/08/05 14: Veritastcp610102/23/05 21: tcp610102/24/05 09:

Effect of coverage on events Coverage represents the percentage of sensors that saw an increase in unique sources Only a small handful of events are prevalent across all sensors.

Recent TCP/42 Activity November 24, 2004 vulnerability announced on remotely exploitable overflow in the WINS server component of Microsoft Windows January 2005, news of significant amounts of increased activity on tcp/42 was noted in multiple reports.

TCP/42 Payloads Captured live payloads that match byte-for-byte with template exploit code Same exploit is being reused to inject many different payloads (same exploit with very different shellcode) Evidence suggest attacks are from manual tools not automated worm. However vulnerability is “wormable”

Wrap-up Source based methods are effective in filtering at individual sensors because a relatively small number of sources contact the same ports repeatedly. Source IP addresses, and surprisingly destination ports, do not consistently overlap across sensors We proposed a filtering mechanism that addresses the limited visibility of blocks into remote events and targeted attack behavior We evaluated this mechanism by deploying it across IMS sensors and comparing over 3 months period with human events of interest in operator logs.

Acknowledgements For more information on the Internet Motion Sensor: Thanks to the ISPs, academic institutions, and organizations for hosting the IMS! Thanks to Danny McPherson, Jose Nazario, Robert Stone, Rob Malan, and Dug Song at Arbor Networks and Larry Blunk, Bert Rossi, and Manish Karir at Merit Network. And of course our sponsor: