Worcester Polytechnic Institute 1 Web Tap: Detecting Covert Web Traffic Kevin Borders, Atul Prakash University of Michigan Department of Electrical Engineering.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
DIYTP Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)
Computer Networks IGCSE ICT Section 4.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Chapter 6: Hostile Code Guide to Computer Network Security.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Norman SecureSurf Protect your users when surfing the Internet.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Hacker Zombie Computer Reflectors Target.
Chapter 6: Packet Filtering
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Protocol(TCP/IP, HTTP) 송준화 조경민 2001/03/13. Network Computing Lab.2 Layering of TCP/IP-based protocols.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Protecting Students on the School Computer Network Enfield High School.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
The Intranet.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection System (IDS) Basics LTJG Lemuel S. Lawrence Presentation for IS Sept 2004.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Module 10: Windows Firewall and Caching Fundamentals.
INTRODUCTION Firewall is a concept which blocks unwanted traffic and passes desirable traffic to and from both sides of the network.
Computer Security By Duncan Hall.
WebWatcher A Lightweight Tool for Analyzing Web Server Logs Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
TMG Client Protection 6NPS – Session 7.
The Intranet.
NET 536 Network Security Firewalls and VPN
Backdoor Attacks.
Network Security Marshall Leitem 11/30/04
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Fire-wall.
Lecture 3: Secure Network Architecture
Firewalls Chapter 8.
FIREWALL.
Presentation transcript:

Worcester Polytechnic Institute 1 Web Tap: Detecting Covert Web Traffic Kevin Borders, Atul Prakash University of Michigan Department of Electrical Engineering and Computer Science, 2004 Presented by Nate Salemme

Worcester Polytechnic Institute 2 Disclaimer Content taken from Proceedings of the 11th ACM conference on Computer and communications security –Presented by Kevin Borders & Atul Prakash Images and graphs also borrowed from – Presentation template borrowed from Mike Putnam. Thanks Mike.

Worcester Polytechnic Institute 3 About the Authors Atul Prakash -Professor in the Department of EECS at the University of Michigan. -He is also currently serving as the Director of the Software Systems Laboratory. Kevin Borders -Graduate student at the University of Michigan -Involved in Eta Kappa Nu

Worcester Polytechnic Institute 4 Outline Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts

Worcester Polytechnic Institute 5 Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Hackers life use to be easy –Direct connection to Internet –No protection –Backdoors and Trojans easily spawned –Programs like AOL made this easy Security became BIG concern –Firewalls –Proxy Servers –Mail Servers

Worcester Polytechnic Institute 6 Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts The Firewall

Worcester Polytechnic Institute 7 Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Hackers get creative –Firewalls leave open port 80 (HTTP) –Use outgoing HTTP as attack vehicle Examples –Spyware, Adware –User information can be hidden within legitimate outgoing HTTP traffic –System resources severely hindered through some malicious spyware

Worcester Polytechnic Institute 8 Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap –Definition: “A network-level anomaly detection system that takes advantage of legitimate web request patterns to detect convert communication, backdoors, and spyware activity that is tunneled through outbound HTTP connections” – Web Tap Guys –Deployed at an organization’s proxy server or router –Acts as an extension to the proxy/firewall where all outgoing traffic is passed through –A ‘training period’ is used to calibrate Web Tap

Worcester Polytechnic Institute 9 Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts HTTP Tunnels Backdoors Programs Spyware

Worcester Polytechnic Institute 10 Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts HTTP Tunnels –Allow non-HTTP services to be access through an outgoing HTTP session –Wsh(Microsoft Script Host) allows file transfer and remote shell access over HTTP –Firepass creates a tunnel between a client process and a remote service

Worcester Polytechnic Institute 11 Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Backdoor Programs –Usually spawned by a user opening a Trojan from attachment or Internet –Trojan runs on computer as a client and makes ‘calls’ to a server hosting a certain script –These calls are hidden within outgoing HTTP HTTP headers or POST data

Worcester Polytechnic Institute 12 Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Spyware –Installed by piggybacking on legitimate software (WeatherBug, Kazaa) –Uses the same methods as described with Backdoor

Worcester Polytechnic Institute 13 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap was written in Python –Easy to code –Type Safe –Platform Independent Web Tap reside in a module where all outgoing HTTP traffic is funneled through this module and either analyzed real-time or logged and analyzed offline Web Tap calibrated based on 30 users over 1 week training period

Worcester Polytechnic Institute 14 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Some “hope to’s…” –Hope to keep additional state in the header of outgoing requests to verify integrity (Right now just calculates # of bytes in header) –Hope to measure other statistics Request type (image, html, CGI, etc) Request Content Inbound Bandwidth Inbound Content

Worcester Polytechnic Institute 15 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web deploys the following filters –Header Formatting –Delay Times –Individual Request Size –Outbound Bandwidth Usage –Request Regularity –Request Time of Day

Worcester Polytechnic Institute 16 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Header Formatting Filter –Parses each header –If header is indicative of a non-browser request, sound alarm –Example- IE sends out header with XP signature when all computers are running Windows 98 –Good at detecting unwanted clients AIM Express iTunes Gator

Worcester Polytechnic Institute 17 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Delay Times Filter –Measure inter-request arrival time for specific clients –Goal is to detect programs that makes requests with set timers –“Jumps” in CDF indicate areas of concern (30 seconds, 4 minutes, 5 minutes)

Worcester Polytechnic Institute 18 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Individual Request Size –Requests to most sites contain little information –Hackers needs to send out large amounts of data to transfer files off a remote host –Out of 1600 sites 11 sites > 3 KB 4 sites > 10 KB –Most effective setting is at 3 KB 99.28%

Worcester Polytechnic Institute 19 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Outbound Bandwidth Usage –Outbound bandwidth expected to be LOW for normal web browsing –Outbound bandwidth usage will increase when hackers use HTTP for covert communication –Measure both aggregate and per site bandwidth; per site used –Lower bound set at 20 KB (bytes/day) per site per user –Upper bound set at 60 KB (bytes/day) per site per user Anywhere in here is good

Worcester Polytechnic Institute 20 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Regularity –Due to bandwidth constraints of previous filters, Hackers spread requests over long time period –Legitimate web traffic is bursty –Too many requests indicate website is being accessed by automated program –16% Threshold chosen for 8 hr plot

Worcester Polytechnic Institute 21 Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Time of Day –People tend to follow a set schedule of browsing times –When requests are made outside of normal browsing period, alerts can be raised –Very effective in corporate environments (set schedules)

Worcester Polytechnic Institute 22 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts The TEST –40 Days, 30 clients at the University of Michigan –1 Week Training Period –ALL FILTERS were active –428,608 requests logged –6441 unique websites

Worcester Polytechnic Institute 23 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Header Format Filter –Detected 5 out of 30 clients that had some form of Adware –Other non-desirable clients detected (AIM Express, iTunes) –NO FALSE ALARMS

Worcester Polytechnic Institute 24 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Delay Time Filter –Low false alarm rate (1 every 6 days) –Some legit sites blocks that used timers (espn.com, nytimes.com) –Recommended that System Admins create “allowable sites”

Worcester Polytechnic Institute 25 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Size Filter –High false alarm rate (34%) –Mostly ASP and shopping cart scripts –Again, create database of trusted sites

Worcester Polytechnic Institute 26 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Regularity –Using both count and variance measurements –Approximately 1 false alarm every 3 days –Found Adware such as browser search bars that other filters did not pick up

Worcester Polytechnic Institute 27 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Daily Bandwidth Filter –As threshold decreases, false positives increase –60KB reasonable for small group sizes –20 KB roughly 1 false alarm per day

Worcester Polytechnic Institute 28 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Time of Day Filter –Training period lengthened to the first TWO weeks –During training period spyware and adware programs were active! –Time of Day filter pretty much useless

Worcester Polytechnic Institute 29 System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap vs. Third Party HTTP Tunnel Programs –Wsh, Hopster, Firepass –These programs help people inside a network bypass firewall restrictions –All detected by Web Tap, sweet Web Tap vs. Backdoor program (Tunl) –Tunl written for windows (since it’s vulnerable) –With no workload, set off 3 filters –Minimal workload, set off more filters –Moderate workload, even more filters –Pointless

Worcester Polytechnic Institute 30 Vulnerabilities OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Single Request Size Filter –Large data transfers can be broken into multiple smaller transfers Delay Time Filter –Delays could be randomized to prevent detection Time of Day Filter –Schedule requests when users are active Request Regularity –Keep a running count of activity and stay below threshold –If threshold not known, then filter can be avoided by emulating the regularity of a common site Bandwidth limit filter –Keep a running count of total bytes that have been sent that day. Don’t exceed threshold

Worcester Polytechnic Institute 31 Related and Future Work OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Related work Signature Analysis [Ad-Aware, Snort, Spybot] –Signature rules used to detect attacks –Web Tap relies on anomalies rather than signature –Signature Analysis is limited since new attacks are developed. Human browsing patterns [A. Bestavros, D. Marwood, T. Kelly] –Relies on human browsing patterns –Web Tap uses some of the same browsing patterns (delay time, request size, bandwidth usage) –WebTap uses this information to determine if it’s legitiment; previous research used it for performance reasons Content-filter Proxy [MIMEsweeper, Websense] –Block certain websites through a proxy server –Hackers can still get around this by other web proxys

Worcester Polytechnic Institute 32 Related and Future Work OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Future Work Create database that contains hosts that tend to set off alarms –Reduce false positives Proxy caching –Place proxy before Web Tap –This would help isolate legitimate web request from the anomalous ones Compress large transactions –Reduce false positives for bandwidth filter –Example; 3.87 KB POST request can be compressed to 2.07 KB –Good Hackers are likely to already have compressed their requests which would prevent further compression

Worcester Polytechnic Institute 33 Conclusion OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap monitors outgoing HTTP traffic as opposed to the actual attack on a server Design filters cover wide range of Hacker tactics Only concerned with the detection process 30 users, 40 days, 1 week training period Successful at detecting spyware, adware, HTTP tunneling programs, backdoors Vulnerabilities explained Manageable number of false alarms

Worcester Polytechnic Institute 34 Thoughts OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Good paper, easy to read and well explained Interesting approach Problems –User groups will be different depending on size, characteristics, etc. Each implementation of Web Tap would need to be customized –Sites with refresh counters would trigger alerts (espn.com gamecast) Not good. –They don’t mention flash crowds –Spyware/Adware screws up Time of Day filter –Tunl –... Applicable for schools and companies. Home?