1 Evaluation Methods for Internet Security Technology (EMIST) NSF Cyber Trust PI Meeting and DETER workshop Newport Beach, CA, Sept. 2005.

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
This work was supported by the TRUST Center (NSF award number CCF ) 1. Setting up experiment on DETER testbed a)Created twelve pc backbone nodes.
Performing BGP Experiments on a Semi-Realistic Internet Testbed Environment The 2nd International Workshop on Security in Distributed Computing Systems,
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.
Design Deployment and Use of the DETER Testbed Terry Benzel, Robert Braden, Dongho Kim, Clifford Informatino Sciences Institute
0 Penn State, George Kesidis – Professor, CSE and EE Education –1992 Ph.D. in EECS from U.C. Berkeley Background – : professor in E&CE.
FLAME: A Flow-level Anomaly Modeling Engine
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
10/17/2002RAID 2002, Zurich1 ELISHA: A Visual-Based Anomaly Detection System Soon-Tee Teoh, Kwan-Liu Ma S. Felix Wu University of California, Davis Dan.
02/06/2006ecs236 winter Intrusion Detection ecs236 Winter 2006: Intrusion Detection #4: Anomaly Detection for Internet Routing Dr. S. Felix Wu Computer.
Applied Cryptography for Network Security
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
© 2013 Association for Computing Machinery Honeywell Introduction to the ACM Digital Library January 16, 2013 Honeywell Introduction to the ACM Digital.
Lecture 11 Intrusion Detection (cont)
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
1 Sonia Fahmy, Roman Chertov, Ness B. Shroff, and a group of M.S. students Center for Education and Research in Information Assurance and Security (CERIAS)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
1 PSU worm modeling and emulation project George Kesidis CSE and EE Depts CSE Center for Networking and Security Industry Day, Wed.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Toward Self-directed Intrusion Detection Paul Barford Assistant Professor Computer Science University of Wisconsin June, 2005.
VeriFlow: Verifying Network-Wide Invariants in Real Time
Honeypot and Intrusion Detection System
Wireless Networks Breakout Session Summary September 21, 2012.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
An Analysis of Location-Hiding Using Overlay Networks Ju Wang and Andrew A. Chien Department of Computer Science and Engineering, University of California.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
GridStat on GENI: Simulating a Smart Power Grid Infrastructure over GENI Divya Giri, Ruma Paul, Haiqin Liu, Victor Valgenti, Carl Hauser and Min Sik Kim.
UCDavis Computer Security Lab Collaborative End-host Worm Defense Experiment Senthil Cheetanceri, Denys Ma, Allen Ting, Jeff Rowe, Karl Levitt UC Davis.
ESVT: A Toolkit Facilitating Use of DETER Lunquan Li, Jiwu Jing, Peng Liu, TJ, Jisheng, George Kesidis, David Miller Penn State University September 28,
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Detecting Selective Dropping Attacks in BGP Mooi Chuah Kun Huang November 2006.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
02/01/2006USC/ISI1 Updates on Routing Experiments Cyber DEfense Technology Experimental Research (DETER) Network Evaluation Methods for Internet Security.
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing Ying Zhang Z. Morley Mao Jia Wang Presented in NDSS07 Prepared by : Hale Ismet.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Computer Simulation of Networks ECE/CSC 777: Telecommunications Network Design Fall, 2013, Rudra Dutta.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Goals The DNP3 protocol is widely used in electrical power systems as a means of communicating observed sensor state information back to a control center.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Integrated Simulation and Emulation Platform for Cyber-Physical System Security Experimentation Wei Yan, Yuan Xue, Xiaowei Li, Jiannian Weng, Timothy Busch,
INTERNET SIMULATOR Jelena Mirkovic USC Information Sciences Institute
MicroGrid Update & A Synthetic Grid Resource Generator Xin Liu, Yang-suk Kee, Andrew Chien Department of Computer Science and Engineering Center for Networked.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Computer Simulation of Networks
Routing Experiments Chen-Nee Chuah, Sonia Fahmy, Denys Ma,
Presentation transcript:

1 Evaluation Methods for Internet Security Technology (EMIST) NSF Cyber Trust PI Meeting and DETER workshop Newport Beach, CA, Sept. 2005

2 EMIST TEAM PSU: G. Kesidis**(PI), P. Liu†, P. McDaniel, D. Miller UCD: K. Levitt (PI), F. Wu*, J. Rowe, C.-N. Chua ICSI: V. Paxson* (PI), N. Weaver* Purdue: S. Fahmy (PI), N. Shroff, E. Spafford SPARTA: D. Sterne (PI), S. Schwab*, R. Ostrenga, R. Thomas, S. Murphy, R. Mundy SRI: P. Porras, L. Breismeister **overall PI, *expt lead/co-lead, †EMIST ESVT lead PMs: Joe Evans (NSF) and Douglas Maughan (DHS) Sister project: DETER cyber security testbed

3 Outline Team. Goals. Publications. Tools released. Talks for DETER workshop Wed 09/28/05. Y3 activities.

4 EMIST goals Develop scientifically rigorous testing frameworks and methodologies for defenses against attacks on network infrastructure: scale-down with fidelity. Develop experiments to yield deeper understanding of how previous attacks have, and future attacks will, affect the Internet and its users. Develop prototypical experiments (benchmarks) and associated databases of: topologies and topology generators attack and background traffic traces and generators defenses special-purpose devices (meters, virtual nodes, etc.) metrics for scale-down fidelity, performance, overhead, etc.

5 EMIST goals (cont) Consult in the build-out of the DETER testbed and demonstrate its usefulness to vendors, researchers and customers of defense technology. Allow for open, convenient, rigorous, unbiased and secure testing of cyber defenses on DETER in order to expedite their commercial deployment. Quickly and publicly disseminate our results.

EMIST publications N. Weaver, I. Hamadeh, G. Kesidis and V. Paxson, “Preliminary results using scale-down to explore worm dynamics”, in Proc. ACM WORM, Washington, DC, Oct. 29, P. Porras, L. Biesemeister, K. Levitt, J. Rowe, K. Skinner, A. Ting, “A hybrid quarantine defense”, in Proc. ACM WORM, Washington, DC, Oct. 29, S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma and S. F. Wu, “Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP”, in Proc. ACM VizSEC/CMSEC-04, Washington, DC, Oct. 29, 2004.

EMIST publications A. Kumar, N. Weaver and V. Paxson, "Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event", in Proc. ACM IMC R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, B. Tierney, "A First Look at Modern Enterprise Traffic ", in Proc. ACM IMC S. Schwab, B. Wilson, R. Thomas, “Methodologies and Metrics for the Testing and Analysis of Distributed Denial of Service Attacks and Defenses,” MILCOM, Atlantic City, NJ, Oct L. Li, S. Jiwasurat, P. Liu, G. Kesidis, Emulation of Single Packet UDP Scanning Worms in Large Enterprises, In Proc. 19 International Teletraffic Congress (ITC-19), Beijing, Aug Q. Gu, P. Liu, C.-H. Chu, Hacking Techniques in Wired Networks, In The Handbook of Information Security, Hossein Bidgoli et al. (eds.), John Wiley & Sons. S. Sellke, N. B. Shroff, and S. Bagchi, "Modeling and Automated Containment of Worms", In Proceedings of the International Conference in Dependable Systems and Networks (DSN), June R. Chertov, S. Fahmy, and N. B. Shroff, "Emulation versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks", Purdue University Technical Report, September L. Briesemeister and P. Porras. Microscopic simulation of a group defense strategy. In Proceedings of Workshop on Principles of Advanced and Distributed Simulation (PADS), pages , June C. H. Tseng, T. Song, P. Balasubramanyam, C. Ko, and K. Levitt, "A Specification-based Intrusion Detection Model for OLSR“, in Proc. RAID, Sept

EMIST publications K. Zhang, S. Teoh, S. Tseng, R. Limprasittipom, C. Chuah, K. Ma, and S.F. Wu. PERFORMING BGP EXPERIMENTS ON A SEMI-RELISTIC INTERNET TESTBED ENVIRONMENT. in the 2nd International Workshop on Security in Distributed Systems (SDCS), conjunction with ICDCS, W. Huang, J. Cong, C. Wu, F. Zhao, and S.F. Wu. DESIGN, IMPLEMENTATION, AND EVALUATION OF FRITRACE. in 20th IFIP International Information Security Conference, May, 2005, Chiba, Japan, Kluwer Academic Publishers. G. Hong, F. Wong, S.F. Wu, B. Lilja, T.Y. Jansson, H. Johnson, and A. Nilsson. TCPTRANSFORM: PROPERTY-ORIENTED TCP TRAFFIC TRANSFORMATION. in GI/IEEE SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July, 2005, LNCS, Springer. J. Crandall, S.F. Wu, and F. Chong. EXPERIENCES USING MINOS AS A TOOL FOR CAPTURING AND ANALYZING NOVEL WORMS FOR UNKNOWN VULNERABILITIES. in GI/IEEE SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), Vienna, Austria, July, 2005, LNCS, Springer. G.H. Hong and S.F. Wu. ON INTERACTIVE INTERNET TRAFFIC REPLAY. in the 8th Symposium on Recent Advanced Intrusion Detection (RAID), Seattle, September, 2005, LNCS, Springer. J. Crandall, Z. Su, S.F. Wu, and F. Chong. ON DERIVING UNKNOWN VULNERABILITIES FROM ZERO-DAY POLYMORPHIC & METAMORPHIC WORM EXPLOITS. To appear in 12th ACM Conference on Computer & Communication Security (CCS’2005), Alexandria, November 7-11, 2005.

9 EMIST tools EMIST Experiment Specification and Visualization Tool (ESVT) 2.0 released in May ’05 with: more advanced traffic viz features including link data and SQL interface, and ability to import output from a scale-free topology generator (with associated plotting tool). Offline netflow audit tool released in May ’05. Online Scriptable Event System (SES) and, data analysis measurement tools. XML worm configuration and worm modeling. TCPOpera traffic generator and ELISHA viz tool. BGP topology capture tool. Experimental technical reports.

10 ICSI worm demo: source models for testing net-based detectors We are developing layer 4 (TCP/UDP) “source models”. Process of representing normal systems: Derived from traces of a medium-scale enterprise (10K hosts) Store traffic information in database Classify host types & application sessions based on measurements Create background traffic by sampling hosts and sessions Near-term goal is to mimic the Layer 4 behavior of normal hosts Testing against Approximate TRW worm containment Overlay worm traffic by adding worm-functionality to models Longer term goals: investigate *abstract* source models apply to other containment technology

11 UC Davis / SRI worm demo: collaborative host-based defense Hosts that are not protected by network defenses can protect themselves from worm attack by collaborating with collections of other hosts to exchange alerts. A preliminary end-host collaborative worm defense exchanging failed connection reports will be demonstrated: with respect to its ability to protect against worm spread in the presence of realistic background traffic. A 2000 virtual node experiment that uses our two tools: the NTGC traffic generator and the UCD Worm Emulator

12 SPARTA DDoS demo FloodWatch defense deployed on both PCs and CloudShield appliances, as well as Juniper routers. A range of data collection and EVST visualization tools will be explored. The theme is examination of the experimental methodology, in particular: the degree to which accurate detection and response characteristics can be calculated versus the limited fidelity of generated background traffic.

13 Purdue: Method and Tools for High- Fidelity Emulation of DoS Attacks Simulation versus emulation of DoS attack experiments are compared. As a case study, we considered low-rate TCP-targeted DoS attacks. Specific measurement-fidelity issues of the DETER testbed were resolved. We found that software routers such as Click provide a flexible experimental platform, but require detailed understanding of the underlying network device drivers to ensure they are correctly used. We also found that an analytical model and ns-2 simulations closely match with typical values of attack pulse lengths and router buffer sizes.

14 UCD: Requirements and Tools for Routing Experiments Tools: Requirements and Design (with SPARTA) ER (Entity Relationship) Information Visualization Experiments: Interaction of BGP/OSPF/P2P Cross-layer routing dynamics/interactions Per-Update OASC Experiment Analysis of address ownership DDoS/Routing Interaction (with Purdue) DDoS impacts on BGP

15 PSU BGP demo: Large-Scale eBGP Simulator (LSEB) Our goal is large Internet-scale (global) routing attack modeling and measurement. Methodology: intial AS topologies drawn from PREDICT Routeviews 20k java threads running across DETER hosts simulate all BGP message level interactions maintain route tables for all reachable prefixes Future work: realistic AS forwarding delay models modeling iBGP scale-down of experiments with more complex/realistic BGP speakers defense deployment and evaluation on DETER

16 PSU ESVT demo ESVT rendering of UDP/TCP worm emulation in an enterprise: We have emulated SQL slammer on a 1000 node enterprise network and compared the realism achieved by VM (jail), real LANs, and virtual nodes. We are currently emulating TCP Blaster worm considering issues including the fidelity of our Blaster modeling technique, and the impact of background traffic. Note that no defense is involved, just a local block of dark addresses used for detection.

17 Y3 Activities Release of reusable code developed for on-going attack/defense experiments, in particular: ESVT 3.0+ with integrated trace audit tool, spectral analysis, etc. Synthesize background traffic analogous to trace data in DETER experiments on same topology. BGP ESVT. Continued outreach, in particular BGP ESVT components to the ops community. Collaborate with DETER on, e.g., experimental workbench (SEW), RIB output collection.

18 Y3 Activities (cont) For each attack experiment, a summary document that described in particular: Experimental methodologies. Metrics for experimental realism in defense evaluation. Benchmark attack experiments for specific classes of defenses. Experimental Tech Reports: Experiment archiving and repeatability issues. Critical assessments of all items in deterlab’s experimenters’ tools web pages. Summer 2006 attack/defense demonstration experiments.