1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

IPv6 Mobility Support Henrik Petander
MIP Extensions: FMIP & HMIP
Mobile IPv6 趨勢介紹 1. Mobile IP and its Variants Mobile IPv4 (MIPv4) – MIPv4 – Low-Latency Handover for MIPv4 (FMIPv4) – Regional Registration for MIPv4.
Dynamic Tunnel Management Protocol for IPv4 Traversal of IPv6 Mobile Network Jaehoon Jeong Protocol Engineering Center, ETRI
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Inter-Subnet Mobile IP Handoffs in b Wireless LANs Albert Hasson.
1 Mobile IP Myungchul Kim Tel:
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
Authentication In Mobile Internet Protocol version 6 Liu Ping Supervisor: professor Jorma Jormakka.
NISNet Winter School Finse Internet & Web Security Case Study 2: Mobile IPv6 security Dieter Gollmann Hamburg University of Technology
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
1 Yan Chen Northwestern University Lab for Internet and Security Technology (LIST) in Northwestern.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Security Awareness: Applying Practical Security in Your World
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Towards a High-speed Router-based Anomaly/Intrusion Detection System (HRAID) Zhichun Li, Yan Gao, Yan Chen Northwestern.
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Lab for Internet and Security Technology.
1 Network Intrusion Detection and Mitigation Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Department of Computer Science Northwestern.
Mobile IP.
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
1 Towards Anomaly/Intrusion Detection and Mitigation on High-Speed Networks Yan Gao, Zhichun Li, Yan Chen Northwestern Lab for Internet and Security Technology.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
1 Network-based Intrusion Detection, Mitigation and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
1 HPNAIDM: the High-Performance Network Anomaly/Intrusion Detection and Mitigation System Yan Chen Lab for Internet & Security Technology (LIST) Department.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
1 Sideseadmed (IRT0040) loeng 5/2010 Avo
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Network-based Intrusion Detection, Prevention and Forensics System 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Mobility Support in IPv6 (MIPv6) Chun-Chuan Yang Dept. Computer Science & Info. Eng. National Chi Nan University.
Vulnerability Analysis and Intrusion Mitigation Systems for WiMAX Networks Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST)
Mobile IPv6 in 6NET: An Overview Chris Edwards, Lancaster University, UK.
Introduction to Mobile IPv6
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Mobile IPv6 for Windows XP (.NET Server) and Windows CE 4.0 Greg O’Shea, MSRC Joint with Lancaster University And Ericsson Research.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
IETF70 - Mobopts RG1 On Mobile IPv6 Optimization and Multihoming draft-ng-mobopts-multihoming-00.txt Chan-Wah Ng
Network Mobility (NEMO) Advanced Internet 2004 Fall
Monitoring, Diagnosing, and Securing the Internet 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Network-based Intrusion Detection, Prevention and Forensics System 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Northwestern Lab for Internet & Security Technology (LIST)
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Introduction Wireless devices offering IP connectivity
Network-based Intrusion Detection, Prevention and Forensics System
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Network Virtualization
End-user Based Network Measurement and Diagnosis
Northwestern Lab for Internet and Security Technology (LIST)
Presentation transcript:

1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for Internet & Security Technology (LIST)

2 The Spread of Sapphire/Slammer Worms

3 Current Intrusion Detection Systems (IDS) Mostly host-based and not scalable to high- speed networks –Slammer worm infected 75,000 machines in <10 mins –Host-based schemes inefficient and user dependent »Have to install IDS on all user machines ! Mostly simple signature-based –Cannot recognize unknown anomalies/intrusions –New viruses/worms, polymorphism

4 Current Intrusion Detection Systems (II) Cannot provide quality info for forensics or situational-aware analysis –Hard to differentiate malicious events with unintentional anomalies »Anomalies can be caused by network element faults, e.g., router misconfiguration, link failures, etc., or application (such as P2P) misconfiguration –Cannot tell the situational-aware info: attack scope/target/strategy, attacker (botnet) size, etc.

5 Network-based Intrusion Detection, Prevention, and Forensics System Online traffic recording [SIGCOMM IMC 2004, INFOCOM 2006, ToN to appear] –Reversible sketch for data streaming computation –Record millions of flows (GB traffic) in a few hundred KB –Small # of memory access per packet –Scalable to large key space size (2 32 or 2 64 ) Online sketch-based flow-level anomaly detection [IEEE ICDCS 2006] [IEEE CG&A, Security Visualization 06] –Adaptively learn the traffic pattern changes –As a first step, detect TCP SYN flooding, horizontal and vertical scans even when mixed Online stealthy spreader (botnet scan) detection [IWQoS 2007]

6 Network-based Intrusion Detection, Prevention, and Forensics System (II) Polymorphic worm signature generation & detection [IEEE Symposium on Security and Privacy 2006] [IEEE ICNP 2007 to appear] Accurate network diagnostics [ACM SIGCOMM 2006] [IEEE INFOCOM 2007] Scalable distributed intrusion alert fusion w/ DHT [SIGCOMM Workshop on Large Scale Attack Defense 2006] Large-scale botnet and P2P misconfiguration event forensics [work in progress]

7 System Deployment Attached to a router/switch as a black box Edge network detection particularly powerful Original configuration Monitor each port separately Monitor aggregated traffic from all ports Router LAN Inter net Switch LAN (a) Router LAN Inter net LAN (b) RAND system scan port Splitter Router LAN Inter net LAN (c) Splitter RAND system Switch HPNAIDM system RAND system

Yan Chen, Hai Zhou Dept. of Electrical Engineering and Computer Science Northwestern University Vulnerability Analysis for WiMAX Networks Z. Judy Fu Motorola Labs

The Current Threat Landscape and Countermeasures of WiMAX Networks WiMAX: next wireless phenomenon –Predicted multi-billion dollar industry WiMAX faces both Internet attacks and wireless network attacks –E.g., 6 new viruses, including Cabir and Skulls, with 30 variants targeting mobile devices Goal: secure WiMAX networks through intrusion prevention/detection Big security risks for WiMAX networks –No formal analysis about WiMAX security vulnerabilities

Our Approach Vulnerability analysis of various layers Focus on e specs (WiMAX standards) and mobile IP v4/6 protocols so far – Intelligent and complete checking through combo of manual analysis + auto search through formal methods –First, manual analysis provide hints and right level of abstraction for auto search –Then specify the specs and potential capabilities of attackers in a formal language TLA+ (the Temporal Logic of Actions) –Then model check for any possible attacks

Mobile IPv6 (RFC 3775) Provides mobility at IP Layer Enables IP-based communication to continue even when the host moves from one network to another Host movement is completely transparent to Layer 4 and above

Mobile IPv6 - Entities Mobile Node (MN) – Any IP host which is mobile Correspondent Node (CN) – Any IP host communicating with the MN Home Agent (HA) – A host/router in the Home network which: –Is always aware of MN’s current location –Forwards any packet destined to MN –Assists MN to optimize its route to CN

Mobile IPv6 - Process (Initially) MN is in home network and connected to CN MN moves to a foreign network : –Registers new address with HA by sending Binding Update (BU) and receiving Binding Ack (BA) –Performs Return Routability to optimize route to CN by sending HoTI, CoTI and receiving HoT, CoT –Registers with CN using BU and BA

Mobile IPv6 in Action Home Agent Correspondent Node Home Network Foreign Network Internet Mobile Node Mobile Node BU BA HoTI CoTI HoT CoT BU BA

Mobile IPv6 Vulnerability Nullifies the effect of Return Routability BA with status codes 136, 137 and 138 unprotected Man-in-the-middle attack –Sniffs BU to CN –Injects BA to MN with one of status codes above MN either retries RR or gives up route optimization and goes through HA

MIPv6 Attack In Action MNHAATCN H o T I H o T I C o T I C o T H o T H o T Start Return Routability Restart Return Routability Silently Discard Bind Ack Bind Update (Sniffed by AT along the way) Bind Ack Spoofed by AT Bind Ack Only need a wireless network sniffer and a spoofed wired machine (No MAC needs to be changed !) Bind ACK often skipped by CN

MIPv6 Vulnerability - Effects Performance degradation by forcing communication through sub-optimal routes Possible overloading of HA and Home Link DoS attack, when MN repeatedly tried to complete the return routability procedure Attack can be launched to a large number of machines in their foreign network –Small overhead for continuously sending spoofed Bind ACK to different machines

TLA Analysis and Experiments With the spec modeled in TLA, the TLC search gives two other similar attacks w/ the same vulnerability –Complete the search of vulnerabilities w/ unprotected messages Implemented and tested in our lab –Using Mobile IPv6 Implementation for Linux (MIPL) –Tunnel IPv6 through IPv4 with Generic Routing Encapsulation (GRE) by Cisco –When attack in action, MN repeatedly tried to complete the return routability procedure – DOS attack !

Extensible Authentication Protocols (EAP) PPP Ethernet Token Ring WLAN EAP-FAST EAP-TTLSEAP-SIMEAP-AKAEAP-TLS EAP Over LAN (EAPOL) Extensible Authentication Protocol (EAP) EAP Layer Data Link Layer Authentication method layer GSM CDMA PEAP

Extensible Authentication Protocols (EAP) EAP is an authenticaiton framework –Support about 40 different EAP methods Current targets –EAP-SIM for GSM cellular networks –EAP-AKA for 3G networks, such as UMTS and CDMA2000 –EAP-FAST (Flexible Authentication via Secure Tunneling) »Most Comprehensive and secure EAP method for WLAN »Will compare it w/ EAP-SIM and EAP-AKA

Insider Attack Analysis Not hard to become a subscriber Can five subscribers bring down an entire WiMAX network ? Check vulnerability after authentication Plan to analyze various layers of WiMAX networks –IEEE e: MAC layer –Mobile IP v4/6: network layer –EAP layer

802.16e SS Init Flowchart

Work Done

Future work

Outline Overview of Network Intrusion Detection, Prevention and Forensics System Case Study: Vulnerability analysis of the MIP v6 system Student recruiting

Northwestern Lab for Internet and Security Technology (LIST) About Northwestern Univ. – US News and World Report, overall ranking #14, the Engineering grad school ranking #21. – On the Michigan lake, close to Chicago downtown Sponsors for LIST: – Department of Energy (Early CAREER Award) – Air Force Office of Scientific Research (Young Investigator Award) – National Science Foundation – Microsoft Research – Motorola Inc.

27 Recruiting Ph.D. Students Bachelor in Computer Science or Computer Engineering Research experience a big plus TOEFL GRE Strongly motivated in independent research Feel free to talk to me after the talk