1 Towards trapping wily intruders in the large Glenn Mansfield, Kohei Ohta, Yohsuke Takei, Nei Kato, Yoshiaki Nemoto Cyber Solutions Inc., Tohoku University RAID’99, September 7-9, 1999
Cyber Solutions RAID’99 2 outline X background –network-based illegal access detection X characteristics of network intrusions –signatures of intrusions X detection of intrusion from traffic-flow –traffic-flow signature –correlation of signatures –experimental evaluation X map-based distributed intrusion tracking X conclusion
Cyber Solutions RAID’99 3 background X Network-based illegal access detection –rapid increase in network bandwidth –devious techniques (e.g. spoofing) used by the hackers.
Cyber Solutions RAID’99 4 Suspicious Behavior ? ? ? Repeated Failures Knocking at several doors Signatures
Cyber Solutions RAID’99 5 characteristics of network intrusions (I) X Signals from TCP-Reset Characteristics
Cyber Solutions RAID’99 6 characteristics of network intrusions (II) X Number of ICMP-UR packets (port SNMP(161))
Cyber Solutions RAID’99 7 characteristics of network intrusions (III) X ICMP destination port unreachable messages for SNMP port (under scan)
Cyber Solutions RAID’99 8 characteristics of network intrusions (IV) X Distribution of inter-message interval
Cyber Solutions RAID’99 9 detection of intrusion from traffic-flow signature X Packet contents may be encrypted X Packet contents may be manipulated X The traffic volume may be very large
Cyber Solutions RAID’99 10 Traffic-flow signature(1)
Cyber Solutions RAID’99 11 Traffic-flow signature(2)
Cyber Solutions RAID’99 12 correlating traffic-flow signature Correlation of traffic patterns: correlation coefficient r ( A, B are two flows)
Cyber Solutions RAID’99 13 experimental evaluation (configuration) X 100Mbps FDDI backbone network X ICMP echo request/reply messages
Cyber Solutions RAID’99 14 relay of ICMP echo reply X A burst of ICMP echo reply triggered by broadcast ping, Smurf
Cyber Solutions RAID’99 15 relay of ICMP echo request X A cluster of ICMP echo request triggering the bursty ICMP reply
Cyber Solutions RAID’ ChaIn: Charting the Internet IPA:Information technology Promotion Agency, Japan (
Cyber Solutions RAID’99 17 map-based intrusion tracking
Cyber Solutions RAID’99 18 inter-N/W communication I X Traffic monitoring at N/W border –watch all the traffic –process only suspicious packets. X Use network configuration information to trap and/or track-down the intruder. X Communication using SNMP(v3) notifications.
Cyber Solutions RAID’99 19 inter-N/W communication II detection system SNMP INFORM PDU ftp://………….. snmp://……….. ftp://………….. snmp://………..
Cyber Solutions RAID’ Network Security Using Maps YesNo Suspicious !! Yes X AS 1 AS 2 Saw this? X X Suspicious !! No Saw this? AS 0 AS 1 AS 2 AS 3 IntruderMonitor
Cyber Solutions RAID’99 21 conclusion X Profiling network traffic to distinguish normal usage from abnormal or ill-intentioned usage. X Monitoring suspicious signals in a distributed information collection framework X A new technique based on packet flow monitoring to counter the threats posed by spoofing. X Use of network configuration information to track down intruders. X Use of SNMP based messaging system.