Network Measurement and Security APAN Bangkok 2005

Slides:



Advertisements
Similar presentations
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Measurement in Networks & SDN Applications. Interesting Questions Who is sending a lot to a subnet? – Heavy Hitters Is someone doing a port Scan? Is someone.
The Latest In Denial Of Service Attacks: “Smurfing” Description and Information to Minimize Effects Craig A. Huegen Cisco Systems, Inc. NANOG 11 Interprovider.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
IPv6 Background Radiation Geoff Huston APNIC R&D.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network-Based Denial of Service Attacks Trends, Descriptions, and How to Protect Your Network Craig A. Huegen Cisco Systems, Inc. NANOG 12 Interprovider.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Computer Security and Penetration Testing
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Lecture 15 Denial of Service Attacks
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
TUNDRA The Ultimate Netflow Data Realtime Analysis Jeffrey Papen Yahoo! Inc.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 4. Active Monitoring Techniques.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
workshop eugene, oregon What is network management? System & Service monitoring  Reachability, availability Resource measurement/monitoring.
Security at NCAR David Mitchell February 20th, 2007.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
© 2004 AARNet Pty Ltd Measurement in aarnet3 4 July 2004.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Distributed Denial of Service Attacks
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
An Internet-Wide View of Internet-Wide Scanning.  Scanning  IPv4  Horizontal scanning – individual ports  Network telescope - darknet What is internet.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Security Management Process 1. six-stage security operations model 2 In large networks, the potential for attacks exists at multiple points. It is suggested.
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
1 Distributed Denial of Service Attacks. Potential Damage of DDoS Attacks l The Problem: Massive distributed DoS attacks have the potential to severely.
DoS/DDoS attack and defense
1 Virtual Dark IP for Internet Threat Detection Akihiro Shimoda & Shigeki Goto Waseda University
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Denial-of-Service Attacks
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
DDoS Attacks on Financial Institutions Presentation
Distributed Denial of Service Attacks
Error and Control Messages in the Internet Protocol
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls Purpose of a Firewall Characteristic of a firewall
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks
Computer Networks Protocols
Presentation transcript:

Network Measurement and Security APAN Bangkok 2005

AARNET’s International Connections

Measurement SNMP interface counters measuring bits per second, packets per second, errors and discards on all interfaces SNMP router CPU utilisation, BGP peers etc. Active measurements. Performance metrics measuring trip times and throughput testing iperf. NetFlow measurements down to individual IP flow based metrics (approx 60Gb of data a day).

NetFlow Measurements Netflow measurement migrated to customer edge equipment Every flow (IP Address/Port-> IP Address Port) combination logged. Information on source destination ports/interfaces/ASs/ToS settings kept. Hooks into MRTG/RRD for graphing/visualisation. Very useful in logging network activity.

You can monitor all the data you like but… Visibility of data is the key issue –Alarms generated by processes. –Images generated of network activity. From there the ability to drill down to get relevant data.

Worm/DOS/DDOS Impacts A worm or DOS/DDOS attack can initially manifest itself in many ways: Congestion due to high byte throughput of attack. High Packet Rate on an interface/s. High Packet Loss for normal network traffic. High Router CPU utilisation. BGP/OSPF routing flaps. NetFlow information accumulates rapidly.

Network Impact CodeRed v2 July Bits per second Packets per second Flows per second

Network Impact No backbone packet loss No huge impact on backbone latency Identified excessive flows due to impact on backbone TCP Port 80 scans – generally seen within NetFlow data as three packets totalling 144 bytes from particular hosts (infected machines) outbound. Not fully accurate but very useful indicator.

Slammer/Sapphire Worm 24 July 2002 – Microsoft release notice and patch for Buffer Overruns in SQL Server January 2003 – the Saturday of a long weekend in Australia. 13:40 - First noticed by a Nagios message that a link was checked down by ICMP ping failure. Checking link utilisation showed a huge amount of traffic congesting link. NetFlow showed huge flow rate – mail was sent by our daemon process to inform us of this. Quick look at Netflow logs showed that there appeared to be outbound scanning on UDP port 1434.

Slammer Impact Bits per second Packets per second Flows per second

Slammer Impact High backbone packet loss Increased latency

Slammer Response The effect of Slammer was to congest the network and degrade performance. An infected 100Mb connected host could produce over 30,000 scans/second – bandwidth rather than network latency limited. As a result blocked UDP port 1434 traffic at the edge to protect traffic. –Deny udp any gt 1023 any eq 1434 With the public holiday a number of sites did not have any staff available.

Slammer Response Infected hosts could be identified using NetFlow logs and that information was propagated to the sites. Where the sites could not respond immediately these hosts were blocked from sending Port 1434 UDP traffic. Within 3 hours most of the problem was relatively under control.

Slammer – why so much impact? Slammer/Sapphire contains a simple, fast scanner in a small worm with a total size of only 376 bytes. With the requisite headers, the payload becomes a single 404-byte UDP packet. Slammer used UDP and so a single packet could infect a host – no need to wait for a three way TCP handshake like CodeRed. Two orders of magnitude faster than CodeRed.

Slammer vs CodeRed Propagation Slammer CodeRedv2 Graphs courtesy of Caida

DDOS Attacks Often the result of IRC botnets. TFN, Trinoo, Stacheldraht and other root kits. Often short lived – but don’t count on it! Hard to protect against. Important to keep a good track of unusual activity on the network – being a good netizen. Isolate your compromised hosts quickly. Analyse and report to upstreams

DOS/DDOS Attacks TCP SYN attacks. UDP flood. ICMP echo request/reply flood. Amplification attacks. Source IP address spoofing.

Normal Patterns… A lot of packets are junk. –90% of packets destined to AARNet are dropped at the upstream edge! –60% of this is NTP requests to non-operational NTP servers. –30% of packets are common scans and probes. A lot of packets are threatening. This is “normal” behaviour. So, how to distinguish an abnormal pattern?

NTP Services CSIRO offers NTP services to Australian users. Three servers in three states. CSIRO pays differential traffic charges between international and domestic sources. ADSL Router vendor hard coded IP’s of servers into their product. Router is distributed particularly to Japanese/Korean customers where ADSL uptake is high.

Effect Normally NTP hosts sync every 2 hours ACL is put on international connections against NTP traffic. No back off algorithm on router retries every 30 seconds against all 3 servers!

Normal? Darknets provide usefule analysis on the background radiation see:

The normal day… A quiet day in the University break… BPS –SNMP PPS –SNMP FPS –Netflow

Another day…

Another Day – some explanation Generally SNMP interface statistics are collected at five minute intervals. NetFlow has a default cache timeout of 30 minutes. Using defaults, NetFlow accentuates particular lengthy single transactions (could be single machine) as spikes. Netflow flow measurements is particularly susceptible to identifying scan and strobe attacks covering many hosts/ports.

Inbound DDOS Total flows – metric is file size of collected UDP Netflow Data Individual flows – metric is processed transmitted/received flows per institution Now know where to look!

Particular DOS Attacks Universities Admission Centre on TEE results day. TCP SYN attack. Filters placed on international links at 7:45 – fine because services offered were primarily domestic.

DOS/SYN Attack Bytes Packets Flows

Unusual activity Unsolicited ICMP echo replies –Can indicate machines are using a control channel after being infected by a root kit. –Stacheldraht/TFN. –Can easily check for this type of infection with NetFlow records. –Attacks from these machines will generally spoof addresses within their subnet so compromised machine(s) are hard to find during an outbound attack.

Some conclusions… Try and ensure early patching of machines! –Users are still deploying operating systems and network applications in an insecure fashion. Effective and visible measurement and monitoring infrastructure needs to be in place to reduce the effect of worm or DOS/DDOS attacks. As far as possible automated alarms and warnings need to be in place to reduce the time to response Actions must be determined by the threat/vulnerabilities. Beware of knee jerk reactions.

Some conclusions… The Slammer worm was very simple and effective, spreading virulently and covering the globe in approximately 10 minutes. Expect more of this type of worm in the future – possibly with destructive payloads. Expect that the base of compromised machines will be wider. With IPv6 rollout, while scanning may be unprofitable to compromise machines it will hugely effect Netflow collection – there are some possible hosts per /64 Only hosts in IPv4

Responses… Analyse NetFlow data. Port monitoring and capture when required – tcpdump and ethereal. Egress Filtering at the edges. Bogon Filtering. Back Scatter traffic monitoring. Darknets to measure scanning. ACLs. BGP community tagged black holing.

Questions? Talk to your upstreams and downstreams Monitor and watch for unusual activity Be prepared! It’s your Network – protect it!

Some useful URLs… ftp://ftp-eng.cisco.com/cons/isp/security/ISP-Security- Bootcamp/