Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - II October 29, 2008.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Host Intrusion Prevention Systems & Beyond
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
COEN 252 Computer Forensics
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is FORENSICS? Why do we need Network Forensics?
BUSINESS B1 Information Security.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Honeypot and Intrusion Detection System
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #17 Network Forensics October 19, 2008.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
CHAPTER 9 Sniffing.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
Retina Network Security Scanner
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network and Application Forensics September 26, 2014.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Network Devices and Firewalls Lesson 14. It applies to our class…
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Lab #2 NET332 By Asma AlOsaimi.
IDS/IPS Intrusion Detection System/ Intrusion Prevention System.
Firewalls.
Security in Networking
Risk of the Internet At Home
Topic 5: Communication and the Internet
* Essential Network Security Book Slides.
Home Internet Vulnerabilities
Intrusion Prevention Systems
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - II October 29, 2008

Outline l Network Attacks l Security Measures l Network Forensics and Tools l Types of Networks l Relationship to Social Network Analysis l Special presentation - an-network-forensics-tut.pdf

Network Attacks l Denial of service Denial of service attacks cause the service or program to cease functioning or prevent others from making use of the service or program. l These may be performed at the network layer by sending carefully crafted and malicious datagrams that cause network connections to fail. l They may also be performed at the application layer, where carefully crafted application commands are given to a program that cause it to become extremely busy or stop functioning. l Preventing suspicious network traffic from reaching hosts and preventing suspicious program commands and requests are the best ways of minimizing the risk of a denial of service attack. l It is useful to know the details of the attack method, so you should educate yourself about each new attack as it gets publicized.

Network Attacks l Spoofing This type of attack causes a host or application to mimic the actions of another. l Typically the attacker pretends to be an innocent host by following IP addresses in network packets. l For example, a well-documented exploit of the BSD rlogin service can use this method to mimic a TCP connection from another host by guessing TCP sequence numbers. l To protect against this type of attack, verify the authenticity of datagrams and commands. l Prevent datagram routing with invalid source addresses. Introduce unpredictablility into connection control mechanisms, such as TCP sequence numbers and the allocation of dynamic port addresses.

Network Attacks l Eavesdropping This is the simplest type of attack. l A host is configured to "listen" to and capture data not belonging to it. Carefully written eavesdropping programs can take usernames and passwords from user login network connections. l Broadcast networks like Ethernet are especially vulnerable to this type of attack. l To protect against this type of threat, avoid use of broadcast network technologies and enforce the use of data encryption. l IP firewalling is very useful in preventing or reducing unauthorized access, network layer denial of service, and IP spoofing attacks. l It not very useful in avoiding exploitation of weaknesses in network services or programs and eavesdropping.

Network Security Mechanisms l Network security starts from authenticating any user, most likely a username and a password. l Once authenticated, a stateful firewall enforces access policies such as what services are allowed to be accessed by the network users l Though effective to prevent unauthorized access, this component fails to check potentially harmful contents such as computer worms being transmitted over the network. l An intrusion prevention system (IPS) helps detect and prevent such malware. IPS also monitors for suspicious network traffic for contents, volume and anomalies to protect the network from attacks such as denial of service. l Communication between two hosts using the network could be encrypted to maintain privacy. l Individual events occurring on the network could be tracked for audit purposes and for a later high level analysis.

Network Security Mechanisms l Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early- warning tools. Honeypots l Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. l Such analysis could be used to further tighten security of the actual network being protected by the honeypot l Some tools: Firewall, Antivirus software and Internet Security Software. For authentication, use strong passwords and change it on a bi-weekly/monthly basis. When using a wireless connection, use a robust password. Network analyzer to monitor and analyze the network.Antivirus softwareauthenticationNetwork analyzer

Network Forensics Revisited l Network forensics is the process of capturing information that moves over a network and trying to make sense of it in some kind of forensics capacity.network l A network forensics appliance is a device that automates this process.network forensics appliance l Wireless forensics is the process of capturing information that moves over a wireless network and trying to make sense of it in some kind of forensics capacity.

Network Forensics: Open Source Tools l Open source tools - Wireshark Wireshark - Kismet Kismet - Snort Snort - OSSEC OSSEC - NetworkMiner is an open source Network Forensics Tool available at SourceForge. NetworkMineran open source Network Forensics Tool available at SourceForge - Xplico is an Internet/IP Traffic Decoder (NFAT). Protocols supported: HTTP, SIP, FTP, IMAP, POP, SMTP, TCP, UDP, IPv4, IPv6 XplicoHTTP, SIP, FTP, IMAP, POP, SMTP, TCP, UDP, IPv4, IPv6

Network Forensics: NetworkMiner l NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. l NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. sniffer l The purpose of NetworkMiner is to collect data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. l The main view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).

Network Forensics: Commercial Tools l Deep Analysis Tools (data mining based tools) - E-Detective - ManTech International Corporation - Network Instruments - NIKSUN's NetDetectorNetDetector - PacketMotion - Sandstorm's NetInterceptNetIntercept - Mera Systems NetBeholderNetBeholder - InfoWatch Traffic Monitor InfoWatch Traffic Monitor

Network Forensics: Commercial Tools l Flow-Based Systems - Arbor Networks - GraniteEdge Networks - Lancope - Mazu Networks l Hybrid Systems - These systems combine flow analysis, deep analysis, and security event monitoring and reporting. - Q1 Labs

Network Analysis l Find analysis techniques developed for one type of network and apply it to another type of network l Types of networks - Computer and Communication Networks - Telecommunication Network - Transportation networks l Highways, Railroad, Air Traffic - Human networks l Terror networks, Relationship networks

Social Network Analysis of 9/11 Terrorists ( Early in 2000, the CIA was informed of two terrorist suspects linked to al-Qaeda. Nawaf Alhazmi and Khalid Almihdhar were photographed attending a meeting of known terrorists in Malaysia. After the meeting they returned to Los Angeles, where they had already set up residence in late 1999.

Social Network Analysis of 9/11 Terrorists What do you do with these suspects? Arrest or deport them immediately? No, we need to use them to discover more of the al- Qaeda network. Once suspects have been discovered, we can use their daily activities to uncloak their network. Just like they used our technology against us, we can use their planning process against them. Watch them, and listen to their conversations to see... who they call / who visits with them locally and in other cities where their money comes from The structure of their extended network begins to emerge as data is discovered via surveillance.

Social Network Analysis of 9/11 Terrorists A suspect being monitored may have many contacts -- both accidental and intentional. We must always be wary of 'guilt by association'. Accidental contacts, like the mail delivery person, the grocery store clerk, and neighbor may not be viewed with investigative interest. Intentional contacts are like the late afternoon visitor, whose car license plate is traced back to a rental company at the airport, where we discover he arrived from Toronto (got to notify the Canadians) and his name matches a cell phone number (with a Buffalo, NY area code) that our suspect calls regularly. This intentional contact is added to our map and we start tracking his interactions -- where do they lead? As data comes in, a picture of the terrorist organization slowly comes into focus. How do investigators know whether they are on to something big? Often they don't. Yet in this case there was another strong clue that Alhazmi and Almihdhar were up to no good -- the attack on the USS Cole in October of One of the chief suspects in the Cole bombing [Khallad] was also present [along with Alhazmi and Almihdhar] at the terrorist meeting in Malaysia in January Once we have their direct links, the next step is to find their indirect ties -- the 'connections of their connections'. Discovering the nodes and links within two steps of the suspects usually starts to reveal much about their network. Key individuals in the local network begin to stand out. In viewing the network map in Figure 2, most of us will focus on Mohammed Atta because we now know his history. The investigator uncloaking this network would not be aware of Atta's eventual importance. At this point he is just another node to be investigated.

Social Network Analysis of 9/11 Terrorists Figure 2 shows the two suspects and

Social Network Analysis of 9/11 Terrorists

We now have enough data for two key conclusions: All 19 hijackers were within 2 steps of the two original suspects uncovered in 2000! Social network metrics reveal Mohammed Atta emerging as the local leader With hindsight, we have now mapped enough of the 9-11 conspiracy to stop it. Again, the investigators are never sure they have uncovered enough information while they are in the process of uncloaking the covert organization. They also have to contend with superfluous data. This data was gathered after the event, so the investigators knew exactly what to look for. Before an event it is not so easy. As the network structure emerges, a key dynamic that needs to be closely monitored is the activity within the network. Network activity spikes when a planned event approaches. Is there an increase of flow across known links? Are new links rapidly emerging between known nodes? Are money flows suddenly going in the opposite direction? When activity reaches a certain pattern and threshold, it is time to stop monitoring the network, and time to start removing nodes. The author argues that this bottom-up approach of uncloaking a network is more effective than a top down search for the terrorist needle in the public haystack -- and it is less invasive of the general population, resulting in far fewer "false positives".

Social Network Analysis of Steroid Usage in Baseball ( Figure 2 shows the two suspects and When the Mitchell Report on steroid use in Major League Baseball [MLB], was published, people were surprised at who and how many players were mentioned. The diagram below shows a human network created from data found in the Mitchell Report. Baseball players are shown as green nodes. Those who were found to be providers of steroids and other illegal performance enhancing substances appear as red nodes. The links reveal the flow of chemicals -- from provider to player.

Applying to Network Forensics l Start with infected machines l Then follow the chain to other machines l Visualization techniques for the network of affected machines l Iowa State University Prototype is an example