HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG 124862 Supervisor : AP. Dr. Mohamed Othman.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

Snort: Overview Chris Copeland What is an Intrusion Detection System (IDS)? An intrusion detection system is any system which can identify a network.
Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
IDPS (Intrusion Detection & Prevention System )
TransAD: A Content Based Anomaly Detector Sharath Hiremagalore Advisor: Dr. Angelos Stavrou October 23, 2013.
Tracking the Role of Adversaries in Measuring Unwanted Traffic Mark Allman(ICSI) Paul Barford(Univ. Wisconsin) Balachander Krishnamurthy(AT&T Labs - Research)
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Big Data Analytics and Challenge Presented by Saurabh Rastogi Asst. Prof. in Maharaja Agrasen Institute of Technology B.Tech(IT), M.Tech(IT)
1 Collaborative Online Passive Monitoring for Internet Quarantine Weidong Cui SAHARA Winter Retreat, 2004.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Lecture 11 Intrusion Detection (cont)
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEM
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Intrusion and Anomaly Detection in Network Traffic Streams: Checking and Machine Learning Approaches ONR MURI area: High Confidence Real-Time Misuse and.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Chirag N. Modi and Prof. Dhiren R. Patel NIT Surat, India Ph. D Colloquium, CSI-2011 Signature Apriori based Network.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Honeycomb Automated IDS Signature Generation using Honeypots Christian Kreibich Jon Crowcroft.
IIT Indore © Neminah Hubballi
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Honeycomb and the current state of Honeypot Technology Christian Kreibich.
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Saturday, May 17, 2008 Generating signatures for zero-day network attacks Pascal Gamper Daniela Brauckhoff Bernhard Tellenbach.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Attack signatures derived from Metasploit Final Presentation E. Ramirez A. Zoghbi
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Intrusion Detection Cyber Security Spring Reading material Chapter 25 from Computer Security, Matt Bishop Snort –
Detecting Evasion Attack at High Speed without Reassembly.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
1 Adaptive Case-Based Reasoning Architectures for Critical Infrastructure Protection Dr. Dan Schwartz Dr. Sara Stoecklin Mr. Erbil Yilmaz Ms. Mimi Xu Florida.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Intrusion Detection System (NIDS)
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Some Great Open Source Intrusion Detection Systems (IDSs)
CompTIA Security+ Study Guide (SY0-401)
IDS Intrusion Detection Systems
Snort – IDS / IPS.
An IP-based multimedia traffic generator
Very Fast containment of Scanning Worms
Principles of Computer Security
James Logan CS526 Dr. Chow April 29, 2009
CompTIA Security+ Study Guide (SY0-401)
Intrusion Detection Systems (IDS)
12/6/2018 Honeypot ICT Infrastructure Sashan
2019/1/1 High Performance Intrusion Detection Using HTTP-Based Payload Aggregation 2017 IEEE 42nd Conference on Local Computer Networks (LCN) Author: Felix.
Presentation transcript:

HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG Supervisor : AP. Dr. Mohamed Othman

Introduction  Honeycomb is a system for automated generation of signatures for network intrusion detection systems (NIDSs).  Applies protocol analysis and pattern- detection techniques to traffic captured on honeypots.  Honeycomb is good at spotting worms.

Problem Statement  Manually creation of Intrusion Detection Signatures is a tedious, inefficiency process.  There are more and more malware variants and self-propagating malware can spread very rapidly.  We need fast, automatic detection.

Objective  To extend the open source honeypot honeyd by honeycomb plug-in.  To implement the honeycomb on real environment.  Evaluate honeycomb on controlled environment.  Measure the system performance and quality of signatures.

Scope  Re-implements the research for automated generation attack signatures for NIDSs using Honeypots.  Setting up a Honeypots extended system.  Conduct experiments on the system.  Measure system performance.

Literature Review  Internet Worms :  Worm Propagation Behavior  Morris Worm  Code Red I  Code Red II  SQL Slammer  Nimda

Literature Review  Intrusion Detection System :  Signature Based  Anomaly Detection  Snort  Bro  Related Works :  Sweetbait  PAYL  Autograph

Honeycomb Architecture

Signature Creation Algorithm

Pattern Detection Horizontal detection  Comparing all messages at the same depth.  Messages are passed as input to the LCS algorithm in pairs.

Pattern Detection Vertical detection  Concatenating several messages into a string.  Comparing this with a corresponding concatenated string.

Signature Lifecycles  Relational operators on signatures:  sig 1 = sig 2 : all elements equal  sig 1  sig 2 : elements differ  sig 1  sig 2 : sig 1 contains subset of sig 2 ’s facts  sig new = sig pool : sig new ignored  sig new  sig pool : sig new added  sig new  sig pool : sig new added  sig pool  sig new : sig new augments sig pool

System Framework

HoneyComb Network Diagram

Experiments  Controlled Environment Experiments :  Evaluate the effectiveness and the quality of the worm signature created by the HoneyComb  Live Traffic Experiments.:  Determine what kind of signatures those generate by HoneyComb in the real traffic environment.

Controlled Environment Experiments

 TCP worm – Code Red II  UDP worm – SQL Slammer  Actual worms packet payload used.  Sent worms packets from compromise host to HoneyComb machine.

Controlled Environment Experiments

 Result :  TCP Worms – Code Red II alert tcp /24 any -> /16 80 (msg: "Honeycomb Sat Apr 7 13h51m "; ) alert tcp /24 any -> /16 80 (msg: "Honeycomb Sat Apr 7 14h21m ";flags: PA+; flow: established; content: "GET/default.ida?XXXX XX XX (...) 00|CodeRedII|…";)

Controlled Environment Experiments  Result :  UDP Worms – SQL Slammer alert udp / > / (msg: "Honeycomb Sat Apr 7 14h51m "; content: "| (...)|Qh.dllhel32hkernQhounthickChGetT f| (…) D6 EB|"; )

Controlled Environment Experiments  A comparison of the signature content and the worm payload sent to the honeypots shows that HoneyComb generates a good quality of signatures in controlled environment.  HoneyComb able to detect the TCP and UDP worm efficiency.

Live Traffic Experiment

 Generated Signatures :  18,288 signatures had been generated by HoneyComb.  9,473 signatures were containing flow content strings.  HoneyComb able to generate the Slammer signatures precisely.  No any Code Red II signature created since it reported died in October 2001

Live Traffic Experiment  Generated Signatures : alert udp any any -> / (msg: "Honeycomb Sat Apr 7 14h51m "; content: "| DC C9 B0|B|EB 0E |p|AE|B|01|p|AE|B| |h|DC C9 B0|B|B |1|C9 B1 18|P|E2 FD|5| |P|89 E5|Qh.dllhel32hkernQhounthickChGetTf|B9|llQh32.dhws2_f|B9|etQhsockf| B9|toQhsend|BE AE|B|8D|E|D4|P|FF 16|P|8D|E|E0|P|8D|E|F0|P|FF 16|P|BE AE|B|8B 1E 8B 03|=U|8B EC|Qt|05 BE 1C 10 AE|B|FF 16 FF D0|1|C9|QQP|81 F B 81 F |Q|8D|E|CC|P|8B|E|C0|P|FF 16|j|11|j|02|j|02 FF D0|P|8D|E|C4|P|8B|E|C0|P|FF C6 09 DB 81 F3|<a|D9 FF 8B|E|B4 8D C1 E C2 C1 E2 08"; )

Live Traffic Experiment  Generated Signatures : alert tcp any any -> /24 80,135,8080 (msg: "Honeycomb Thu Apr 19 05h28m "; flags: FRAU21!; flow: established; content of signature 908 : "CONNECT smtp.pchome.com.tw:25 HTTP/1.0|0D 0A 0D 0A|HTTP/ Bad Request|0D 0A|Server: Microsoft-IIS/5.0|0D 0A|Date: Tue, 17 Apr :57:30 GMT|0D 0A|Content- Type: text/html|0D 0A|Content-Length: 87|0D 0A 0D 0A| Error The parameter is incorrect. CONNECT smtp.pchome.com.tw:25 HTTP/1.0|0D 0A 0D|"; )

Honeycomb Performance Benchmarking

Discussion  HoneyComb v0.7 compiled with Honeyd v1.5b without error, but it provided a strange and useless result when running HoneyComb.  The source code in hc_udp.c and hc_tcp.c had been modified and recompiled to fix this error.

Discussion -- Problem  Unable to generate the signatures for the polymorphic worms.  Honeycomb can be fooled by attackers, to generate signatures for legitimate traffic.  Consuming a large amount of memory to perform the packets pattern matching.  Lost the memory when the system restart, thus, the same signatures will be generated.

Conclusion  Pattern matching worm detection mechanism of HoneyComb able to produce good quality signatures for worms.  Signatures created by HoneyComb can be converted into a format suitable for both Snort and Bro NIDS.

Conclusion  Honeypot offer an offensive approach to intrusion detection and prevention.  HoneyComb suggest that automated signature creation on honeypot is feasible and effectiveness.  This automated signature creation system is a first step towards integrating honeypots more closely into security infrastructure.

Future Works  Working to reducing the effort spent per arriving packets by the HoneyComb.  Solve the drawback on unable to generate signature for the polymorphic worms.  Provide a better tool to analyze the signatures created.  Implication IPv6 to existing HoneyComb architecture.

Question and Answer

Thank You