Network Security Data Visualization Greg Conti CS6262

Slides:



Advertisements
Similar presentations
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
Vulnerability Analysis Borrowed from the CLICS group.
Snort - an network intrusion prevention and detection system Student: Yue Jiang Professor: Dr. Bojan Cukic CS665 class presentation.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
IT Security Doug Brown Jeff Bollinger. What is security? P.H.P. People Have Problems Security is the mitigation and remediation of human error in information.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Computer Security and Penetration Testing
Intrusion Detection/Prevention Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality,
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Lecture 11 Intrusion Detection (cont)
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Ana Chanaba Robert Huylo
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Penetration Testing Security Analysis and Advanced Tools: Snort.
COEN 252 Computer Forensics
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Intrusion Detection: Snort. Basics: History Snort was developed in 1998 by Martin Roesch. It was intended to be an open-source technology, and remains.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
What is FORENSICS? Why do we need Network Forensics?
Passive Visual Fingerprinting of Network Attack Tools Gregory Conti Kulsoom Abdullah College of Computing Georgia Institute of Technology Passive.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Network Attack Visualization Greg Conti
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Attack signatures derived from Metasploit Final Presentation E. Ramirez A. Zoghbi
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
Snort - Lightweight Intrusion Detection for Networks YOUNG Wo Sang Program Committee, PISA
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Retina Network Security Scanner
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Real Time and Forensic Network Data Analysis Using Animated Combined Visualizations Sven Krasser Gregory Conti Julian Grizzard Jeff Gribschaw Henry Owen.
Intrusion Detection System
Security System for KOREN/APII-Testbed
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Network and Port Scanning Chien-Chung Shen
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
CompTIA Security+ Study Guide (SY0-401)
Snort – IDS / IPS.
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
Intrusion Detection Systems (IDS)
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Operating System Security
Presentation transcript:

Network Security Data Visualization Greg Conti CS6262

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

Why InfoVis? Helps find patterns Helps reduce search space Aids efficient monitoring Enables interaction (what if) Help prevent overwhelming the user

So What? Go Beyond the Algorithm Help with detecting and understand some 0 day attacks Make CTF and Root Wars a Spectator Sport Help find insider threats Help visually fingerprint attacks What tasks do you need help with?

TCP Dump image:

Network Traffic Viewed in Ethereal Ethereal by Gerald Combs can be found at image:

Network Traffic as Viewed in EtherApe Etherape by Juan Toledo can be found at screenshot:

Outline Quick overview of Intrusion Detection Systems (IDS) Quick overview of Information Visualization What data is available on the wire Finding interesting combinations What the attacks look like

Intrusion Detection System An intrusion-detection system (IDS) is a tool used to detect attacks or other security breaches in a computer system or network.

Intrusion Detection System Types Host-based intrusion-detection is the art of detecting malicious activity within a single computer by using –host log information –system activity –virus scanners A Network intrusion detection system is a system that tries to detect malicious activity such as denial of service attacks, port-scans or other attempts to hack into computers by reading all the incoming packets and trying to find suspicious patterns.

Information Visualization Mantra Overview First, Zoom & Filter, Details on Demand - Ben Shneiderman

Overview First…

Zoom and Filter…

Details on Demand…

What Tools are at Your Disposal… Color Size Shape Orientation Scale Interactivity Sequence Filtering Perspective

What Can InfoVis Help You See? Relationships between X & Y & Z… Anomalies Outliers Extremes Patterns Comparisons and Differences Trends

User Tasks ID Locate Distinguish Categorize Cluster Distribution Rank Compare Associate Correlate See also

Representative Current Research

Dr. Rob Erbacher Representative Research –Visual Summarizing and Analysis Techniques for Intrusion Data –Multi-Dimensional Data Visualization –A Component-Based Event- Driven Interactive Visualization Software Architecture

Demo

Dr. David Marchette Passive Fingerprinting Statistics for intrusion detection

(images) (descriptions)

Soon Tee Teoh Visualizing Internet Routing Data

CAIDA Code Red Worm Propagation Young Hyun David Moore Colleen Shannon Bradley Huffaker

Jukka Juslin Intrustion Detection and Visualization Using Perl

Michal Zalewski Initial paper - Follow-up paper - Linux 2.2 TCP/IP sequence numbers are not as good as they might be, but are certainly adequate, and attack feasibility is very low. TCP/IP Sequence Number Generation

Atlas of Cyber Space

John Levine The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks Interesting look at detecting zero-day attacks

Port 135 MS BLASTER scans Date Public: 7/16/03 Date Attack: 8/11/03 Georgia Tech Honeynett Source: John Levine, Georgia Tech

Port 1434 (MS-SQL) scans Date Public: 7/24/02 Date Attack: 1/25/03 Georgia Tech Honeynet Source: John Levine, Georgia Tech

Port 554 (RTSP) scans Date Public: 8/15/2003 Date Attack: 8/22/03 Georgia Tech Honeypot Source: John Levine, Georgia Tech

Hot Research Areas… visualizing vulnerabilities visualizing IDS alarms (NIDS/HIDS) visualizing worm/virus propagation visualizing routing anamolies visualizing large volume computer network logs visual correlations of security events visualizing network traffic for security visualizing attacks in near-real-time security visualization at line speeds dynamic attack tree creation (graphic) forensic visualization

More Hot Research Areas… feature selection feature construction incremental/online learning noise in the data skewed data distribution distributed mining correlating multiple models efficient processing of large amounts of data correlating alerts signature detection anomaly detection forensic analysis

One Approach… Look at TCP/IP Protocol Stack Data (particularly header information) Find interesting visualizations Throw some interesting traffic at them See what they can detect Refine

TCP/IP Protocol Stack

Information Available On and Off the Wire Levels of analysis External data –Time –Size –Protocol compliance –Real vs. Actual Values Matrices of options Header slides

Link Layer (Ethernet) Application Presentation Session Transport Network Link Physical

Network Layer (IP) Application Presentation Session Transport Network Link Physical

Transport Layer (TCP) Application Presentation Session Transport Network Link Physical

Transport Layer (UDP) Application Presentation Session Transport Network Link Physical

Exploitation Pattern of Typical Internet Worm Target Vulnerabilities on Specific Operating Systems Localized Scanning to Propagate (Code Red) –3/8 of time within same Class B (/16 network) –1/2 of time within same Class A (/8 network) –1/8 of time random address Allows for Quick Infection Within Internal Networks with High Concentration of Vulnerable Hosts ? Source: John Levine, Georgia Tech

Ethernet Packet Capture Parse Process Plot tcpdump (pcap, winpcap, snort) Perl (c/c++) Perl (c/c++) xmgrace (GNU plotutils gtk+/opengl html) tcpdump capture files

Grace “Grace is a WYSIWYG 2D plotting tool for the X Window System and M*tif. Grace runs on practically any version of Unix-like OS. As well, it has been successfully ported to VMS, OS/2, and Win9*/NT/2000/XP”

Required Files Perl, tcpdump and grace need to be installed to install grace... Download RPMs (or source) ftp://plasma-gate.weizmann.ac.il/pub/grace/contrib/RPMS The files you want grace i386.rpm pdflib i386.rpm Install #rpm -i pdflib i386.rpm #rpm -i grace i386.rpm

Hello World Example # tcpdump -lnnq -c10 | perl parse.pl | perl analyze.pl |outfile.dat # xmgrace outfile.dat & Optionally you can run xmgrace with an external format language file… # xmgrace outfile.dat -batch formatfile

Hello World Example (cont) Optionally you can run xmgrace with an external format language file… xmgrace outfile.dat -batch formatfile formatfile is a text file that pre-configures Grace e.g. title "Port Scan Against Single Host" subtitle "Superscan w/ports " yaxis label "Port" yaxis label place both yaxis ticklabel place both xaxis ticklabel off xaxis tick major off xaxis tick minor off autoscale

Data Format tcpdump outputs somewhat verbose output 09:02: :6:5b:4:20:14 0:5:9a:50:70:9 62: > : tcp 0 (DF) parse.pl cleans up output :6:5b:4:20:14 0:5:9a:50:70: tcp analyze.pl extracts/formats for Grace

Results Example 1 - Baseline with Normal Traffic Example 2 - Port Scan Example 3 - Port Scan “Fingerprinting” Example 4 - Vulnerability Scanner Example 5 - Wargame

Example 1 - Baseline Normal network traffic –FTP, HTTP, SSH, ICMP… Command Line –Capture Raw Data tcpdump -l -nnqe -c 1000 tcp or udp | perl parse.pl > exp1_outfile.txt –Run through Analysis Script cat exp1_outfile.txt | perl analyze_1a.pl > output1a.dat –Open in Grace xmgrace output1a.dat &

Example 2 - PortScan Light “normal” network traffic (HTTP) Command Line –Run 2a.bat (chmod +x 2a.bat) echo running experiment 2 echo port scan tcpdump -l -nnqe -c 1200 tcp or udp > raw_outfile_2.txt cat raw_outfile_2.txt | perl parse_2a.pl > exp2_outfile.txt cat exp2_outfile.txt | perl analyze_2a.pl > output_2a.dat xmgrace output_2a.dat & echo experiment 2 completed

Attacker

Defender

Example 3- PortScan “Fingerprinting” Tools Examined: Nmap Win (on top of Nmap 3.00) XP Attacker ( Nmap 3.00 RH 8.0 Attacker ( Superscan 3.0 RH 8.0 Attacker ( &subcontent=/resources/proddesc/superscan.htm)

nmap 3.00 default (RH 8.0) nmap 3.00 udp scan (RH 8.0) Superscan 3.0 Nmap Win 1.3.1

Three Parallel Scans

Example 4: Vulnerability Scanner Attacker: RH 8.0 running Nessus Target: RH 9.0

Example 5: Wargame Attackers: NSA Red Team Defenders: US Service Academies Defenders lock down network, but must provide certain services Dataset -

Zooming in on port 8080

Port 135 CAN tcpany135 The RPC DCOM interface in Windows 2000 SP3 and SP4 allows remote attackers to cause a denial of service (crash), and local attackers to use the DoS to hijack the epmapper pipe to gain privileges, via certain messages to the __RemoteGetClassObject interface that cause a NULL pointer to be passed to the PerformScmStage function. CAN any135 Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN worm.

Conclusions Limited fingerprinting of tools is possible Visualization can help drive better algorithms Some attacker techniques can be identified Some vulnerabilities can be identified

Demo See readme.txt Two demo scripts… –runme.bat (uses sample dataset) –runme_sniff.bat (performs live capture, must be root) Note: you must modify the IP address variable in the Analyzer script. (See analyzer2.pl for example)

Future Distributed NIDS Visualization Real-time vs. Offline Interesting datasets 3D Other visualization techniques Visualization of protocol attacks Visualization of application layer attacks Visualization of physical layer attacks (?) Code up some stand-alone tools

Questions?

Who are your users: What are their tasks? ID Locate Distinguish Categorize Cluster Distribution Rank Compare Associate Correlate Color Size Shape Orientation Scale Interactivity Sequence Filtering Perspective