Download presentation
Presentation is loading. Please wait.
Published bySophie Tate Modified over 8 years ago
1
28/09/2016 Mildly Penetrative Packet Inspection Shane Alcock WAND
2
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 2 Application Protocol Identification Analysis Research! Traffic patterns, e.g. what apps are popular? Traffic shaping or blocking Especially P2P Diagnostics What are all those inbound flows?
3
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 3 Shallow Packet Inspection Examine headers only No application payload Relying almost entirely on ports Quick and easy Fewer privacy concerns Unreliable Applications using random ports Applications hiding on port 80 Ethernet VLAN IP TCP TCP Payload
4
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 4 Deep Packet Inspection Examine entire packet body Including all application payload Highest chance of success Privacy issues Protecting user data Difficult for researchers Computationally expensive DPI “solutions” typically cost $$$ Ethernet VLAN IP TCP TCP Payload
5
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 5 Mildly Penetrative Packet Inspection? Retain four bytes of payload Application headers Almost all user data is discarded All WAND captures since 2006 do this Enough to identify applications? Ethernet VLAN IP TCP TCP Payload
6
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 6 Libprotoident C software library developed at WAND Based on libtrace Simple API enables programmers to use software in their own tools Includes basic tools as well Examine first payload-bearing packet in each direction All subsequent packets can be ignored -> fast Properties examined Four bytes of payload Payload size Port – although we try to use this as little as possible!
7
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 7 MPPI In Action 13:00:16.233005 IP (tos 0x0, ttl 121, id 61601, offset 0, flags [none], proto: UDP (17), length: 111) 10.0.0.1.41822 > 10.0.0.2.25842: UDP, length 83 0x0000: 4500 006f f0a1 0000 7911 e1cf 0a00 0001 0x0010: 0a00 0002 a35e 64f2 005b 9bd9 fabe 9049 13:00:16.712164 IP (tos 0x0, ttl 125, id 29139, offset 0, flags [none], proto: UDP (17), length: 65) 10.0.0.2.25842 > 10.0.0.1.41822: UDP, length 37 0x0000: 4500 0041 71d3 0000 7d11 5ccc 0a00 0002 0x0010: 0a00 0001 64f2 a35e 002d db6a 0000 0408
8
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 8 MPPI In Action 13:00:16.233005 IP (tos 0x0, ttl 121, id 61601, offset 0, flags [none], proto: UDP (17), length: 111) 10.0.0.1.41822 > 10.0.0.2.25842: UDP, length 83 0x0000: 4500 006f f0a1 0000 7911 e1cf 0a00 0001 0x0010: 0a00 0002 a35e 64f2 005b 9bd9 fabe 9049 13:00:16.712164 IP (tos 0x0, ttl 125, id 29139, offset 0, flags [none], proto: UDP (17), length: 65) 10.0.0.2.25842 > 10.0.0.1.41822: UDP, length 37 0x0000: 4500 0041 71d3 0000 7d11 5ccc 0a00 0002 0x0010: 0a00 0001 64f2 a35e 002d db6a 0000 0408 $ lpi_protoident pcapfile:test.pcap pcapfile:test.pcap BitTorrent_UDP 10.0.0.2 10.0.0.1 25842 41822 17 1231286416.233 37 83 00000408.... 37 fabe9049...I 83
9
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 9 Pretty Graphs
10
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 10 Pretty Graphs
11
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 11 Pretty Graphs
12
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 12 Pretty Graphs
13
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 13 Current Status Support for 178 application protocols (and counting!) New 2011 capture might add a few new protocols :) Released library and tools – open source! Compare results against OpenDPI A bit tricky, as we need full payload traces Do some real-time tests Can we use this effectively on live data? If so, try to integrate into BSOD visualisation
14
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 14 Summary You don't need full DPI to identify applications effectively Just first four bytes of payload in each direction Less CPU-intensive Better from a network user privacy standpoint Subject to many of the same limitations as DPI Still need *some* payload Encryption makes life hard Requires active maintenance, e.g. new protocols Coming up with new protocol rules is hard work!
15
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 15 Links Graphs http://www.wand.net.nz/~salcock/proto/results.html Library http://research.wand.net.nz/software/libprotoident.php Contact salcock@cs.waikato.ac.nz
16
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 16 WAND Network Research Group Department of Computer Science The University of Waikato Private Bag 3105 Hamilton, New Zealand www.crc.net.nz www.wand.net.nz www.waikato.ac.nz
17
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 17 Example Rule Matching World of Warcraft TCP flows Request packet payload is 0x00 0x08 ANY ANY Bytes 3 and 4 are the payload length minus 4 bytes Response packet payload is 0x00 0x00 0x00 ANY Packet payload is always 119 bytes long
18
© THE UNIVERSITY OF WAIKATO TE WHARE WANANGA O WAIKATO 18 Deep Packet Inspection OpenDPI Ipoque DPI engine, open-sourced C library with external API Supports 86 application protocols Not updated very frequently L7-filter Classifier for netfilter Supports 112 application protocols Current website inaccessible :( Ethernet VLAN IP TCP TCP Payload
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.