Download presentation
Presentation is loading. Please wait.
Published byArnaldo Mari Modified over 5 years ago
1
THE INTERNET MOTION SENSOR: A Distributed Blackhole Monitoring System
Presented by: Bruce Meeks, Jr. Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson Publisher: Electrical Engineering and Computer Science Department, University of Michigan
2
INTRODUCTION AND MOTIVATION
National Infrastructure of global networks vulnerable to rapidly growing internet threats Amongst them, fast moving worms, distributed denial of service attacks, and routing exploits
3
INTRODUCTION AND MOTIVATION
Threats’ share several key components: 1) globally scoped 2) occasional zero-day threats 3) evolutionary characteristic 4) many are exceptionally virulent
4
AUTHORS’ PROPOSED METHODS FOR MONITORING AND ANALYSIS
One promising method for investigating these threats is monitoring unused or dark address space Two key design challenges necessary to incorporate this monitoring infrastructure:
5
SENSOR COVERAGE The visibility of the system into Internet threats
One method to increase visibility is to monitor larger blocks of address space
6
SERVICE EMULATION Difficult to emulate realistic Internet services because the IMS doesn’t interact with live hosts An ideal system would reproduce all current and future services with exactly the same behaviors as all possible end-hosts.
7
MAIN CONTRIBUTIONS The design and implementation of a distributed, globally scoped, Internet threat monitoring system - IMS architecture The deployment and demonstration of the IMS on production networks - Current deployment and observations
8
INTERNET MOTION SENSOR ARCHITECURE
Offers Three Novel Contributions: Distributed Monitoring Infrastruture 2) Lightweight Active Reponder 3) Payload Signatures and Caching
9
INTERNET MOTION SENSOR ARCHITECURE 1st Novel Contribution
Distributed Monitoring Infrastructure - Distributed deployment to increase visibility
10
INTERNET MOTION SENSOR ARCHITECURE 2nd Novel Contribution
Lightweight Active Responder - Characterize threats on emerging ports and services - Essentially a honeypot (low responsive)
11
INTERNET MOTION SENSOR ARCHITECURE 2nd Novel Contribution
Light Weight Active Responder
12
INTERNET MOTION SENSOR ARCHITECURE 3rd Novel Contribution
Payload Signatures and Caching Only stores new payloads Storage conservation Identifies new payloads ** Note: Goal of IMS is to measure, characterize, and track a broad range of Internet threats **
13
Deployment Observations and Experiences
Three events captured using IMS deployment: Internet Worm activity Scanning 3) DDoS
14
Weaknesses of Paper Next step of counteraction after detection ?
Why should this method of monitoring and analyzing be superior to others? Provides little to no information on defending against threats that depend on application level responses.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.