Download presentation
Presentation is loading. Please wait.
Published byEmory Campbell Modified over 9 years ago
13
1- GRAM - BASED PAYLOAD ANOMALY DETECTOR 1- GRAM - BASED PAYLOAD ANOMALY DETECTOR U SE OF MODELS U SE OF MODELS 1.M EAN B YTE F REQUENCY 2.B YTE F REQUENCY S TANDARD D EVIATION S AME VALUES COMPUTED FOR INCOMING PACKETS --> COMPARED TO MODEL VALUES S AME VALUES COMPUTED FOR INCOMING PACKETS --> COMPARED TO MODEL VALUES POSEIDON B UILT ON THE PAYL ARCHITECTURE B UILT ON THE PAYL ARCHITECTURE E MPLOYS A N EURAL N ETWORK TO CLASSIFY PACKETS E MPLOYS A N EURAL N ETWORK TO CLASSIFY PACKETS S ELF -O RGANIZING M APS S ELF -O RGANIZING M APS
14
V ULNERABLE TO MIMICRY ATTACKS (O NLY MODELS 1- GRAM BYTE DISTRIBUTION ) V ULNERABLE TO MIMICRY ATTACKS (O NLY MODELS 1- GRAM BYTE DISTRIBUTION ) A DDITIONAL BYTES ADDED TO MATCH MODELS A DDITIONAL BYTES ADDED TO MATCH MODELS POSEIDON - F AIL M ORE RESILIENT TO MIMICRY ATTACKS (SOM AND PAYL TOGETHER ) M ORE RESILIENT TO MIMICRY ATTACKS (SOM AND PAYL TOGETHER ) A TTACK PORTION OF PAYLOAD SMALL ENOUGH --> ASSIGNED TO A CLUSTER WITH MODELS OF REGULAR TRAFFIC ( SIMILAR BYTE FREQUENCY ) A TTACK PORTION OF PAYLOAD SMALL ENOUGH --> ASSIGNED TO A CLUSTER WITH MODELS OF REGULAR TRAFFIC ( SIMILAR BYTE FREQUENCY )
15
H IGHER - ORDER N - GRAMS USED (N > 1) H IGHER - ORDER N - GRAMS USED (N > 1) B INARY -B ASED N-G RAM ANALYSIS B INARY -B ASED N-G RAM ANALYSIS U SE OF B LOOM F ILTERS U SE OF B LOOM F ILTERS L ESS MEMORY USED = U SE OF HIGER - ORDER N - GRAMS L ESS MEMORY USED = U SE OF HIGER - ORDER N - GRAMS M ORE PRECISE THAN FREQUENCY - BASED ANALYSIS (PAYL) M ORE PRECISE THAN FREQUENCY - BASED ANALYSIS (PAYL) M C PAD "M ULTIPLE - CLASSIFIER P AYLOAD - BASED A NOMALY D ETECTOR " "M ULTIPLE - CLASSIFIER P AYLOAD - BASED A NOMALY D ETECTOR " 2-G RAM A NALYSIS 2-G RAM A NALYSIS S UPPORT V ECTOR M ACHINE (SVM) CLASSIFIERS S UPPORT V ECTOR M ACHINE (SVM) CLASSIFIERS
16
B LOOM F ILTER S ATURATES DURING TRAINING B LOOM F ILTER S ATURATES DURING TRAINING A TTACK LEVERAGES SEQUENCE OF N - GRAMS THAT HAVE BEEN OBSERVED DURING TESTING A TTACK LEVERAGES SEQUENCE OF N - GRAMS THAT HAVE BEEN OBSERVED DURING TESTING M C PAD - F AIL T RIES TO GIVE WIDE REPRESENTATION OF THE PAYLOAD T RIES TO GIVE WIDE REPRESENTATION OF THE PAYLOAD 1.A PPROXIMATE REPRESENTATION 2.U SE OF DIFFERENT CLASSIFIERS
19
R EAL - LIFE DATA FROM DIFFERENT NETWORK ENVIRONMENTS ( CURRENTLY OPERATING ) R EAL - LIFE DATA FROM DIFFERENT NETWORK ENVIRONMENTS ( CURRENTLY OPERATING ) F OCUS ON ANALYSIS OF BINARY PROTOCOLS F OCUS ON ANALYSIS OF BINARY PROTOCOLS 1.T YPICAL L AN (W INDOWS - BASED NETWORK SERVICES ) 2.P ROTOCOLS FOUND IN ICS
21
D ETECTION R ATE D ETECTION R ATE F ALSE P OSITIVE R ATE F ALSE P OSITIVE R ATE
22
N UMBER OF CORRECTLY DETECTED PACKETS WITHIN THE ATTACK SET N UMBER OF CORRECTLY DETECTED PACKETS WITHIN THE ATTACK SET N UMBER OF DETECTED ATTACK INSTANCES N UMBER OF DETECTED ATTACK INSTANCES A LARM = TRUE POSITIVE IF ALGORITHM TRIGGERS AT LEAST ONE ALERT PACKET PER ATTACK INSTANCE A LARM = TRUE POSITIVE IF ALGORITHM TRIGGERS AT LEAST ONE ALERT PACKET PER ATTACK INSTANCE F ALSE P OSITIVE R ATE R ELATE TO DETECTION RATE R ELATE TO DETECTION RATE I NSTEAD OF PERCENTAGE, USE NUMBER OF FALSE POSITIVES PER TIME UNIT I NSTEAD OF PERCENTAGE, USE NUMBER OF FALSE POSITIVES PER TIME UNIT T WO T HRESHOLDS : T WO T HRESHOLDS : 1.10 F ALSE POSITIVES PER DAY 2.1 F ALSE P OSITIVE PER MINUTE
23
S IGNATURE - BASED IDS S IGNATURE - BASED IDS U SED TO VERIFY ALERTS ARE FALSE POSITIVES U SED TO VERIFY ALERTS ARE FALSE POSITIVES
25
U SED TO VERIFY IMPLEMENTATIONS U SED TO VERIFY IMPLEMENTATIONS PAYL PAYL A NAGRAM A NAGRAM HTTP (AS) U SED FOR BENCHMARKS WITH M C PAD U SED FOR BENCHMARKS WITH M C PAD 66 D IVERSE ATTACKS 66 D IVERSE ATTACKS 11 S HELLCODES 11 S HELLCODES
26
N ETWORK TRACES FROM U NIVERSITY NETWORK N ETWORK TRACES FROM U NIVERSITY NETWORK A VG. D ATA R ATE : ~40M BPS A VG. D ATA R ATE : ~40M BPS F OCUS ON SMB/CIFS PROTOCOL MESSAGES WHICH ENCAPSULATE RPC MESSAGES F OCUS ON SMB/CIFS PROTOCOL MESSAGES WHICH ENCAPSULATE RPC MESSAGES A VG. P ACKET R ATE : ~22/ SEC A VG. P ACKET R ATE : ~22/ SEC SMB (AS) S EVEN A TTACK I NSTANCES S EVEN A TTACK I NSTANCES E XPLOIT 4 DIFFERENT VULNERABILITIES : E XPLOIT 4 DIFFERENT VULNERABILITIES : 1. MS 04-011 2. MS 06-040 3. MS 08-067 4. MS 10-061
27
D ATA S ET TRACES FROM ICS OF REAL - WORLD PLANT : 30 D AYS OF OBSERVATION D ATA S ET TRACES FROM ICS OF REAL - WORLD PLANT : 30 D AYS OF OBSERVATION A VG. T HROUGHPUT ON NET : ~800K BPS A VG. T HROUGHPUT ON NET : ~800K BPS M AX S IZE OF M ODBUS /TCP MESSAGE : 256 BYTES M AX S IZE OF M ODBUS /TCP MESSAGE : 256 BYTES A VG. S IZE OF M ODBUS /TCP MESSAGE : 12.02 BYTES A VG. S IZE OF M ODBUS /TCP MESSAGE : 12.02 BYTES A VG. P ACKET R ATE : ~96/ SEC A VG. P ACKET R ATE : ~96/ SEC M ODBUS (AS) 163 A TTACK I NSTANCES 163 A TTACK I NSTANCES E XPLOIT A MULTITUDE OF VULNERABILITIES OF THE M ODBUS /TCP IMPLEMENTATION E XPLOIT A MULTITUDE OF VULNERABILITIES OF THE M ODBUS /TCP IMPLEMENTATION T WO FAMILIES OF EXPLOITED VULNERABILITIES : T WO FAMILIES OF EXPLOITED VULNERABILITIES : 1.U NAUTHORIZED U SE 2.P ROTOCOL E RRORS
31
A NAGRAM - 0.00% FALSE POSITIVE RATE AND LOWEST FALSE POSITIVE RATE OF ALL TESTED ALGORITHMS A NAGRAM - 0.00% FALSE POSITIVE RATE AND LOWEST FALSE POSITIVE RATE OF ALL TESTED ALGORITHMS M C PAD - HIGHEST FALSE POSITIVE RATE AND IS IMPOSSIBLE TO LOWER M C PAD - HIGHEST FALSE POSITIVE RATE AND IS IMPOSSIBLE TO LOWER A LL FALSE POSITIVES VERIFIED THROUGH SNORT ( NONE ARE TRUE POSITIVES ) A LL FALSE POSITIVES VERIFIED THROUGH SNORT ( NONE ARE TRUE POSITIVES )
33
PAYL AND POSEIDON FAIL TO DETECT ATTACK THAT EXPLOITS MS 06-040 PAYL AND POSEIDON FAIL TO DETECT ATTACK THAT EXPLOITS MS 06-040 W HEN FALSE POSITIVE BELOW 2% W HEN FALSE POSITIVE BELOW 2%
36
W HY A NAGRAM WORKS SO WELL ? W HY A NAGRAM WORKS SO WELL ? 1.V ALID READ REQUEST 2.A TTACK INSTANCE 3.S MALLEST POSSIBLE M ODBUS MESSAGE ALLOWED BY PROTOCOL SPECIFICATION
38
A TTACKS CORRECTLY DETECTED A TTACKS CORRECTLY DETECTED H IGH RATE OF FALSE POSITIVES H IGH RATE OF FALSE POSITIVES H IGH COST TO INDEPENDENTLY DEPLOY ON REAL ENVIRONMENT H IGH COST TO INDEPENDENTLY DEPLOY ON REAL ENVIRONMENT M ODBUS A NAGRAM INDEPENDENTLY DETECTS ALMOST EVERY ATTACK INSTANCE A NAGRAM INDEPENDENTLY DETECTS ALMOST EVERY ATTACK INSTANCE F ALSE POSITIVE RATE LOWER THAN THE 10 ALERTS PER DAY THRESHOLD F ALSE POSITIVE RATE LOWER THAN THE 10 ALERTS PER DAY THRESHOLD C AN BE DEPLOYED IN REAL ENVIRONMENT C AN BE DEPLOYED IN REAL ENVIRONMENT
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.