Presentation is loading. Please wait.

Presentation is loading. Please wait.

EECS 598-2 Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.

Similar presentations


Presentation on theme: "EECS 598-2 Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders."— Presentation transcript:

1 EECS 598-2 Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders

2 EECS 598-2 Presentation Overview Target Environment Threat Model Web Tap Design Results Future Work Conclusion Questions Demo

3 EECS 598-2 Presentation Target Environment High-security corporate or government network –Very concerned about information leaks and intruders –Mail server and (optionally) proxy server on network perimeter –Strict firewall settings Only allow outgoing http traffic on port 80 from workstations Or use proxy server and block all traffic

4 EECS 598-2 Presentation Threat Model A highly-skilled hacker compromises a vulnerable workstation –E-mail a link to a web page that exploits the browser –E-mail with a trojan in attachment –Hard to prevent due to multitude of browser vulnerabilities

5 EECS 598-2 Presentation Threat Model (Part Two) Hacker needs to communicate with the compromised machine –Traditional Trojans do not work (Back Orifice, etc.) Incoming TCP requests blocked –Only two paths available: E-mail and Web (http) –E-mail is risky Logged Rapid two-way communication from remote shell can be easily detected –Web is a better way of communicating with machine Hard to detect Significantly more bandwidth is available (Without being detected)

6 EECS 598-2 Presentation Threat Model (Part Three) Attacker places a custom Trojan Horse program on the machine –Trojan calls back to the hacker’s machine on port 80 (http) at predetermined times –Two-way communication follows in the form of web transactions –If proxy server is used, transactions must appear to be legitimate Later on: Demo of callback Trojan through a proxy

7 EECS 598-2 Presentation Web Tap Design Web Tap is a Network-Based Anomaly Detection IDS Why Network-Based? –Host-Based intrusion detection systems are easily disabled Why Anomaly Detection? –Highly-skilled hackers use tools with unknown signatures

8 EECS 598-2 Presentation Web Tap Design: Implementation Web Tap implemented as proxy server extension –Records web requests from all users –Extracts important statistics –Builds profile of each user –Raises an alert when it detects non-human web browsing behavior Note: Web Tap also detects spyware and adware in addition to Trojan Horse programs

9 EECS 598-2 Presentation Web Tap Design: Statistics Web Tap calculates statistics to characterize human web browsing patterns –Delay between requests for the same site –Size of requests (mean, variance, maximum) –Bandwidth usage (upload) per site per five minutes and per day for each user –Total bandwidth usage (upload) per user per five minutes and per day

10 EECS 598-2 Presentation Experimental Setup Statistics were collected from a proxy server with over 30 users (currently have 8 days of data available) –The population group consists of college students, faculty, friends and family members –Home computers with browser configured to use remote proxy server

11 EECS 598-2 Presentation Results: Delay Times Aggregate delay times between accesses to a specific site by a specific user follow a distribution Jumps can be seen at certain times (30 seconds, 4 minutes, 5 minutes, etc.) –“Spyware” and other programs use proxy and call back regularly Trojans (and other programs) which call back regularly can be detected by examining distribution of delay times

12 EECS 598-2 Presentation

13 Results: Request Size Outbound HTTP request size alone does not follow a predictable pattern like delay time –Whether a site is being accessed by a program or a person cannot be determined File uploads of over 3-4 KB can be detected –Only ten hosts with a request over 4 KB (four over 10 KB) Useful for detecting data leaks and enforcing “no upload” policy

14 EECS 598-2 Presentation

15 Results: Bandwidth Usage Total upload bandwidth usage for single user shows activity time profile –Traffic during times when user is never active can raise an alarm –Will detect any callbacks that occur when user is usually away Bandwidth usage per site can show regular callbacks Daily upload bandwidth usage per site can detect site receiving a lot of data –An http callback Trojan will need a lot of information per day from the compromised machine

16 EECS 598-2 Presentation

17

18

19 Future Work Develop an algorithm to detect entropy in strings –Greatly reduce the number of outbound bytes measured per request English words contain much less information than random bytes –Would help isolate intense, chaotic (encrypted or compressed) bandwidth usage associated with Trojans Apply concepts from Web Tap to other protocols –Thorough intrusion detection –Useful in more open networks

20 EECS 598-2 Presentation Conclusion In a high security network, outbound http is the only good way to exfiltrate information Data exfiltration is done by a Trojan computer program using callbacks Web Tap is a Network-Based Anomaly Detection system –Human web browsing follows specific patterns which are hard to mimic –Web Tap takes advantage of patterns to hunt down Trojan and “ad/spyware” programs

21 EECS 598-2 Presentation Questions?

22 EECS 598-2 Presentation It’s Demo Time!


Download ppt "EECS 598-2 Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders."

Similar presentations


Ads by Google