Download presentation
Presentation is loading. Please wait.
1
Outsourcing Security Analysis with Anonymized Logs Jianqing Zhang, Nikita Borisov, William Yurcik 2 nd International Workshop on the Value of Security through Collaboration Friday, September 1, 2006
2
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 2 Motivation Managed Security Service Providers: Security outsourcing is a trend Security monitoring is getting more complicated and sophisticated Economical: assemble skilled security professionals Effective: shared security infrastructure across organizational boundaries Challenges Sensitive data is shared Data protected by privacy laws Valuable information to competitors Useful information to adversaries
3
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 3 Managed Security Service Provider
4
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 4 Problem Statement What are the criteria for log anonymization that sufficiently protect privacy and guarantee MSSP ’ s efficiency?
5
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 5 Contributions Case studies of common attack types based on classic logs Derive a common set of anonymization criteria Retain time interval dependence between records Pseudonymize the external IP addresses re- identifiably Pseudonymize the internal IP addresses re- identifiably and preserve some network topology information First step for privacy-preserving MSSPs
6
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 6 NetFlows and Syslogs NetFlows: network-based log Timestamps IP address pairs (source/destination) Port pairs (source/destination) … Syslog: host-based log Application level critical events
7
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 7 Which Data is Sensitive? Identity information External (source) IP Partner, common guest and adversary Internal (destination) IP Internal user System privacy & security Timestamp When the transactions happen Destination port number Services and applications hosted on the system Subnet number Internal network structure Records number Overall resource usage
8
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 8 Log Anonymization Mechanisms Timestamp anonymization Time unit annihilation Random time shifts Enumeration IP address anonymization Truncation Random permutation Prefix-preserving pseudonymization Port number anonymization Bilateral Classification Black Marker Anonymization Random permutation
9
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 9 Traffic Traces Logs: Port Scan Start timeSrcIPaddrSrcPortDstIPaddrDstPortPPkts 18:56:23.916130.241.53.23902128.146.38.15413861 18:56:23.924130.241.53.23900128.146.38.15413961 18:56:23.936130.241.53.23893128.146.38.15414061 18:56:23.944130.241.53.23891128.146.38.15414161 … Scan all ports of a single host: Source: same address, different port numbers Destination: Same addresses Different ports (sequentially) In a short time
10
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 10 Traffic Traces Logs: DoS/DDoS SYN Flood Source: same addresses, same (or different) port numbers Destination: Same addresses Same port (intended to a particular protocol or application) Protocol / Packets/ Packet size In a short time Start timeSrcIPaddrSrcPortDstIPaddrDstPortPPktsB/Pk 21:47:11.670165.132.86.201514128.146.97.7806140 21:47:11.854165.132.86.201514128.146.97.7806140 21:47:12.198165.132.86.201514128.146.97.7806140 21:47:12.338165.132.86.201514128.146.97.7806140 …
11
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 11 Anonymization Constraints on Traffic Traces Logs Timestamp (Start Time) Events interval and time dependence should be retained Anonymization Time unit annihilation Random time shifts Enumeration
12
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 12 Anonymization Constraints on Traffic Traces Logs (cont.) Source/Destination IP address Anonymized and re-identifiable Retain virtual network topology (dest.) Anonymization Truncation Random permutation (pseudonyms) Source (external) IP address Prefix-preserving pseudonymization Destination (internal) IP address
13
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 13 Anonymization Constraints on Traffic Traces Logs (cont.) Source/Destination port number Contain sensitive information More efficient if retained Anonymization Bilateral Classification Black Marker Anonymization Random permutation
14
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 14 Active Operating System Fingerprinting Syslog Syslog + Tcplog Time StampHost Name (IP)MessageSource PortDest. Port
15
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 15 Anonymization Constraints on Syslog Attributes List Anonymization Constraints Recommended Anonymization Start Time Retain events interval and time dependence Random Time Shifts Source IP AddressAnonymized and Re-identifiablePseudonyms Source PortMore efficient if retainedPseudonyms Dest. IP Address Retain virtual network topology Re-identifiable if anonymized Pseudonyms + Prefix-preserving Dest. Port More efficient if retained Re-identifiable if anonymized Pseudonyms Msg.Retained--
16
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 16 Sensitive Data After Anonymization Traffic volumes Batched upload Aggregate volumes Dummy log records Sacrifice the efficiency at MSSP False positives and false negatives Size of customer base; customer retention Change the pseudonym mappings periodically Structure of the internal network Simple pseudonyms Periodic rotation of pseudonyms Policy dependent
17
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 17 Conclusion Sensitive data should be anonymized for security monitoring Constraints on log anonymization Sensitive data leakage after anonymization and countermeasures Privacy and efficiency is a trade-off
18
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 18 Future Work Analyze other attacks Anonymization strategies for wide range of attacks Patterns of attack detection and general principles Study other log formats and types Analyze correlation of different logs across different organizations
19
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 19 Q & A Jianqing Zhang jzhang24@cs.uiuc.edu Nikita Borisov nikita@uiuc.edu William Yurcik byurcik@ncsa.uiuc.edu
20
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 20 Anonymization Constraints on Traffic Traces Logs Attributes List Anonymization Constraints Recommended Anonymization Start Time Retain events interval and time dependence Random Time Shifts Source IP AddressAnonymized and Re-identifiablePseudonyms Source PortMore efficient if retainedPseudonyms Dest. IP Address Retain virtual network topology Anonymized and Re-identifiable Pseudonyms + Prefix-preserving Dest. PortMore efficient if retained--
21
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 21 Port Scan (cont.) Portmap scan: Source: same address, different port numbers Destination: various addresses, same port (portmap daemon) In a short time Start timeSrcIPaddrSrcPortDstIPaddrDstPortPPkts 10:53:42.54165.132.86.2019781128.146.0.1611161 10:53:42.54165.132.86.2019788128.146.0.7111161 10:53:42.54165.132.86.2019791128.146.0.1111161 10:53:42.54165.132.86.2019381128.146.0.5111161 …
22
Sep. 1, 2006Outsourcing Security Analysis with Anonymized Logs 22 DoS/DDoS (cont.) Distributed SYN Flood Source: different addresses, different port numbers Destination: Same addresses Same ports (intended for a particular protocol) Protocol / Packets/ Packet size In a short time Start timeSrcIPaddrSrcPortDstIPaddrDstPortPPktsB/Pk 19:08:40.492192.1.6.6977194.20.2.213086140 19:08:40.532192.1.6.2221243194.20.2.217746140 19:08:40.720192.1.6.108114194.20.2.218696140 19:08:40.764192.1.6.159804194.20.2.210506140 …
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.