Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sleepy Watermark Tracing: An Active Network-based Intrusion Response Framework Xinyuan Wang † Douglas S. Reeves †‡ S. Felix Wu †† Jim Yuill † † Department.

Similar presentations


Presentation on theme: "Sleepy Watermark Tracing: An Active Network-based Intrusion Response Framework Xinyuan Wang † Douglas S. Reeves †‡ S. Felix Wu †† Jim Yuill † † Department."— Presentation transcript:

1 Sleepy Watermark Tracing: An Active Network-based Intrusion Response Framework Xinyuan Wang † Douglas S. Reeves †‡ S. Felix Wu †† Jim Yuill † † Department of Computer Science ‡ Department of Electrical and Computer Engineering North Carolina State University †† Department of Computer Science University of California at Davis IFIP/Sec’01 Paris, France

2 2 Network-Based Attacks Attacker Target Stepping Stones Slave Machines Master Machine Where do these attacks come from ??? We have detected attacks from the network !!!

3 3 Tracing Problem and Its Challenges What is tracing problem ? –To identify the source of network-based intrusion Why tracing is important ? –Network-based attacks can not be effectively repelled or eliminated until its source is known Challenges in tracing –Spoofed source IP address –Connections through “stepping stones” One of the hardest network security problems Focus on tracing chained connections with stepping stones

4 4 Tracing Approaches PassiveActive Host-based DIDSCallerID CIS Network-based ThumbpritingIDIP Timing-basedSWT Deviation-based Classification of Existing Tracing Approaches and SWT

5 5 Tracing Approach Classification Host-based: –tracing based on information collected from each host Network-based: –tracing based on the property of network connection: the application level content of chained connections is invariant Passive: –passively monitor and compare network traffic, need to compare every concurrent incoming connections with every concurrent outgoing connection. (clueless tracing) Active: –dynamically control what and how connections are to be correlated through customized packet processing. (tracing with clue)

6 6 Sleepy Watermark Tracing (SWT) SWT is an active network-based tracing framework –Active network seeks to increase the programmability of networks that enables user and application to dynamically control how packets are handled. SWT is “sleepy” and yet “active” SWT exploits following observations –Interactive intrusions with chained connections are bi- directional and symmetric at the granularity of connections –Application level contents are invariant across connection chains

7 7 SWT Tracing Model H1H1 H0H0 H2H2 H3H3 H4H4 H5H5 H6H6 GW 1 GW 2 GW 3 GW 4 Target injects watermark into the backward connection and “wakes up” guardian gateways along the intrusion path Intruder H i : Host GW i : Guardian Gateway H7H7 Target

8 8 SWT Concepts and Assumptions Basic SWT concepts –Guardian Gateway (nearest router) Incoming Guardian Gateway Outgoing Guardian Gateway Guardian Gateway Set –Guarded Host Basic SWT assumptions –Intrusions are interactive and bi-directional –Routers are trust worthy and hosts are not trust worthy –Each host has a single SWT guardian gateway –There is no link-to-link encryption

9 9 SWT Architecture Host Normal Traffic Watermarked Traffic Active Tracing Protocol Watermark Correlation Active Tracing SWT Guardian Gateway IDS Sleepy Intrusion Response Active Tracing Watermark Enabled Application SWT Guarded Host SWT Subsystem

10 10 SWT Components SWT supporting components –IDS Application level interface to any Intrusion Detection System –Watermark-enabled application Server applications that have been modified to be able to “inject” arbitrary watermark at request SWT components –Sleepy Intrusion Response (SIR) Controls and coordinates overall SWT intrusion tracing –Watermark Correlation (WMC) Matching adjacent connections through watermark –Active Tracing (AT) “Wakes up” and coordinate SWT guardian gateways

11 11 Watermark A small piece of information that can be used to uniquely identify a connection Application specific Invisible to end users (telnet, rlogin etc) –[Identifying part] + [covering part] “intruder\b\b\b\b\b\b\b\b \b” –Original “Su” –[Original] + [watermark] “Suintruder\b\b\b\b\b\b\b\b \b” Collision probability

12 12 SWT Analysis SWT Advantages –Separate intrusion tracing from intrusion detection –Does not need to record all the concurrent connections –Requires no clock synchronization –Trace through connection chain within single keystroke –Can trace through connection chain even when the intruder is silent Robustness and security Efficiency Scalability Applicability Intrusiveness

13 13 SWT Performance SWT Guardian GW Pentium 233Mhz FreeBSD 4.0 100 Mbps Measure latency FreeBSD kernel IP forwarding without SWT SWT configured to by pass traffic Divert socket IP forwarding without SWT SWT configured to scan traffic

14 14 SWT Latency Latency overhead due to SWT itself is about 50 µs

15 15 Future Work New form of watermark Correlate encrypted connection chains (ssh, IPSEC etc) More watermark-enabled applications Transparent proxy for watermark injection Tracing based active intrusion response –What can be done once we have identified the intrusion source ?


Download ppt "Sleepy Watermark Tracing: An Active Network-based Intrusion Response Framework Xinyuan Wang † Douglas S. Reeves †‡ S. Felix Wu †† Jim Yuill † † Department."

Similar presentations


Ads by Google