Download presentation
Presentation is loading. Please wait.
Published byHector Copeland Modified over 9 years ago
1
Saturday, May 17, 2008 Generating signatures for zero-day network attacks Pascal Gamper Daniela Brauckhoff Bernhard Tellenbach
2
Saturday, May 17, 2008 Pascal Gamper 2 Outline Motivation Problem Statement Automated Signature Generation – Overview The NoAH approach Attack Detection Attack Analysis Signature Generation
3
Saturday, May 17, 2008 Pascal Gamper 3 Motivation: The dynamics of (In)security Source: “The Dynamics of (In)Security“, Stefan Frei, ETH Zurich, BlackHat 2006 90 % probability for available 0-day exploits
4
Saturday, May 17, 2008 Pascal Gamper 4 Problem Statement Defending against 0-day attacks: Intrusion Detection System (IDS) Separate benign and malicious network traffic Host- or Network-based signatures Most signatures for IDS are hand-craftet by professionals Zero-day exploits make manual signature generation useless Problem: Manual signature generation is too slow! Options?
5
Saturday, May 17, 2008 Pascal Gamper 5 Techniques for automated signature generation Overview
6
Saturday, May 17, 2008 Pascal Gamper 6 Building Blocks of an ASG System Attack Detector Analysis Engine Correlator Attack Detector Analysis Engine Site 1 Site N raw data Signature Generator refined attack vector information attack vector information transformed attack vector information
7
Saturday, May 17, 2008 Pascal Gamper 7 The NoAH Approach EU Project NoAH (Network of Affined Honeypots)
8
Saturday, May 17, 2008 Pascal Gamper 8 Goals NoAH aims at automated detection of unknown attacks generation of signatures to counter 0-day attacks Generate signatures for common IDS Install full-scale infrastructure across Europe Target audience: ISP‘s, NREN‘s, researchers
9
Saturday, May 17, 2008 Pascal Gamper 9 Attack Detection
10
Saturday, May 17, 2008 Pascal Gamper 10 NoAH Architecture: Attack Detector Argos Detection technique (Argos): OS independent memory tainting (x86 emulator) > Scope of NoAH: Remote attacks that do not require a human in the loop Host OS Emulated Hardware Guest OS RAM 0xAAA NIC CPU Network Exec
11
Saturday, May 17, 2008 Pascal Gamper 11 Attack Analysis
12
Saturday, May 17, 2008 Pascal Gamper 12 Combining Analysis Engines Different analysis engines (Extractors) which Analyse attack information from different sources Extractors can depend on each other Meta-signature describes entire set of available attack information Quality estimation of meta-signature based on Which extractors succeeded Value and amount of extracted information
13
Saturday, May 17, 2008 Pascal Gamper 13 Combining host- and network-based analysis Extractor #1: Host-based information from Argos Identifies memory content relevant for the attack Identifies OS and attacked process Identifies network traffic bytes involved Extractor #2: Network-based information from Protocol State Tracker Protocol field(s) containing network bytes involved Communication/Protocol state history
14
Saturday, May 17, 2008 Pascal Gamper 14 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker MySQL Database Signature Generator Main process Snitch Thread Argos.netlog Argos.csi.x Network Socket IPC File I/O Network TrackerOutput.dat TrackerDump.dat Snitch Perl Script Argos Control Socket Extractor Thread Argos Extractor Tracker Extractor
15
Saturday, May 17, 2008 Pascal Gamper 15 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker MySQL Database Signature Generator Main process Snitch Thread Argos.netlog Argos.csi.x Network Socket IPC File I/O Network TrackerOutput.dat TrackerDump.dat Snitch Perl Script Argos Control Socket Extractor Thread Argos Extractor Tracker Extractor
16
Saturday, May 17, 2008 Pascal Gamper 16 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker MySQL Database Signature Generator Main process Snitch Thread Argos.netlog Argos.csi.x Network Socket IPC File I/O Network TrackerOutput.dat TrackerDump.dat Snitch Perl Script Argos Control Socket Extractor Thread Argos Extractor Tracker Extractor
17
Saturday, May 17, 2008 Pascal Gamper 17 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker MySQL Database Signature Generator Main process Snitch Thread Argos.netlog Argos.csi.x Network Socket IPC File I/O Network TrackerOutput.dat TrackerDump.dat Snitch Perl Script Argos Control Socket Extractor Thread Argos Extractor Tracker Extractor
18
Saturday, May 17, 2008 Pascal Gamper 18 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker MySQL Database Signature Generator Main process Snitch Thread Network Socket IPC File I/O Network TrackerOutput.dat TrackerDump.dat Snitch Perl Script Argos Control Socket Extractor Thread Tracker Extractor Argos.netlog Argos.csi.x Argos Extractor
19
Saturday, May 17, 2008 Pascal Gamper 19 Basic Architecture of the entire ASG System Honeypot Network Protocol State Tracker Database Signature Generator Main process Snitch Thread Network Socket IPC File I/O Network Snitch Perl Script Argos Control Socket Extractor Thread Argos.netlog Argos.csi.x Argos Extractor Meta-signature TrackerOutput.dat TrackerDump.dat Tracker Extractor
20
Saturday, May 17, 2008 Pascal Gamper 20 Network Protocol State Tracker Tracks the network connections towards one or more honeypot systems Logs protocol states for each packet User-defined packet and connection analysis possible Is highly configurable by relying on various libraries State machine configurations currently available for IP, TCP/UDP, FTP
21
Saturday, May 17, 2008 Pascal Gamper 21 Libraries NetBee library Developed by NetGroup at Politecnico di Torino Components for different types of packet processing We integrated Packet Decoding functionality into Tracker Netprotofsm Finite state machine library for describing network protocols Our approach is based on work by J. van Gurp and J. Bosch Features: -Protocol state machines defined by XML files -Resource-gentle -Flexible timer mechanism (schedule events, define timeouts) -Implement custom actions
22
Saturday, May 17, 2008 Pascal Gamper 22 Architecture State Machine (libnetprotofsm) Network LogActionReplayAction Connection State Log File EventData LogReader PacketDecoder Connection State Log File Replayer Capturing Protocol Specification File Network Pcap library NetBee library netprotofsm library Replayer State Tracker
23
Saturday, May 17, 2008 Pascal Gamper 23 Example: Attack information extracted Information Memory Dump Argos INetwork PacketExtractor #2 Protocol Connection State: TCP: Connection established FTP: Login, User identification 04 F2 A6 00 Tainted data which is about to be used in instruction execution Snitch perl script Argos II -Operating system: Win2000 -Attacked service / program: WAR-FTPD Information Extractor #1 IP TCP FTP 04 F2 A6 00 Position in network packet Packet Field Decoding: FTP: bytes in USER field Dest Address Src Address Dest PortSrc Port USER Payload data
24
Saturday, May 17, 2008 Pascal Gamper 24 Signature Generation
25
Saturday, May 17, 2008 Pascal Gamper 25 Signature Generation Flow 1. Generate meta-signature 2. Determine signature quality 4. Save to database 5. Use Adapters to create specific signatures 6. Store, (correlate and/or distribute) adapted signatures
26
Saturday, May 17, 2008 Pascal Gamper 26 Snort as Signature Format SNORT for Proof-of-Concept SNORT is open source and well-known Simple signature format Implications Only a part of extracted attack information can be used, for example -We cannot include information about attacked program
27
Saturday, May 17, 2008 Pascal Gamper 27 Generated signature (WAR-FTPD example) alert tcp any any-> any 21 (msg: “(NoAH) RET via FTP protocol, USER command in war-ftpd.exe(win2k)”; flow: established, from_client; content:"USER"; content:!"|0D 0A|"; offset: 5; depth: 465;)
28
Saturday, May 17, 2008 Pascal Gamper 28 Signature Properties (WAR-FTPD example) alert tcp any any-> any 21 (msg: “(NoAH) RET via FTP protocol, USER command in war-ftpd.exe(win2k)”; flow: established, from_client; content:"USER"; content:!"|0D 0A|"; offset: 5; depth: 465;) Connection state information
29
Saturday, May 17, 2008 Pascal Gamper 29 Signature Properties (WAR-FTPD example) alert tcp any any-> any 21 (msg: “(NoAH) RET via FTP protocol, USER command in war-ftpd.exe(win2k)”; flow: established, from_client; content:"USER"; content:!"|0D 0A|"; offset: 5; depth: 465;) State transition trigger
30
Saturday, May 17, 2008 Pascal Gamper 30 Signature Properties (WAR-FTPD example) alert tcp any any-> any 21 (msg: “(NoAH) RET via FTP protocol, USER command in war-ftpd.exe(win2k)”; flow: established, from_client; content:"USER"; content:!"|0D 0A|"; offset: 5; depth: 465;) Vulnerable field(s)
31
Saturday, May 17, 2008 Pascal Gamper 31 Conclusion Our ASG system generates signatures with almost zero false positives For remote code injection attacks If full amount of attack information is extracted Signature describes the vulnerability of the application Protect server applications from buffer overflows in arbitrary protocols and fields > Our signatures can compete with other approaches including manually created reference signatures
32
Saturday, May 17, 2008 Pascal Gamper 32 Questions?
33
Saturday, May 17, 2008 Pascal Gamper 33 Evaluation Prototype implementation IP, TCP, UDP, FTP protocol state machines Examplary signature generation tests Protocol context aware signatures: Average total generation time: 1,64 s Few false positives LCS signatures (fallback strategy): Average total generation time: 3,46 s High rate of false positives depending on strings
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.