traffic monitoring - apricot · pdf filelebah net architecture network activity profiling act...

31
Traffic Monitoring : Experience

Upload: ngoquynh

Post on 19-Feb-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic Monitoring :

Experience�� ������������������� �����������������

������������������������

Page 2: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Objectives

• To understand who and/or what the threats are

• To understand “attacker” operation� Originating Host� Motives (purpose of access)� Tools and Techniques� Who (personality)

• To be able to capture and predict new attacks –pattern and trend

• To be able to produce new attack identifications

Lebah Net

Page 3: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

How it Works

Management Console

Network Intrusion Detection System

Honeypot1 Honeypot2 Honeypot3

Log

NIDS listens in promiscuous mode all activities carried out within the network to and from the honeypots. All binaries of the logs are dumped into the Database.

The Log Server retains the logs for a certain period of time and backed up to external media periodically.

The Management console is used to view the logs to conduct analysis of activities.

The Honeypots consists of hosts setup with certain vulnerabilities introduced. It emulates various platforms and has mechanisms to contain the perpetrator from launching attacks to other external systems.

Lebah Net

Page 4: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Architecture

Page 5: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Network Activity Profiling

Act of collecting statisticsIntrusion as deviations from normal behaviorChecking

Service running vs Network traffic

Look forActivity that has not been seen beforeActivity level that is greater than normal

Page 6: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Analyzing Data

Well known network signaturesIDS – Snort, BroPcap filters

Look for behavioral changesQuiet system suddenly scanningTrigger on initiated outbound traffic

Examine captured binariesDisassemble

Page 7: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic Characteristics

ProtocolsPortsSuccess and FailuresPeers of communicationTraffic Volume

Page 8: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Network Behavior

Volume of TrafficTraffic Pattern

Page 9: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Volume of Traffic

Most worm uses logistic growth model.Host is brought into the network with scans and attacks.Best measure at router or firewall

Page 10: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic Pattern

Change of behavior.Worm will make host acting ‘abnormal’.Look for its presence.

Page 11: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Techniques

Traffic AnalysisHoneypotsBlack Hole/Sink Hole

Page 12: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic Capture Method

TcpdumpSNMPFlow-Based

Page 13: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Correlation

Correlation – to find connectedness of events within the set.Autocorrelation

Events of the same type

CrosscorrelationInteraction of 2 different events

Page 14: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Honeypots and Black Hole Monitoring

Effectively listen to the networkHoneypots – functional systemBlack Hole – unused networkCommon is – any activity appear on this domain is in the interest.

Page 15: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Honeypots

TechnologyLow LevelHigh Level

Risk FactorReal attackStill need compliment technology on the network analysis

Page 16: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Black Hole

Unused IP spaceBackscatterAdvertise routeView to the network

Page 17: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Packet Capture and Analysis

2 ways of Black Hole1. Export flow logs from routing device2. Passive network monitor

Page 18: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic Analysis Conclusion

Works against most worm especially those that uses active target and exponential growth.Required lengthy period of monitoring and understandingWorm that move sufficiently slow will become undetected

Page 19: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

After all

Which is the best ?False positive or False negative

Page 20: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Attacker Tools

Page 21: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Launching Pad - DDOS

Jun 19 03:57:26 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 151.9.116.99

Jun 19 03:57:31 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 151.9.116.99

Jun 19 03:57:36 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 140.112.38.9

Jun 19 03:57:41 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 140.112.38.9

Jun 19 03:58:37 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 151.9.116.99

Jun 19 03:58:42 ips hogwash: [1:1855:2] Packet Dropped-DDOS Stacheldraht agent->handler (skillz) {ICMP} x.y.z.117 - > 151.9.116.99

Page 22: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Measuring Worm

Page 23: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic to 1 Host

Page 24: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Traffic to Multiple Host

Page 25: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Source IP Address Distribution

Page 26: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Early Warning ?

Page 27: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Aguri Data

Source - http://tracer.csl.sony.co.jp/mawi/aguri-ports-B/2001/

Page 28: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Aguri Data

http://tracer.csl.sony.co.jp/mawi/aguri-ports-B/2001/20010301-dst.png

Page 29: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

Value of Research Output

Research on tools, tactics, and motives of the attacker.Development of:

Incident Response Techniques and ProceduresIntrusion AnalysisForensic AnalysisThreat AnalysisMotivation and ProfilingPerimeter Defense Tools

Page 30: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

In Development

Active ResponderActive Defense

Page 31: Traffic Monitoring - APRICOT · PDF fileLebah Net Architecture Network Activity Profiling Act of collecting statistics Intrusion as deviations from normal

���������� ��������������������� �������������������� ������ �

��� !"#$��� !"#$

�������������������� �������������������������������� ������������

����������������������������������������

������������� ��������������� ��

������ ��!�"## �$#�$������ ��!�"## �$#�$

�%��� ��!�"## ��"&��%��� ��!�"## ��"&�

'�(������'�(��������� �))'''*�����*���*����� �))'''*�����*���*��

��� �))'''*������*���*����� �))'''*������*���*��

����+������,�-������������+������,�-�����������.�����*���*�����.�����*���*��

/����,���0�����1� ��������/����,���0�����1� ��������������.������*���*��������.������*���*��