60
Countering Denial of Information Attacks with Network Visualization Gregory Conti www.cc.gatech.edu/~conti [email protected] p://plus.maths.org/issue23/editorial/information.jpg

Countering Denial of Information Attacks with Network Visualization

  • Upload
    zoie

  • View
    31

  • Download
    1

Embed Size (px)

DESCRIPTION

Countering Denial of Information Attacks with Network Visualization. Gregory Conti www.cc.gatech.edu/~conti [email protected]. http://plus.maths.org/issue23/editorial/information.jpg. Disclaimer. - PowerPoint PPT Presentation

Citation preview

Page 1: Countering Denial of  Information Attacks with  Network Visualization

Countering Denial of Information Attacks with Network Visualization

Gregory Conti

www.cc.gatech.edu/~conti

[email protected]

http://plus.maths.org/issue23/editorial/information.jpg

Page 2: Countering Denial of  Information Attacks with  Network Visualization

Disclaimer

The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. 

image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm

Page 3: Countering Denial of  Information Attacks with  Network Visualization

Denial of Information Attacks:

Intentional Attacks that overwhelm the human or otherwise alter their decision making

http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg

Page 4: Countering Denial of  Information Attacks with  Network Visualization

http://cagle.slate.msn.com/news/EvilEmailHackers/main.asp

Page 5: Countering Denial of  Information Attacks with  Network Visualization

The Problem of Information Growth

• The surface WWW contains ~170TB (17xLOC) • IM generates five billion messages a day (750GB),

or 274 terabytes a year. • Email generates about 400,000 TB/year. • P2P file exchange on the Internet is growing

rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files).

http://www.sims.berkeley.edu/research/projects/how-much-info-2003/

Page 6: Countering Denial of  Information Attacks with  Network Visualization

Applying the Model & Taxonomy…

http://www.butterfly-insect.com/butterfly-insect/graphic/education-pic-worldlife-on.gif

Page 7: Countering Denial of  Information Attacks with  Network Visualization

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 8: Countering Denial of  Information Attacks with  Network Visualization

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 9: Countering Denial of  Information Attacks with  Network Visualization

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

System Model

Page 10: Countering Denial of  Information Attacks with  Network Visualization

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

very small text

exploit round off algorithm

trigger many alerts

ExampleDoI

Attacks

misleadingadvertisements

spoof browser

Page 11: Countering Denial of  Information Attacks with  Network Visualization

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

TCP Damping

UsableSecurity

Eliza Spam Responder

Decompression Bombs

ExampleDoI

Defenses

ComputationalPuzzle Solving

Page 12: Countering Denial of  Information Attacks with  Network Visualization

Orient

Observe

Act

Decide

Scan Subject Line

SpamDelete

Confirm DeletionSuccessful

Not Spam

No Observation

No Action

OverheadNumber of Email

x Time to Decide

OverheadNumber of Spam x Time to Delete

OverheadNumber of Spam

x Time to Observe

Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan))

OverheadNumber of Email

x Time to Scan

Page 13: Countering Denial of  Information Attacks with  Network Visualization

For more information…

G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published)

email me…

Page 14: Countering Denial of  Information Attacks with  Network Visualization

DoI Countermeasures in the Network Security Domain

Page 15: Countering Denial of  Information Attacks with  Network Visualization

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

http://en.wikipedia.org/wiki/Information_visualization

Page 16: Countering Denial of  Information Attacks with  Network Visualization

rumint v.51

Page 17: Countering Denial of  Information Attacks with  Network Visualization
Page 18: Countering Denial of  Information Attacks with  Network Visualization

nmap 3 (RH8)

NMapWin 3 (XP)

SuperScan 3.0 (XP)

SuperScan 4.0 (XP)

nmap 3 UDP (RH8)

nmap 3.5 (XP)

scanline 1.01 (XP)

nikto 1.32 (XP)

Page 19: Countering Denial of  Information Attacks with  Network Visualization

For more information… G. Conti and K. Abdullah; "

Passive Visual Fingerprinting of Network Attack Tools;" ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004.

--Talk PPT Slides

see www.cc.gatech.edu/~conti and www.rumint.org for the tool

G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004.

--Talk PPT Slides --Classical InfoVis Survey PPT Slides--Security InfoVis Survey PPT Slides

Page 20: Countering Denial of  Information Attacks with  Network Visualization

Last year at DEFCON

First question…

How do we attack it?

Page 21: Countering Denial of  Information Attacks with  Network Visualization

Malicious Visualizations…

Page 22: Countering Denial of  Information Attacks with  Network Visualization

Pokemon

http://www.miowebitalia.com/desktop/cartoni/pokemon.jpg

Page 23: Countering Denial of  Information Attacks with  Network Visualization

Visual Information Overload (perception)

Page 24: Countering Denial of  Information Attacks with  Network Visualization

Attack Fading(memory)

Image: http://www.inf.uct.cl/~amellado/gestion_en_linux/etherape.jpg

http://etherape.sourceforge.net/

Page 25: Countering Denial of  Information Attacks with  Network Visualization

Motion Induced Blindness(perception)

http://www.keck.ucsf.edu/~yoram/mib-basic.html

Page 26: Countering Denial of  Information Attacks with  Network Visualization

Optical Illusions (perception)

http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html

Page 27: Countering Denial of  Information Attacks with  Network Visualization

Crying Wolf…(cognitive/motor)

• Snot vs. Snort

Page 28: Countering Denial of  Information Attacks with  Network Visualization

CDX 2003 DatasetX = TimeY = Destination IPZ = Destination Port

Labeling Attack (algorithm)

Page 29: Countering Denial of  Information Attacks with  Network Visualization

AutoScale Attack/Force User to Zoom(algorithm)

Page 30: Countering Denial of  Information Attacks with  Network Visualization

Precision Attack(algorithm)

http://developers.slashdot.org/article.pl?sid=04/06/01/1747223&mode=thread&tid=126&tid=172

http://www.nersc.gov/nusers/security/Cube.jpg

Page 31: Countering Denial of  Information Attacks with  Network Visualization

Occlusion(visualization design)

Page 32: Countering Denial of  Information Attacks with  Network Visualization

Jamming (visualization design)

Page 33: Countering Denial of  Information Attacks with  Network Visualization

For more information…

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. (submitted, under review)

See also www.rumint.org for the tool.

email me…

Page 34: Countering Denial of  Information Attacks with  Network Visualization

rumint v 1.15 beta

Page 35: Countering Denial of  Information Attacks with  Network Visualization

Net

wor

k pa

cket

s ov

er ti

me

Bit 0, Bit 1, Bit 2 Length of packet - 1

Page 36: Countering Denial of  Information Attacks with  Network Visualization

rumint 1.15 tool overview

network monitoring mode (left), clicking the small pane brings up the detailed analysis view for that visualization.

Page 37: Countering Denial of  Information Attacks with  Network Visualization

So what do you think…

Page 38: Countering Denial of  Information Attacks with  Network Visualization
Page 39: Countering Denial of  Information Attacks with  Network Visualization

Visual exploration of binary objects…

Page 40: Countering Denial of  Information Attacks with  Network Visualization

Reverse Engineering

• IDA Pro Dissassembler and Debugger

http://www.datarescue.com/idabase/

Page 41: Countering Denial of  Information Attacks with  Network Visualization

Textual vs. Visual Exploration

Page 42: Countering Denial of  Information Attacks with  Network Visualization

binaryexplorer.exe

Page 43: Countering Denial of  Information Attacks with  Network Visualization

visualexplorer.exe(visual studio)

calc.exe(unknown compiler)

rumint.exe(visual studio)

regedit.exe(unkown compiler)

Comparing Executable Binaries(1 bit per pixel)

mozillafirebird.exe(unknown compiler)

cdex.exe(unknown compiler)

apache.exe(unknown compiler)

ethereal.exe(unknown compiler)

Page 44: Countering Denial of  Information Attacks with  Network Visualization

image.bmp image.zipimage.jpg image.pae(encrypted)

Comparing Image Files(1 bit per pixel)

Page 45: Countering Denial of  Information Attacks with  Network Visualization

pash.mp3 disguises.mp3the.mp3

Comparing mp3 files(1 bit per pixel)

Page 46: Countering Denial of  Information Attacks with  Network Visualization

secvisw/Sven Krasser, Julian Grizzard, Jeff Gribschaw and Henry Owen (Georgia Tech)

Page 47: Countering Denial of  Information Attacks with  Network Visualization

Overview of Visualization

age

age

pa

cke

t si

ze

pa

cke

tsi

zecolor:protocol

color:protocol

0.0.0.0

65535255.255.255.255

0

timetime now now

Page 48: Countering Denial of  Information Attacks with  Network Visualization

Overview of Visualization

age

age

pa

cke

t si

ze

pa

cke

tsi

ze

color:protocol

color:protocol

0.0.0.0

65535255.255.255.255

0

timetime now now

Page 49: Countering Denial of  Information Attacks with  Network Visualization

Overview and Detail

Page 50: Countering Denial of  Information Attacks with  Network Visualization

Routine Honeynet Traffic(baseline)

Page 51: Countering Denial of  Information Attacks with  Network Visualization

Compromised Honeypot

Page 52: Countering Denial of  Information Attacks with  Network Visualization

Slammer Worm

Page 53: Countering Denial of  Information Attacks with  Network Visualization

Constant Bitrate UDP Traffic

Page 54: Countering Denial of  Information Attacks with  Network Visualization

Port Sweep

Page 55: Countering Denial of  Information Attacks with  Network Visualization

System Performance

Page 56: Countering Denial of  Information Attacks with  Network Visualization

For more information…

S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005. (submitted)

email me…

Page 57: Countering Denial of  Information Attacks with  Network Visualization

Demos

• binary exploration

• rumint 1.15

• secvis

Page 58: Countering Denial of  Information Attacks with  Network Visualization

Questions?

Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg

Gregory [email protected]/~conti

Page 59: Countering Denial of  Information Attacks with  Network Visualization

Backup Slides

Page 60: Countering Denial of  Information Attacks with  Network Visualization

External IP to Internal Port

6 Oct 04 13 Oct 04 20 Oct 04 27 Oct 04 30 Nov 04

One Week Snapshots One Month