30
W2SP2007 – Oakland, CA – May 24, 2007 Detecting Deception in the Context of Web 2.0. Annarita Giani, EECS, University of California, Berkeley, CA Paul Thompson, CS Dept. Dartmouth College, Hanover, NH

Detecting Deception in the Context of Web 2.0

  • Upload
    amory

  • View
    30

  • Download
    0

Embed Size (px)

DESCRIPTION

Detecting Deception in the Context of Web 2.0. Annarita Giani , EECS, University of California, Berkeley, CA Paul Thompson, CS Dept. Dartmouth College, Hanover, NH. Outline. Motivation and Terminology Process Query System (PQS) Approach Detection of a complex attack - PowerPoint PPT Presentation

Citation preview

Page 1: Detecting Deception in the Context of Web 2.0

W2SP2007 – Oakland, CA – May 24, 2007

Detecting Deceptionin the Context of Web 2.0.

Annarita Giani, EECS, University of California, Berkeley, CA

Paul Thompson, CS Dept. Dartmouth College, Hanover, NH

Page 2: Detecting Deception in the Context of Web 2.0

2W2SP2007 – Oakland, CA – May 24, 2007

Outline

1.Motivation and Terminology

2.Process Query System (PQS) Approach

3.Detection of a complex attack

4.Conclusion and Acknowledgments

Page 3: Detecting Deception in the Context of Web 2.0

3W2SP2007 – Oakland, CA – May 24, 2007

Cognitive Hacking

The user's attention is focused on the channel. The attacker exploits this fact and uses malicious information in the channel to mislead her.

Misleading information from a web site

Misleading information from a web site

2

1

Victim: Acts on the information from the web site

3Attacker: Obtains advantages from user actions

Attacker: Makes a fake web site

4

Page 4: Detecting Deception in the Context of Web 2.0

4W2SP2007 – Oakland, CA – May 24, 2007

MISINFORMATION – Lebed caseMISINFORMATION – Lebed case

The law ??

?

Jonathan Lebed.He spread fake rumors about stocks.

Investors driven to buy shares of that stock inflating its price

The SEC wanted to prosecuted him for stock fraud. Was allowed to keep $500,000 from his “illegal” stock proceeds.

"Subj: THE MOST UNDERVALUED STOCK EVER "Date: 2/03/00 3:43pm Pacific Standard Time "From: LebedTG1

"FTEC is starting to break out! Next week, this thing will EXPLODE. . . . "Currently FTEC is trading for just $2 1/2! I am expecting to see FTEC at $20 VERY SOON. "Let me explain why. . . . "The FTEC offices are extremely busy. . . . I am hearing that a number of HUGE deals are being worked on. Once we get some news from FTEC and the word gets out about the company . . . it will take-off to MUCH HIGHER LEVELS! "I see little risk when purchasing FTEC at these DIRT-CHEAP PRICES. FTEC is making TREMENDOUS PROFITS and is trading UNDER BOOK VALUE!!!"

Page 5: Detecting Deception in the Context of Web 2.0

5W2SP2007 – Oakland, CA – May 24, 2007

Covert Channels

The user's attention is unaware of the channel. The attacker uses a medium not perceived as a communication channel to transfer information.

User: does not see inter-packet delay as a communication channel and does not notice any communication.

User: does not see inter-packet delay as a communication channel and does not notice any communication.

Attacker: Codes data into inter-packet delays, taking care to avoid drawing the attention of the user.

data

1

2

Page 6: Detecting Deception in the Context of Web 2.0

6W2SP2007 – Oakland, CA – May 24, 2007

Phishing

The user's attention is attracted by the exploit. The information is used to lure the victim into using a new channel and then to create a false perception of reality with the goal of exploiting the user’s behavior.

Visit http://www.cit1zensbank.com

First name,Last nameAccount #SSN

Bogus web site

First name,Last nameAccount NumberSSN

1

3

2

Misleading email to get user attention

Misleading email to get user attention

Send a fake email

4

Page 7: Detecting Deception in the Context of Web 2.0

7W2SP2007 – Oakland, CA – May 24, 2007

Cognitive Channels

SERVER CLIENT USER

Network Channel

Cognitive Channel

Focus of the current protection and detection approaches

A cognitive channel is a communication channel between the user and the technology being used. It conveys what the user sees, reads, hears, types, etc.

The cognitive channel is the weakest link in the whole framework. Little investigation has been done on detecting attacks on this channel.

Page 8: Detecting Deception in the Context of Web 2.0

8W2SP2007 – Oakland, CA – May 24, 2007

Cognitive Attacks

Cognitive attacks are computer attacks over a cognitive channel. They exploit the attention of the user to manipulate her perception of reality and/or gain advantages.

Cognitive attacks are computer attacks over a cognitive channel. They exploit the attention of the user to manipulate her perception of reality and/or gain advantages.

COGNITIVE HACKING. The user’s attention is focused on the channel. The attacker exploits this fact and uses malicious information to mislead her.

COVERT CHANNELS. The user is unaware of the channel. The attacker uses a medium not perceived as a communication channel to transfer information.

PHISHING. The user's attention is attracted by the exploit. The information is used to lure the victim into using a new channel and then to create a false perception of reality with the goal of exploiting the user’s behavior.

Our definition is from an engineering point of view.

Page 9: Detecting Deception in the Context of Web 2.0

9W2SP2007 – Oakland, CA – May 24, 2007

The Need to Correlate Events

Large amount of sensors for network monitoring– Intrusion Detection Systems– Network traces– File Integrity Checkers

Large amount of Alerts– Overloaded operators– Hard to make sense of alarms

Need a principled way of combining alerts– Reduce false alarms– Discover multistage attacks

Page 10: Detecting Deception in the Context of Web 2.0

10W2SP2007 – Oakland, CA – May 24, 2007

Outline

1.Motivation and Terminology

2.Process Query System (PQS) Approach

3.Detection of a complex attack

4.Conclusion and Acknowledgments

Page 11: Detecting Deception in the Context of Web 2.0

11W2SP2007 – Oakland, CA – May 24, 2007

Process Query System

Observable events coming from sensorsObservable events coming from sensors

ModelsModels

Tracking Algorithms

Tracking Algorithms

PQSENGINE

HypothesisHypothesis

Page 12: Detecting Deception in the Context of Web 2.0

12W2SP2007 – Oakland, CA – May 24, 2007

Framework for Process Detection

Multiple Processes

router failure

wormscan

Events

…….

Time

An Environment

consists of

that produce

Unlabelled Sensor Reports

…….

Time

thatare

seenas

Hypothesis 1

Track 1

Track 2

Track 3

Hypothesis 2

that PQS resolves into

that detect complex attacks and anticipate the next steps

129.170.46.3 is at high risk129.170.46.33 is a stepping stone......

that are

usedfor

control 1

2

3

4

5

6Indictors and Warnings

Real World Process Detection (PQS)

Hypotheses

FO

RW

AR

D P

RO

BLE

M

INV

ER

SE

PR

OB

LEM

Page 13: Detecting Deception in the Context of Web 2.0

13W2SP2007 – Oakland, CA – May 24, 2007

Flow and Covert Channel Sensor

Samba

SnortTripwire

SnortIP Tables

Exfiltration

Data Access

Scanning

Infection

PQS

PQS

PQS

PQS

PQS

TIER 1 Models

TIER 1 Observations

TIER 1 Hypothesis

TIER 2 Models

TIER 2 Observations

TIER 2 Hypothesis

Hierarchical PQS Architecture

Events

Events

Events

Events

More ComplexModels

RESULTS

Page 14: Detecting Deception in the Context of Web 2.0

14W2SP2007 – Oakland, CA – May 24, 2007

Causal - next state depends only on the pastHidden – states are not directly observedObservable - observations conditioned on hidden state are independent of previous states

Example. Hidden Markov Model

N StatesM Observation symbolsState transition Probability Matrix, AObservation Symbols Distribution, BInitial State Distribution

HDESM models are general

Hidden Discrete Event System Models

Dynamical systems with discrete state spaces that are:

Page 15: Detecting Deception in the Context of Web 2.0

15W2SP2007 – Oakland, CA – May 24, 2007

HDESM Process Detection Problem

Identifying and tracking several (casual discrete state) stochastic processes (HDESM’s) that are only partially observable.

Discrete Sources Separation: :Determine the “most likely” process-to-observation association

Hidden State Estimation: Determine the “best” hidden states sequence of a particular process that accounts for a given sequence of observations.

TWO MAIN CLASSES OF PROBLEMS

Page 16: Detecting Deception in the Context of Web 2.0

16W2SP2007 – Oakland, CA – May 24, 2007

Discrete Source Separation Problem

3 states + transition probabilitiesn observable events: a,b,c,d,e,…Pr( state | observable event ) given/known

Observed event sequence:

….abcbbbaaaababbabcccbdddbebdbabcbabe….

Catalog ofProcesses

Which combination of which process models “best” accounts for the observations?

HDESM Example (HMM):

Events not associated with a known process are “ANOMALIES”.

Page 17: Detecting Deception in the Context of Web 2.0

17W2SP2007 – Oakland, CA – May 24, 2007

An analogy....

What does

hbeolnjouolor

mean?

Events are: h b e o l n j o u o l o r

Models = French + English words (+ grammars!)

hbeolnjoulor = hello + bonjour

Intermediate hypotheses include tracks: ho + be

Page 18: Detecting Deception in the Context of Web 2.0

18W2SP2007 – Oakland, CA – May 24, 2007

Internet

DMZ

WS

BRIDGE

WinXP LINUX

WWW Mail

DIB:s

BGP

IPTables

Snort

Tripwire

Samhain

Worm

ExfiltrationPhishing

PQS in Computer Security

5

87

12

12

PQSENGINE

observationsobservations

Page 19: Detecting Deception in the Context of Web 2.0

19W2SP2007 – Oakland, CA – May 24, 2007

Outline

1.Motivation and Terminology

2.Process Query System (PQS) Approach

3.Detection of a complex attack

4.Conclusion and Acknowledgments

Page 20: Detecting Deception in the Context of Web 2.0

20W2SP2007 – Oakland, CA – May 24, 2007

Complex Phishing Attack Steps

attacks the victim

100.10.20.9

Victim

100.20.3.127

Attacker

165.17.8.126

Web page, Madame X

up

loa

ds

som

e co

de

downloads some data

Stepping stone

51.251.22.183

records username and password

… as usual browses the web and …

…. visits a web page. inserts username and password.(the same used to access his machine)

acc

esse

s u

ser

mac

hin

e u

sin

g u

sern

ame

and

pas

sw

ord

1

5

43

2

6

Page 21: Detecting Deception in the Context of Web 2.0

21W2SP2007 – Oakland, CA – May 24, 2007

Complex Phishing Attack Observables

SOURCE

4. ATTEMPT (ATTACK RESPONSE)

SNORT POTENTIAL BAD TRAFFIC

100.10.20.9

Victim

100.20.3.127

Attacker

165.17.8.126

Web Server used- Madame XAttacker

2. A

TT

EM

PT

S

NO

RT

SS

H (

Po

licy

Vio

lati

on

)N

ON

-ST

AN

DA

RD

-PR

OT

OC

OL

3. D

AT

A U

PL

OA

D

FL

OW

SE

NS

OR

5. DATA DOWNLOAD FLOW SENSOR

1. RECON SNORT: KICKASS_PORNDRAGON: PORN HARDCORE

SOURCEDEST

SOURCE

SOURCE

SOURCE

DEST

DEST

DEST DEST

Stepping stone

51.251.22.183

Username password

Sept 29 11:17:09

Sept 29 11:24:07

Sept 29 11:24:06

Sep

t 29

11:

23:5

6

Sep

t 29

11:

23:5

6

Page 22: Detecting Deception in the Context of Web 2.0

22W2SP2007 – Oakland, CA – May 24, 2007

Flow Sensor

• Based on the libpcap interface for packet capturing.

• Packets with the same source IP, destination IP, source port, destination

port, protocol are aggregated into the same flow.

We did not use Netflow only because it does not have all the fields that we need.

• Timestamp of the last packet• # packets from Source to Destination• # packets from Destination to Source• # bytes from Source to Destination• # bytes from Destination to Source• Array containing delays in microseconds between packets in the flow

Page 23: Detecting Deception in the Context of Web 2.0

23W2SP2007 – Oakland, CA – May 24, 2007

Two Models Based on the Flow Sensor

Volume Packets Duration Balance Percentage

Tiny: 1-128b

Small: 128b-1Kb

4:10-99

5: 100-999 6: > 1000

4: 1000-10000 s 5: 10000-100000 s 6: > 100000 s

Out >80

Low and Slow UPLOAD

Volume Packets Duration Balance Percentage

Tiny: 1-128b

Small: 128b-1Kb

Medium: 1Kb-100Kb

Large: > 100Kb

1: one packet 2: two pckts 3: 3-9 4: 10-99 5: 100-999 6: > 1000

0: < 1 s 1: 1-10 s 2: 10-100 s 3: 100-1000 s 4: 1000-10000 s 5: 10000-100000 s 6: > 100000 s

Out >80

UPLOAD

Page 24: Detecting Deception in the Context of Web 2.0

24W2SP2007 – Oakland, CA – May 24, 2007

1

2

3

4

5

6 7

RECON

ATTEMPT

ATTEMPT

ATTEMPT ATTEMPT

ATTEMPT

ATTEMPT

UPLOAD

UPLOAD

UPLOADDOWNLOAD

DOWNLOAD

UPLOAD

RECON ATTEMPT

Phishing Attack Model 1 – very specific

UPLOAD

Page 25: Detecting Deception in the Context of Web 2.0

25W2SP2007 – Oakland, CA – May 24, 2007

1

2

3

4

5

6 7

ATTEMPT dst,src

ATTEMPT dst,A

ATTEMPT dst, src

ATTEMPT dst,src

ATTEMPT dst, ! src

UPLOAD dst, src

UPLOAD dst

UPLOAD dst, src DOWNLOAD

src

DOWNLOAD src

UPLOAD dst,src

ATTEMPT dst, !src

Phishing Attack Model 2 – less specific

UPLOAD dst,src

ATTEMPT dst, !src

RECON or ATTEMPT or COMPROMISE

RECON or ATTEMPT or COMPROMISE dst

RECON or ATTEMPT or COMPROMISE

Page 26: Detecting Deception in the Context of Web 2.0

26W2SP2007 – Oakland, CA – May 24, 2007

1

2

3

4

5

6 7

UPLOAD dst, src

UPLOAD dst

UPLOAD dst, src DOWNLOAD

src

DOWNLOAD src

UPLOAD dst,src

Phishing Attack Model 3 – more general

UPLOAD dst,src

RECON or ATTEMPT or COMPROMISE

RECON or ATTEMPT or COMPROMISE dst

RECON or ATTEMPT or COMPROMISE dst, src

RECON or ATTEMPT or COMP dst, src

RECON or ATTEMPT or COMP dst, src

RECON or ATTEMPT or COMP dst

RECON or ATTEMPT or COMP dst, !src

RECON or ATTEMPT or COMP dst,! src

RECON or ATTEMPT or COMP dst, ! src

RECON or ATTEMPT or COMPROMISE

Page 27: Detecting Deception in the Context of Web 2.0

27W2SP2007 – Oakland, CA – May 24, 2007

1 2 3 4RECON

ATTEMPT

ATTEMPT orUPLOAD

DOWNLOAD

RECON

Phishing Attack Model 3 – Most general

ATTEMPT orUPLOAD

ATTEMPT DOWNLOAD

Stricter models reduce false positives, but less strict models can detect unknown attack sequences

Page 28: Detecting Deception in the Context of Web 2.0

28W2SP2007 – Oakland, CA – May 24, 2007

Outline

1.Motivation and Terminology

2.Process Query System (PQS) Approach

3.Detection of a complex attack

4.Conclusion and Acknowledgments

Page 29: Detecting Deception in the Context of Web 2.0

29W2SP2007 – Oakland, CA – May 24, 2007

Contribution

• Identification of a new generation of threats

• Need for new paradigms of combining alerts

(observations)

• Process Query System (PQS) based approaches to

detect complex attacks and covert channels

• Need of reducing the gap between user perception

and what technology means (maybe explicit

information about the real status of the system).

Page 30: Detecting Deception in the Context of Web 2.0

30W2SP2007 – Oakland, CA – May 24, 2007

Many thanks to professor George Cybenko (Thayer

School of Engineering at Dartmouth College) and

professor Shankar Sastry (EECS, UC Berkeley).

[email protected]