37
Network-based Intrusion Detection, Prevention and Forensics System 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for Internet & Security Technology (LIST) http://list.cs.northwestern.edu

Network-based Intrusion Detection, Prevention and Forensics System

Embed Size (px)

DESCRIPTION

Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for Internet & Security Technology (LIST) http://list.cs.northwestern.edu. Network-based Intrusion Detection, Prevention and Forensics System. The Spread of Sapphire/Slammer Worms. - PowerPoint PPT Presentation

Citation preview

Page 1: Network-based Intrusion Detection, Prevention and Forensics System

Network-based Intrusion Detection, Prevention and

Forensics System

1

Yan Chen

Department of Electrical Engineering and Computer Science

Northwestern University

Lab for Internet & Security Technology (LIST)

http://list.cs.northwestern.edu

Page 2: Network-based Intrusion Detection, Prevention and Forensics System

2

The Spread of Sapphire/Slammer Worms

Page 3: Network-based Intrusion Detection, Prevention and Forensics System

3

Current Intrusion Detection Systems (IDS)

• Mostly host-based and not scalable to high-speed networks– Slammer worm infected 75,000 machines in <10 mins– Host-based schemes inefficient and user dependent

• Have to install IDS on all user machines !

• Mostly simple signature-based – Cannot recognize unknown anomalies/intrusions– New viruses/worms, polymorphism

Page 4: Network-based Intrusion Detection, Prevention and Forensics System

4

Current Intrusion Detection Systems (II)

• Cannot provide quality info for forensics or situational-aware analysis– Hard to differentiate malicious events with

unintentional anomalies• Anomalies can be caused by network element faults,

e.g., router misconfiguration, link failures, etc., or application (such as P2P) misconfiguration

– Cannot tell the situational-aware info: attack scope/target/strategy, attacker (botnet) size, etc.

Page 5: Network-based Intrusion Detection, Prevention and Forensics System

5

Network-based Intrusion Detection, Prevention, and Forensics System

• Online traffic recording [SIGCOMM IMC 2004, INFOCOM 2006, ToN 2007] [INFOCOM 2008]– Reversible sketch for data streaming computation– Record millions of flows (GB traffic) in a few hundred KB– Small # of memory access per packet– Scalable to large key space size (232 or 264)

• Online sketch-based flow-level anomaly detection[IEEE ICDCS 2006] [IEEE CG&A, Security Visualization 2006]– Adaptively learn the traffic pattern changes – As a first step, detect TCP SYN flooding, horizontal and

vertical scans even when mixed

• Online stealthy spreader (botnet scan) detection [IEEE IWQoS 2007]

Page 6: Network-based Intrusion Detection, Prevention and Forensics System

6

Network-based Intrusion Detection, Prevention, and Forensics System (II)

• Polymorphic worm signature generation & detection[IEEE Symposium on Security and Privacy 2006] [IEEE ICNP 2007]

• Accurate network diagnostics [SIGCOMM IMC 2003, SIGCOMM 2004, ToN 2007] [SIGCOMM 2006] [INFOCOM 2007 (2)]

• Scalable distributed intrusion alert fusion w/ DHT[SIGCOMM Workshop on Large Scale Attack Defense 2006]

• Large-scale botnet and P2P misconfiguration event forensics [work in progress]

Page 7: Network-based Intrusion Detection, Prevention and Forensics System

7

System Deployment• Attached to a router/switch as a black box• Edge network detection particularly powerful

Original configurationMonitor each port

separatelyMonitor aggregated

traffic from all ports

Router

LAN

Internet

Switch

LAN

(a)

Router

LAN

Internet

LAN

(b)

RANDsystem

scan

po

rtsc

an

port

Splitter

Router

LAN

Internet

LAN

(c)

Splitter

RA

ND

syst

em

Switch

Switch

Switch

Switch

Switch

HPNAIDMsystem

RANDsystem

Page 8: Network-based Intrusion Detection, Prevention and Forensics System

P2P Doctor: Measurement and Diagnosis of Misconfigured Peer-

to-Peer Traffic

Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic

Lab for Internet and Security Technology (LIST) Northwestern Univ.

Page 9: Network-based Intrusion Detection, Prevention and Forensics System

What is P2P Misconfiguration

P2P file sharing accounted for > 60% of traffic in USA and > 80% in Asia

Thousands of peers send P2P file downloading requests to a “random” target on the Internetpossibly triggered by bugs or by malicious reasonsgenerates large amount of unwanted traffic Influence the performance of peers

It contributes on an average of about 37% of the “Internet background radiation” in 2007

Page 10: Network-based Intrusion Detection, Prevention and Forensics System

Motivations P2P software DC++ has already been

exploited by attackers for DoSdirect gigabit “junk” data per second to a victim

host from more than 150,000 peers Currently, little is known about the

characteristics or root causes of P2P misconfiguration events

Peers

File Request Flooding

Innocent VictimMisconfigured Traffic

DDoS attack Scenario

Page 11: Network-based Intrusion Detection, Prevention and Forensics System

Outline

• Motivation

• Passive measurement results

• P2P Doctor system design

• Root cause diagnosis and analysis

• Conclusion

Page 12: Network-based Intrusion Detection, Prevention and Forensics System

Peer Classification

All the peers

Not in the P2P Network

In the P2P Network

BogusPeers

Anti-P2P Peers

Normal Peers

UnintentionallyMisconfigured peers

Poisoned Peers(Intentional)

Page 13: Network-based Intrusion Detection, Prevention and Forensics System

Passive Measurement• Honeynet/honeyfarm datasets• Events: # of unique sources > 100 in 6 hours

– After filtering scan traffic

• Event characteristics:– Mostly target a single IP– Duration: A few hours to up to a month

LBL NU GQ

Sensor 5 /24 10 /24 4 /16

Traces 883GB 287GB 49GB

Duration 37 months

7 months

26 days

LBL NU

eMule 106 106

BitTorrent 242 90

Gnutella 1 1

Soribada 4 0

Xunlei 18 0

VAgaa 1 0

Page 14: Network-based Intrusion Detection, Prevention and Forensics System

Popularity• Growth Trend:

• IP space: observed in three sensors in five different /8 IP prefixes

• Significant problem:– Amount of traffic only from 15 /24 networks.

The real traffic can be 1M times more.

The average total connections of P2P misconfiguration events per month.

37%!

Page 15: Network-based Intrusion Detection, Prevention and Forensics System

Further Diagnosis

• Problems with passive measurement on archived data– Events have gone– Hard to backtrack the propagation– Root cause?

• Need a real-time backtracking and diagnosis system!

Page 16: Network-based Intrusion Detection, Prevention and Forensics System

Outline

• Motivation

• Passive measurement results

• P2P Doctor system design

• Root cause diagnosis and analysis

• Conclusion

Page 17: Network-based Intrusion Detection, Prevention and Forensics System

Design of P2P Doctor SystemRoot causeinference

Backtracking system

P2P-enabledHoneynet

P2P payload signaturebased responder

Event identification

10100101011101

infohash; ‘abc.avi’

Protocol parsing for metadata

Page 18: Network-based Intrusion Detection, Prevention and Forensics System

Design of P2P Doctor SystemRoot causeinference

Backtracking system

P2P-enabledHoneynet

Index Server (tracker)CrawlingBT: top 100, eMule: 185

LocalCrawler...

...

Server

Server

Server

Server

Server

Peer ExchangeProtocol Crawling

DHT Crawling

Page 19: Network-based Intrusion Detection, Prevention and Forensics System

Design of P2P Doctor SystemRoot causeinference

Backtracking system

P2P-enabledHoneynet

• What is the root cause?• Which peers spread misconfigurtion?• How is misconfiguration disseminated?• What is the percentage of bogus peers in

the misconfigured P2P networks?

Page 20: Network-based Intrusion Detection, Prevention and Forensics System

Deployment and Data Collection

• Deployed the P2P doctor system on NU honeynet (10 /24 networks in three /8)

• Real-time events– Previous passive measurement data referred

as historical events

BitTorrent eMule

# of events 20 42

Duration 23 days

08/23/2007 to 09/15/2007

Page 21: Network-based Intrusion Detection, Prevention and Forensics System

Outline

• Motivation

• Passive measurement results

• P2P Doctor system design

• Root cause diagnosis and analysis

• Conclusion

Page 22: Network-based Intrusion Detection, Prevention and Forensics System

Root Cause Analysis

• Methodology– Track how honeynet IPs propagated in P2P systems– Use unroutable IP space as a big honeynet (66.8% of

IPv4 Space)– Hypothesis formulation and testing

• Classification of measured peers– Misconfigured peers: Passively observed from honeynet– Backtracked peers: actively observed through

backtracking– Reverse honeynet peers: the IP obtained by reversing

the target IP from the honeynets

• Results– Data plane traffic radiation– Detailed results focus on eMule and BitTorrent

Page 23: Network-based Intrusion Detection, Prevention and Forensics System

Data Plane Traffic Radiation

DHTPeerExchange

IndexServer

Who hasBeowulf.avi?

1.2.3.4

1.2.3.4

Resource mapping

Page 24: Network-based Intrusion Detection, Prevention and Forensics System

eMule – Root Cause

• Byte ordering is the problem!

1.2.3.4

4.3.2.1

4.3.2.1

4.3.2.1

4.3.2.1

4.3.2.1

1.2.3.4

Page 25: Network-based Intrusion Detection, Prevention and Forensics System

eMule – Root Cause

• Byte ordering is the problem!– Hypothesis from the historical data

• In 80% of events, the reverse target IPs are alive

– Verified with real-time events• 61% of the reverse honeynet peers indeed running

eMule with the port number reported• For the backtracked peers which is in the

unroutable IP space, 69.6% of them having reverse IPs run eMule

Page 26: Network-based Intrusion Detection, Prevention and Forensics System

eMule – Peers & Dissemination

• Which peers spread misconfiguration?– 99.24% of misconfigured peers are normal peers

• How is the misconfiguration disseminated?– Index Server? No– Peer exchange? Yes

• Percentage of bogus peers in eMule network?– [12.7%, 25.0%] w/ a total of 37,079 backtracked

peers

All Peers

From Peer Exhcange

From Index Servers

Unroutable

eMule

Others

Reverse-eMule

Reverse-unroutable

Reverse-others

Unroutable

eMule

Others Reverse-eMule

Reverse-unroutable

Reverse-others

(100%)

(19.3%)

(80.7%)

(0)

(12.8%)

(6.5%)

(10.3%)

(45.8%)

(24.6%)

(7.1%)

(0.3%)

(2.9%)

(5.6%)

(9.6%)

(9.4%)

Page 27: Network-based Intrusion Detection, Prevention and Forensics System

BitTorrent – Responsible Peers Both anti-P2P and normal peers are responsible Events classified to two types with diagonally different

sets of characteristics For anti-P2P peers events

All the sources are from the IP range owned by anti-p2p companies like Media Defender, Media Sentry, Net Sentry etc.

Seen 6 out of 7 major anti-P2P companies sources in our honeynet.

Anti-P2P peers Normal peers

Number of Events 127 (39%) 205 (61%)

Client Software 100% - Azureus90% - UTorrent (NU)

88% - BitComet+BitSpirit (LBL)

Avg. number of Connections / src

400 25

Arrival & Departure

All together Poisson

Avg. Duration 4.5 hours 106.1 hours

Page 28: Network-based Intrusion Detection, Prevention and Forensics System

BitTorrent – Root Cause

Refuted Byte Ordering Hypothesis – For 20 real-time events, no reverse

honeynet peers runs BitTorrent

For normal peer events, culprit is Peer Exchange (PEX) protocol implemented by uTorrent-compatible clients

For anti-P2P peer events – Possibly related to Azureus system– Still an open question (No real-time

events)

Page 29: Network-based Intrusion Detection, Prevention and Forensics System

BitTorrent – Root Cause II

How is the misconfigured peers influenced?– On average [0.053%,32%]

Where is the origin of bogus peers?– Nine hosts are the major players – each has >50% of peers

in their buddy list as bogus. – Eight of them are from a small IP range belong to an Anti-

P2P company.– Only bogus and other Anti-P2P peers are in the buddy list of

those eight peers. – Support uTorrent Peer Exchange protocol and respond

regardless of the infohash in request.

Page 30: Network-based Intrusion Detection, Prevention and Forensics System

Conclusions

• The first study to measure and diagnose large-scale P2P misconfiguration events

• Found 30% Internet background radiation is caused by P2P misconfiguration– Popular in various P2P systems, exponential growth

trend, and scattered in the IPv4 space

• For eMule, we found it is caused by network byte order problem

• For BitTorrent, classified to anti-P2P peer events and normal peer events with diagonally different sets of characteristics– Found the uTorrent PEX causes the problem in normal

peer events

Page 31: Network-based Intrusion Detection, Prevention and Forensics System
Page 32: Network-based Intrusion Detection, Prevention and Forensics System

Backup Slides

Page 33: Network-based Intrusion Detection, Prevention and Forensics System

Motivation

Given unprecedented amount of traffic, even a slight mis-configuration of the P2P system can result in a DDoS kind of situation

Prevalence in time, space, and across a number of distinct P2P systems with a temporal increasing trend is alarming.

P2P miscongurations can cause innocent people to get involved in the above “war” between P2P and anti-P2P systems.

Presently, nothing is known about the causes or overall effects of P2P mis-configurations

Our goal is to determine the root cause(s) of each type of mis-configuration

Page 34: Network-based Intrusion Detection, Prevention and Forensics System

Related Work• Misconguration is widely spread across different networked and

distributed systems like BGP [Labovitz et al. ] and firewalls [Cuppens et al. ].

• Measurement studies of normal P2P traffic [ACM SOSP (2003), MCN (2002)], while we measure the abnormal P2P traffic observed in honeynets.

• In [INFOCOM (2005)], Content pollution including intentional and unintentional pollution is widespread for popular titles.

• P2P systems like Fasttrack and Overnet are vulnerable to the index poisoning attack [INFOCOM (2006)]

• All of the above studies focus on the content pollution or index poisoning while our focus is the index misconfiguration.

• First large-scale measurement study on the root causes for both intentional/unintentional index misconfiguration.

Page 35: Network-based Intrusion Detection, Prevention and Forensics System

What is P2P Misconfiguration

More than 50% of the traffic in the Internet today is P2P traffic By Symantec

Corporation’s recent report

P2P file sharing accounted for > 60% of traffic in USA and > 80% in Asia

P2P traffic

Other Traffic

Page 36: Network-based Intrusion Detection, Prevention and Forensics System

eMule – Misconfigured peers study• Examine the misconfigured peers

– 9.3% of such peers has unroutable peers in their buddy list (discovered by peer exchange).

– Those 9.3% of peers are high affected by unroutable peers– None of them in the Anti-P2P blacklist– 6 out of the top 10 peers in terms of number of connection they

issued to the honeynet are running Linux. (99% as whole running Windows)

0.0 0.2 0.4 0.6 0.8 1.0

0.0

0.2

0.4

0.6

0.8

1.0

The percentage of the bogus peers in the peers' buddy list

accu

mul

ativ

e fra

ctio

nMore than 67% of peershas more than 80% of unroutable peers

Page 37: Network-based Intrusion Detection, Prevention and Forensics System

BitTorrent – Dissemination

How is misconfiguration disseminated?– Index server? - No– Peer exchange? - Yes

Percentage of bogus peers in BitTorrent network?Out of a total of 9,000 backtracked peers, only 13 IPs

are unroutable and 3,150 IPs gave connection timeout0.14% < bogus Peers < 35%