The Internet Motion Sensor: A Distributed Blackhole Monitoring System
|
|
|
- Harriet Holmes
- 9 years ago
- Views:
Transcription
1 The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey, * Evan Cooke, * Farnam Jahanian, * Jose Nazario, David Watson * * Electrical Engineering and Computer Science Department University of Michigan {mibailey, emcooke, farnam, dwatson}@umich.edu Arbor Networks [email protected] Abstract As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary, leaves network assets vulnerable to the rapidly moving threats of today s Internet, including fast moving worms, distributed denial of service attacks, and routing exploits. This paper introduces the Internet Motion Sensor (IMS), a globally scoped Internet monitoring system whose goal is to measure, characterize, and track threats. The IMS architecture is based on three novel components. First, a Distributed Monitoring Infrastructure increases visibility into global threats. Second, a Lightweight Active Responder provides enough interactivity that traffic on the same service can be differentiated independent of application semantics. Third, a Payload Signatures and Caching mechanism avoids recording duplicated payloads, reducing overhead and assisting in identifying new and unique payloads. We explore the architectural tradeoffs of this system in the context of a 3 year deployment across multiple dark address blocks ranging in size from /24s to a /8. These sensors represent a range of organizations and a diverse sample of the routable IPv4 space including nine of all routable /8 address ranges. Data gathered from these deployments is used to demonstrate the ability of the IMS to capture and characterize several important Internet threats: the Blaster worm (August 2003), the Bagle backdoor scanning efforts (March 2004), and the SCO Denial of Service attacks (December 2003). 1 Introduction As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary, leaves network assets vulnerable to the rapidly moving threats of today s Internet, including fast moving worms, distributed denial of service attacks, and routing exploits. These threats share several key properties. First and foremost these threats are globally scoped, respecting no geographic or topological boundaries. Complicating matters, they are sometimes zero-day threats, exploiting vulnerabilities for which no signature or patch has been developed, making detection and mitigation of these threats problematic. Third, these threats are evolutionary, with each worm or attack learning from previous failures, spawning an arms race between the network defenders and the attackers. Finally, many of these threats are exceptionally virulent, propagating to the entire vulnerable population in the Internet in a matter of minutes, rendering human response impractical. Researchers are attempting to address these threats by investigating new methods for monitoring and analysis. One promising method for investigating these threats is the monitoring of unused or dark address space [22, 11]. Because there are no legitimate hosts in an unused address block, traffic must be the result of misconfiguration, backscatter from spoofed source addresses, or scanning from worms and other probing. This pre-filtering provides an excellent method of studying Internet threats, however we believe there are two key design challenges that must be addressed when constructing a monitoring infrastructure based on this technique. The first issue is sensor coverage. Sensor coverage refers to the visibility of the system into Internet threats. One method to increase visibility is to monitor larger blocks of address space [13]. The problem is that the IPv4 space is limited and there are a small number of large unused address blocks available for instrumentation. In addition, it has been shown that address blocks in different networks see different threat traffic [7]. Thus, sensor size and topological
2 location are important components of sensor coverage. The second issue is service emulation. If the sensors do not directly involve live hosts then there is a question of what services to emulate and at what level to emulate them. This is a difficult problem given the immense number services on the Internet today. An ideal system would reproduce all current and future services with exactly the same behavior as all possible end-hosts. Such a system is impossible, so there must a tradeoff. The IMS is a distributed, globally scoped, Internet threat monitoring system designed with these challenges in mind. The goal of the IMS is to measure, characterize, and track a broad range of Internet threats. This means achieving the maximum possible sensor coverage with enough fidelity to gather intelligence on specific services. The fundamentally distributed nature of this architecture allows the IMS to monitor diverse addresses and topologies. In order get the most information possible given the scale of system, each sensor passively collects all UDP and ICMP traffic and uses a lightweight responder to elicit the initial packet of each TCP connection. This approach effectively emulates the establishment of TCP transactions providing the maximum service coverage without the need for maintenance-heavy service emulation. This approach is used in conjunction with an innovative payload signature and caching technique. Observations have shown that many of the packets seen at the sensors are duplicates, making this caching technique highly effective in managing the overhead of storing payloads. The main contributions of this paper are: The design and implementation of a distributed, globally scoped, Internet threat monitoring system. The IMS architecture is based on three novel components. First, a Distributed Monitoring Infrastructure increases visibility into global threats. Second, a Lightweight Active Responder provides enough interactivity that traffic on the same service can be differentiated independent of application semantics. Third, a Payload Signatures and Caching mechanism avoids recording duplicated payloads, reducing overhead and assisting in the identification of new payloads. The deployment and demonstration of the IMS on production networks. The current IMS deployment consists of 28 monitored blocks at 18 physical installations. These deployments range in size from a /25 to a /8 and include major service providers, large enterprises, academic networks, and broadband providers. These sensors represent a range of organizations and a diverse sample of routable IPv4 space. Data gathered from these deployments is used to demonstrate the ability of the IMS to capture and characterize several important Internet threats. /24 Sensor /16 Sensor /24 Sensor /24 Sensor Internet... University Network /24 Sensor /24 Sensor /8 Sensor Provider Networks Corporate Network Figure 1. Internet Motion Sensor Architecture The paper is organized as follows: Section 2 details the architecture and core components of the IMS. Section 3 describes the IMS deployment and highlights the inovative capaibilities of this system by examining three distinct events. Section 4 provide an overview of related work. Finally, Section 5 discusses future directions and conclusions. 2 Internet Motion Sensor Architecture The Internet Motion Sensor was designed to measure, characterize, and track a broad range of Internet threats. This particular challenge necessitates a lightweight monitoring approach having global visibility. More specifically, the IMS was designed to: Maintain a level of interactivity that can differentiate traffic on the same service. Provide visibility into Internet threats beyond address, geographical, and operational boundaries. Enable characterization of emerging threats while minimizing incremental effort. While other systems have combined sensors of different measurement fidelities [32], the goal of our project is to gain global threat visibility rather than in-depth information on the specific mechanisms of a threat. This implies that a simple system that captures less data may actually be more effective then a complex system producing large amounts of data. In other words, it is possible to trade in-depth threat information for the ability to gain additional visibility. The tradeoff of visibility over in-depth threat information motivates the architecture described in this section. The IMS consist of a set of distributed blackhole sensors, each monitoring a dedicated range of unused IP address space. Because there are no legitimate hosts in an unused address block, traffic must be the result of misconfiguration, backscatter from spoofed source addresses, or scanning from worms and other probing. The blackhole sensors in the IMS have an active and a passive component. The
3 passive component records packets sent to the sensor s address space and the active component responds to specific packets to elicit more data from the source. The active component is designed to elicit the first payload of data across the major protocols (TCP, UDP, and ICMP). UDP is a connectionless protocols so applicationlevel data is sent without the receiver ever responding. For example, the Witty [21] and Slammer [12] worms were based on UDP in which the entire worm payload was transmitted in the first packet. TCP, on the other hand, is a connection-oriented protocol and requires an active response to elicit any payload data. The IMS uses a simple lightweight active responder to establish a TCP connection and capture payload data on TCP worms like Blaster [16] and Sasser [8]. ICMP data is passively collected. Storing the full payload for every packet has significant space requirements, so the IMS uses a novel payload storage approach. When a blackhole sensor receives a packet with a payload, it first computes the MD5 checksum of the payload (without network headers) and compares it against the checksum of all the other packets it has seen in the past day. If the checksum (signature), has already been recorded, the capture component logs the signature but does not store the payload. If the signature is new, the payload is stored and the signature is added to the database of signatures seen in that day. This architecture offers three novel contribibutions: Distributed Monitoring Infrastructure: The IMS is designed from the ground up for distributed deployment to increase visibility into global threats, including those that may illustrate targeting preferences. Lightweight Active Responder: The active responder is designed to maintain a level of interactivity that can differentiate traffic on the same service independent of application semantics. This enables IMS to characterize threats on emergent ports and services without additional deployments or scripting. Payload Signatures and Caching: The IMS checksums and caches commonly seen packets such that only new payloads need be stored. This saves significant storage resources and enables a simple mechanism for identifying new payloads. The following three subsections describe and validate these novel components of the architecture by showing them in the context of a 28 address block, distributed IMS deployment. 2.1 Distributed Blackhole Network A key contribution of the IMS is the creation of a large distributed sensor network built from address blocks of Figure 2. Average packet rate (5 minute bins) as seen by ten IMS Blackhole sensors over one month, normalized by /24 various sizes and placed in a variety of topologically diverse locations. While previous attempts at monitoring unused address block have focused on three or fewer address blocks [22, 11, 32, 17], our approach is to be widely distributed. This architectural choice has two key advantages; greater visibility into distant events and broader coverage of threats. Using the analogy of Astrometric Telescopes, Moore in [11] notes that the greater the size of a light telescope, the greater the visibility into fainter, smaller, further and older objects. Moore notes that the more address space monitored (for random scanning events) the better the insight into shorter lived or lower rate events. The conclusion is that having large address blocks is important for monitoring globally scoped events. In addition to wide address blocks, Moore also suggests distributed blocks as a method for increasing visibility. Distributed sensors provide more addresses that increase visibility and also another important benefit, broader coverage of threats. Previous work [7] has noted the surprising finding that dark address monitors can see strikingly different behaviors, even when local-preference scanning is removed. As an example, consider the packet rate observed by a collection of sensors. Figure 2 shows the amount of traffic over all protocols and services observed by ten blackhole sensors. Packets are normalized by the size of a /24 so sensors covering different sized blocks can be compared. Normalization is performed such that the magnitude seen in a /23 would be divided by two and traffic in a /25 multiplied by two. Figure 2 shows that the amount of traffic varies dramatically and can differ by more than two orders of magni-
4 Figure 3. Distribution of local preference accross ten IMS blackhole sensors over one month tude between sensors. The local target selection of malicious attackers or worms with local scanning preference in their scanning algorithms[26], such as Code Red II [3], Nimda [2], and Blaster [16] are likely canidates for the difference in magnitude. However, we show that this is not the case. Figure 3 shows the percentage of traffic to all protocols and services from the same local /16 and local /8 as the sensor where the traffic was observed. There are two important implications of this graph. First, there are very different relative amounts of local /8 traffic seen at the various sensors. Second, although some sensors see a very significant amount of normalized local /8 traffic, those blocks do not always correlate with the sensors with the greatest magnitude of overall traffic. For example, C/24 observes by far the greatest amount of traffic, but only approximately 10% of that traffic is from within the same /8 as the sensor. So, even though local traffic can be significant, the major traffic differences are not due to local preference. Additional insights into these differences are discussed in [7]. Thus, the important message in Figure 2 and Figure 3 is that different blackholes observe different magnitudes and types of traffic. The distributed nature of IMS affords us additional visibility into global threats. This comes from our ability to increase address space beyond a single wide address block as well as the topological and organizational diversity of the address blocks. 2.2 Lightweight Responder Another novel aspect of this work is the construction of a lightweight responder whose main responsibility it is to elicit payloads for TCP connections. Recall that because TCP is a connection oriented protocol [27], no application data is sent until after connection establishment. This has two major repercussions for any TCP based threats; threats to the same port can not be distinguished from each other, and threats will not send the exploit payload if a connection can not be established. As an illustration, consider the Blaster worm [16]. The infection and transmission method used by Blaster is relatively complicated compared to a single-packet worm like Slammer [12]. A condensed diagram of the transactions involved in a Blaster infection is illustrated in Figure 4(a). The Blaster worm first opens a TCP connection to port 135 and sends an RPC bind request. Next, an RPC request message is sent containing a buffer overflow and code to open a backdoor port on TCP port The newly infected host then sends a message via the new backdoor to download the worm payload and execute it. Figure 4(b) depicts the transactions of the Blaster worm as captured by a blackhole sensor in the IMS. Observe how a single SYN-ACK on port 135 elicits not only the exploit, but also a SYN on the backdoor port. Since the IMS blackhole sensors respond to SYN packets on all ports, the worm connects to port 4444 and sends commands to TFTP the payload and start the worm binary. Compare the data captured by the IMS to the data recorded by a passive blackhole monitor, shown in Figure 4(c). While a passive monitor might catch a single packet UDP worm like Sapphire, it will only see SYN traffic from TCP worms like Blaster. The Blaster example illustrates the two key contributions of the lightweight reposnder; the ability to elicit payloads to differentiate traffic and the ability to get responses across ports without application semantic information. The following subsections explores these points in more depth Differentiate Services An important illustration of the value in having more information is the extraction and classification of a new threat for a highly trafficked service. The Sasser [8] worm utilized TCP port 445, which is a used by many existing threats. Because the IMS was able to obtain and classify the Sasser payload, it was able to identify the traffic specific to this new worm, shown in Figure 5. Figure 5(a) shows the traffic captured on port 445 over the period of 7 days. Figure 5(b) shows only the traffic of the signature associated with Sasser over that same time period. Thus, the IMS is able to identify the presence of a new worm even in an extremely noisy service by using payload signatures Service Agnostic Another advantage of the lightweight responder is its service agnostic approach which enables insight into less popular services. Consider, for example, a management appli-
5 (a) (b) (c) Figure 4. Blaster infection attempt captured using three monitoring techniques (a) (b) Figure 5. The Sasser worm as recorded by an IMS /24 blackhole sensor
6 Figure 6. Change in activity on TCP ports without well-known services Figure 7. IMS and tcpdump log file sizes over a 16 day period cation that may not be widely deployed. The population deploying this service might only be several thousand hosts on the global Internet and the obscurity of the service may mean it is unmonitored. Another example of less well know services are backdoor ports on existing worms and viruses. New threats that exploit these obscure services can avoid detection by existing network monitoring tools because they do not have the appropriate service modules. In contrast, the IMS can detect and gather significant information on this kind of threat. Consider Figure 6, which shows traffic on TCP ports which do not have well known services. This figure shows the top 20 ports which had significant changes in traffic levels over a five month period. Note in particular, ports 2745 and 3127, which represent services or backdoors as discussed above Limitations The service agnostic lightweight responder is an novel method of tracking emerging threats, however, it may provide little or no information on the threats that depend on application level responses. For example, the NetBIOS service which runs on Windows systems requires an RPC bind() before performing a RPC request() to execute many popular operations. Thus, an IMS sensor may observe the RPC bind() but not the subsequent RPC request() because no application level response was ever sent. However, in some cases the threat will continue without waiting for the application level response. For example, the Blaster worm will send the RPC bind() and RPC request() (containing the exploit) without any application level response. In addition, many threats perform operations on multiple ports and it is possible to track these threats by observing the pattern of requests across ports. While responses across most or all ports provides insights into potentially unknown threats, we would be remiss if we did not point out that this makes these sensors simple to identify and fingerprint. One main advantage of this system is its focus on globally scoped threats over the activites for individual attackers. This translates into a threat model whereby our biggest concern is the encoding of the monitored network blocks in threat no-hit-lists. The large number of distributed blocks of small to medium size makes this proposition difficult. We have not seen any evidence to date of this type of activity being encoded into self propgrating threats. Nevertheless, we are exploring several ways of discouraging fingerprinting including; sensor rotation (i.e. continuously moving the active responders to evade detection), source squelching on individual sensors [17] or accross the entire system (i.e. if we detect and respond at one sensor, we don t have to send a response from other sensors), or building simulated hosts and topology (as in honeyd [19]) to mask the presence of a blackhole. 2.3 MD5 Checksuming and Caching of request payloads The final novel aspect of this system is its method of storing payloads. When a blackhole sensor receives a packet with a payload it first computes the MD5 checksum of the payload (without network headers) and compares it against the checksum of all the other packets it has seen. If the checksum, or signature, has already been recorded, the passive capture component logs the signature but does not store the payload. If the signature is new, the payload is stored and the signature is added to the database of signatures seen. This approach offers a factor of two savings in disk (Figure 7) and the hit rate on the signature cache typically tops 96% (Figure 8). The implication is that a large number of
7 2. Scanning: Because the IMS doesn t rely on service modules, it can detect scanning activity targeted at less well know services like worm/virus backdoors. 3. DDoS: The distributed architecture enables observations of DDOS events including those that may not generate much traffic or target a wide range of addresses. 3.1 Distributed Deployment Figure 8. Signature database hit rate over a 16 day period on three blackhole sensors. Fluctuations in the hit rate in two of the sensors correspond with an attack on a MySQL Server service the payloads seen each day are exactly the same. It is surprising that a cache hit rate of greater than 96% only yields a factor of two increase in savings, however, the payload distribution is heavily skewed to packets with little or no payload. The factor of two in storage savings helps significantly since traces gathered on a /8 can reach over 100GB/day. In addition, checksuming every payload provides an efficient signature system. For example, the signatures can be used to generate simple metrics for the amount of new data observed or as a first pass to a more expensive string matching algorithm. In summary, the MD5 checksuming and caching system in IMS provides a factor of two in storage savings and a simple, fast signature mechanism. 3 Deployment Observations and Experiences This section describes the realization of the IMS architecture. We describe the current distributed IMS deployment consisting of 28 distinct address blocks at 18 physical installations. In addition, we demonstrate the ability of the IMS to capture and characterize several important Internet threats that were previously not possible or difficult using passive monitoring methods. Three threat events captured using the IMS deployment are presented to show how the lightweight responders, payload signatures and caching, and the distributed nature of the IMS enable novel types of globally scoped analyses. 1. Internet Worms: The IMS can differentiate scan traffic from real worms on TCP ports allowing it to capture and study TCP worms like Blaster. One key contribution of the IMS is its ability to support a widely distributed deployment. The current deployment consist of 28 distinct monitored blocks at 18 physical installations (see Table 3.1). These deployments range in size from a /25 to a /8 and include major service providers, large enterprises, academic networks, and broadband providers. These sensors represent a range of organizations and a diverse sample of the routable IPv4 space including nine of all routable /8 address ranges. The first version of the IMS was deployed in 2001 as part of a global threat monitoring system developed by researchers at Arbor Networks and the University of Michigan. This initial installation was built to monitor a /8 network, or approximately 1/256th of the total IPv4 space. Between 2001 and 2003 this system processed several hundred petabytes of network data including recording millions of scan and backscatter events. It was able to characterize numerous Internet worms such as CodeRed, Nimda, Sapphire, and Blaster. In 2003 the system was updated and expanded to represent the distributed architecture presented in this paper. The current IMS revision contains lightweight responders across all ports and a data query engine to support distribution. The query system consists of a query daemon that is installed on each sensor and listens for queries from a portal server. The portal server acts as a query aggregator forwarding queries to each sensor and forwarding back the responses. The portal server also runs a web application that utilizes the query system to provide real-time views of threat traffic in the IMS sensor network. While, the query system is an interesting implementation on top of the IMS architecture, it is beyond the scope of this paper. 3.2 Internet Worms Internet worms represent a class of security threats that seek to execute code on a target machine by exploiting vulnerabilities in the operating system or application software [15, 33]. Unlike viruses, however, worms do not rely on attaching themselves to files to propagate. Rather, worms stand-alone and propagate by using the network to scan for other potentially vulnerable hosts and then exploit them without user interaction.
8 Organization Size Academic Network /24, /24 Academic Network /24 Academic Network /24 Academic Network /24 Large Enterprise /18 Tier 1 ISP /17 Tier 1 ISP /18 National ISP /20, /21, /22 National ISP /24, /24, /24 National ISP /24 National ISP /24 National ISP /24, /24 Regional ISP /25, /24, /24 Regional ISP /23, /22 Regional ISP /8 Regional ISP /24 Broadband Provider /17, /18, /22 Broadband Provider /24, /24 Table 1. IMS Deployments Globally scoped network monitoring systems, such as the IMS, are helpful in characterizing, measuring and tracking these threats. The IMS has been able to provide valuable insight into a variety of worm behaviors, including: Worm Virulence. How much traffic resulted from this worm? What routers or paths were most congested by this worm? Worm Demographics. How many hosts were infected? Where are these hosts geographically, topologically, and organizationally? What operating system are the infected hosts running? What is their available bandwidth? Worm Propagation. How does the worm select its next target? Community response. How quickly was policy employed? Which organizations were affected quickest and who responded quickest? Who is still infected? As an example of the type of analysis made possible by the IMS, consider the following brief analysis of the Blaster worm. The Blaster worm affected Windows 2000 and XP systems running DCOM RPC services and used a publicized buffer overflow vulnerability to run arbitrary code on the target machine. The worm would generate an address to infect (60% were randomly generated and 40% were located within the same host /16 network as the affected system). The worm would then sequentially scan from the chosen address. The IMS was able to measure the release and Blaster Activity per Hour (unique IP addresses) Growth Decay Persistance Date Figure 9. A snapshot of Blaster worm showing the three phases of the worm lifecycle propagation of the Blaster worm as it attempted to infect random hosts. The 7-day period of observations surrounding the release of the Blaster worm indicates a clear 3-phased cycle. Figure 9 illustrates the three phases using the number SYNs to TCP port 135 on a /8 (the active responder was not yet operational). The first worm phase is the growth phase in which the number of scans increased from a baseline rate to hundreds of thousands per hour. The second phase is the decay phase in which in the number of observed probes drops as large-scale filtering was implemented to halt the worm s spread and cleanup started. The third phase of worm activity is the persistence phase which for the Blaster worm has continued through In this one-week period of measurement, the IMS system observed over 286,000 unique IP addresses displaying the characteristics of Blaster activity. Inspection of the DNS top-level domains (TLD) from the reverse lookups shows that the.net and.com domains were hit most heavily, with.jp as the third more popular unique TLD. Furthermore, approximately 10% of the hosts observed were identifiable as dynamically assigned addresses. At its highest pace, the Blaster worm was spreading with a doubling time of less than 2.3 hours. This value may be overestimated due to the truncated propagation phase of the worm. Fitting a sigmoidal population growth equation to this phase of the data shows a maximal growth rate of 40,000 hosts per hour. The second major phase of the data collection monitored the containment of the Blaster worm. Starting within 8 hours of the worm s initial outbreak, the number of unique hosts per-hour scanning for TCP port 135 began to diminish. This loss of activity fits a simple exponential decay model. The half-life of these observations is approximately 10.4 hours and continued for five days, through the end of the workweek.
9 3.3 Scanning Figure 10. Circadian pattern in unique Blaster hosts over a 7 day period in July 2004 Continued Blaster activity displays a circadian pattern, with peak activity occurring near 05:00 GMT as shown in Figure 10. The unique Blaster IPs shown in the graph are identified as Blaster hosts but a command sequence specific to Blaster on the Blaster backdoor port on TCP port Thus a host is only identified as a Blaster host if it first sends the exploit on TCP port 135 and then follows with the command sequence on TCP port Figure 10 shows between 100 and 350 unique Blaster hosts per 5 minute period over a 7 day period in July This pattern is typical of Blaster traffic observed since its inception. The pattern suggests that these sources are power-cycled every day and do not remain on continuously. An inspection of the reverse DNS entries for these hosts indicates a global source distribution. The Blaster worm was not as aggressive as the Slammer or Witty worms, but it did spread at a pace comparable to worms such as Code Red and Nimda. Its appearance and continued presence on the Internet shows the scope of any worm event on the Internet. The above Blaster analysis illustrates how IMS provides additional insight into highly salient threats. Blaster utilizes TCP as a transport protocol and thus attempting to track and characterize it using a passive blackhole monitor is difficult or more often impossible. A passive monitor will detect the SYN packet but not the worm payload making it very hard to differentiate the worm traffic from scans and other traffic on that port. In addition, because IMS gets the first payload, and often traffic on followup ports (like port TCP port 4444 for Blaster), IMS provides enough data to differentiate between the different variant of worms. Differentiating between the variants of Blaster was possible using the command packets received on TCP port This type of analysis is not possible with a passive blackhole monitor. The second example of analysis enabled by this architecture focuses on scan activity. Scanning of networked computers has been around almost as long as networked computers have existed. Benign types of scans were originally used to verify network connectivity (ICMP) or forwarding paths. As applications and services began to use the network, scans for potential vulnerabilities were developed. Individuals looking for services that were vulnerable to attack scanned networks, exploited those servers, and gained control of the computing resources. With the advent of autorooters, and complex scanning tools, probes to networks from other machine on the Internet are now a routine occurrence. One artifact of more recent worms is that after compromising a system, these worms commonly install backdoors in the system they infect. These backdoors have long been a hypothetical source of personal data, computation and network resources. The IMS has the ability to respond as if these new services were running, allowing the collection of the scan payload. An interesting application of this data has been in investigating the degree to which hackers have been trying to utilize this potential resource through secondary infections. Starting on approximately March 20, 2004, IMS began tracking significant amounts of scanning on backdoor ports left by widespread variants of the Bagle [30] and My- Doom [1] mail-based worms. The patterns of sources for this traffic show that they are widespread. The payloads identified suggest that these hosts may be under attack from another worm such as AgoBot [31] or opportunistic attackers such as those looking to build armies of compromised computers. Bagle and MyDoom are families of SMTP-based worms that began spreading in early 2004 and propagated via mass mailer routines. Both of these mail-based worms have many variants that have rapidly appeared in a short time span, with new variants appearing almost daily. The relationship between these families is interesting and reveals a fight in the virus world between authors. Some of these mailbased worms attempted to uninstall the others, disrupting their spread. Each of these malware families listen on TCP ports as a backdoor mechanism for remote control of the hosts. In the case of many of the Bagle variants, it is TCP port In the case of the MyDoom family of mail-based worms this port is typically TCP port Access to these ports could be used to upload arbitrary software to an affected host or to execute arbitrary commands. Figure 11 shows the scan traffic for 2745/TCP and 3127/TCP over a one week period starting March 20th of 2004 as observed by one /24 IMS Sensor. Scans against other ports open by the Bagle variants (including 6777 for
10 Cumulative Unique IP Addresses TCP 2745 and 3127 Scanning Activity TCP/2745 TCP/ Time(EST) Figure 11. Propagation of 2745/TCP and 3127/TCP scanning. This figure shows the cumulative number of source IP addresses contacting these ports over a one week period as observed by one /24 sensor Cumulative Unique IP Addresses IP Addresses that Scanned both 2745 and 3127 Overlap within a Day Overlap within a Hour Overlap within a Week Time(EST) Figure 12. IP address overlap between 2745/TCP and 3127/TCP sources. The three datasets show the addresses that are considered overlapping if they scan both ports in the same hour, the same day, or the same week Bagle.A, 8866 for Bagle.B, and for Bagle.L) have not been observed in any appreciable quantities. In addition, the IMS has not observed significant activity in this time period against additional MyDoom ports, including TCP ports While the similiar magnitude and shape of the datasets in Figure 11 may suggest that these scans are occuring concurently from the same souorce addresses, this is actually not the case. Figure 12 shows the cumulative unique source addresses that scanned both 2745/TCP and 3127/TCP. The 43 ff ff ff a a1 2b e6 60 2f 32 8f a 20 1a 00 Figure 13. Top payload against port 2745/TCP seen in scanning. This hexdump shows the most frequently observed payload of the scans against 2745/TCP three datasets represent three distinct definitions of overlapping; source addresses that scan both ports within the same hour, within the same day, and within the same week. This view shows us two interesting facts. First sources that scanned one port did not scan the other port in the same hour indicating that these were not lock step scans. Secondly, when observered over the course of a week, nearly all sources scanned both ports, indicating that while the target selections were independent of each other, the same pool of source addresses were being used for both scans. The top payload captured using IMS on port 2745/TCP (backdoor ports left by the Bagle.C-G and Bagle.J-K mailbased worms) is shown in Figure 13. Note that the signature in Figure 13 differs from the Bagle removal mechanism described by Joe Stewart [28]. The similarity of the first four bytes (0x43 0xff 0xff 0xff) must be noted; after that point the signatures are divergent. This may indicate a common command or authentication byte sequence. The top payload for the MyDoom worm scans (target port is 3127/TCP) appears to be a UPX packed binary, suggesting new software is being uploaded. The origin and function of this binary is unknown. Both the source and destinations of these scans against TCP port 3127 appear to be widespread. Sources are in many global networks, typically in consumer broadband networks and academic networks. The activity on the Bagle and MyDoom backdoor ports captured by the IMS clearly demonstrates the value of the lightweight responder. Without the ability to respond as if these new services were running, the IMS would never have been able to collect the payload and analyze this activity. This event also shows the advantage of using a simple lightweight responder over handcrafted service modules. Because the backdoors observed were from relatively new worms having a huge number of variants, it would be extremely time consuming to create services modules for each variant in time to capture these events. 3.4 Distributed Denial of Service Attacks The final event presented here exhibits how IMS has visibility into Denial of Service attacks. Denial of Service attacks seek to deny legitimate users access to resources. Denying service typically takes the form of either crashing a computing resource through some bug in the software implementation or by consuming a finite resource. Distributed Denial of Service attacks (DDoS) are a subset of this class
11 Backscatter from the SCO DDoS Attacks December 11th, 2003 FTP HTTP diversity. Because attacks may randomize their sources addresses over the entire Internet, smaller swaths of address space may not be able to accurately determine the scope and magnitude of an attack (e.g. a /24 may only see % of the backscatter, while a /8 may see.5%). Packets per Minute :00:00 01:12:00 02:24:00 03:36:00 04:48:00 06:00:00 07:12:00 08:24:00 09:36:00 10:48:00 12:00:00 Time(EST) Figure 14. The two largest events of the December 2003 SCO DDoS attacks. Table 2. Discrete DDoS events targeting SCO Start Duration Type of attack Dec. 10, 902 minutes SYN flood port 80, 16:24 EST, Dec. 11, 480 minutes SYN flood port 21, 05:49 EST, ftp.sco.com, Dec. 11, 16 minutes SYN flood port 25, 05:51 EST, mail.ut.caldera.com, Dec. 11, 27 minutes SYN flood port 80, 07:28 EST, Dec. 12, 13 minutes SYN flood port 80, 12:23 EST, of attacks that rely on a typically large number of end hosts to consume network resources (e.g. host connection queues, available link bandwidth). On December 10, 2003, shortly after 4PM EST a longlived denial of service attack began against a single web server address for The SCO Group ( The two largest components of this attack can be seen in Figure 14. Because these attacks utilized spoofed source addresses, the IMS system was able to observe some of the backscatter from the attacks. The detection system classified the attacks as 5 discrete events. Three of these events were against the web servers for The SCO Group, one was against their FTP server, and one was against their SMTP server. Additional analysis such as source host fingerprinting through passive techniques and TTL based distance measurements of attacking populations are not presented, but represent part of a spectrum of analysis enabled by IMS. The events depicted in Table 2 illustrate that DDoS events can be long lived and made up of several smaller events that can be combined to create larger attacks. Furthermore, this event shows that attacks using spoofed source address are still in use. Denial of service attacks represent an interesting demonstration of the utility of the IMS and the need for address 4 Related Work With so many threats to global Internet security, characterizing, monitoring, and tracking these threats is quickly becoming critical to the smooth running of individual organizations and the Internet as a whole. Traditionally, approaches to threat monitoring fall into two broad categories, host based monitoring and network based monitoring. Antivirus software [5] and Host Based intrusion detection systems [9] seek to alert users of malicious code execution on the target machine by watching for patterns of behavior or signatures of known attacks. Host based honeypots [4, 6] track threats by providing an exploitable resource and monitoring it for abnormal behavior. A major goal of honeypots [24] is to provide insight into motivation and techniques behind these threats. While these host based monitoring techniques can provide detailed information on threats, they are limited in their ability to scale to monitor large address blocks. The alternative to host based monitoring techniques is to monitor from the network perspective. By far the most common technique is the passive measurement of live networks. In contrast to active techniques, passive network monitoring approaches attempt not to intrude on the existing operation of the network. This can be accomplished by monitoring data from existing security or policy enforcement devices. By either watching firewall logs, looking for policy violations, or by aggregating IDS alerts across multiple enterprises [20, 34], one can infer information regarding a worm s spread. Other policy enforcement mechanisms, such as router ACLs provide course-grained information about blocked packets. Instead of dropping these packets, CenterTrack [29] leveraged the existing routing infrastructure to collect denial of service traffic for analysis. Data collection techniques from traffic planning tools offer another rich area of pre-existing network instrumentation useful in characterizing threats. Course-grained interface counters and more fine-grained flow analysis tools such as NetFlow [10] offer another readily available source of information. While monitoring live networks provides broader coverage, these techniques often face difficulties in distinguishing between benign and malicious traffic. Another interesting network monitoring approach is to passively collect data from traffic to unused (or dark) address space. Because this space has no legitimate hosts, traffic destined to the space is the result of malicious activity or misconfiguration. The most common application of this technique is the global announcement and routing of unused
12 space to a collection infrastructure that records the incoming packets [11, 14, 23]. In contrast to host based techniques, passively monitoring unused address space is able to scale to very large address spaces at the expense of not gathering details about specific events. The final networked monitoring approach uses active network perturbation to determine the scope and propagation of threats. This is typically done to elicit a behavior that is only visible by participating in a network or application session. Projects like honeynet [25] and isink [32], and software like honeyd [19] are used to bring up networks of honeypots; places designed to capture information about intrusions in a controlled environments. These techniques attempt to balance the scalability of dark address monitors while gathering more detailed information about threats. The techniques described above provide varying amounts of intelligence regarding a threat. Some systems capture all the events involved in a particular incident while others record only a connection attempt. Some systems only have visibility into local events, while other are capable of monitoring globally scoped threats. These tradeoffs, which we refer to as depth and breadth, are bounded by their associated costs. Breadth refers to the ability of the system to detect threats across hosts and across operational and geographic boundaries. At one extreme of the breadth axis is the threat view of a single host while at the other is the view of all networkbased threats on a global scale. One early approach to achieving globally scoped visibility was the measurement of wide address blocks [11, 32, 23]. This technique is attractive in that it can easily view a large percentage of the total IPv4 address space and has been effective at characterizing new threats [12, 21]. However, given the finite size of the IPv4 address space, it is important to explore new methods of obtaining breadth. The IMS addresses the issue of breath by creating a distributed architecture consisting of numerous topologically diverse sensors. Depth defines the extent to which a sensor emulates the services and characteristic of a real host, similar to the interaction spectrum in honeypots [24]. At one extreme of the depth axis is an instrumented live host while at the other is the completely passive capture of packets. Multiple points in this spectrum can be utilized simultaneously, as shown by Barford et al. [32]. The IMS, however, uses an extension to passive techniques [11] that gains additional intelligence without emulating services to the extent of previous active methods [25, 19]. 5 Conclusion This paper describe the Internet Motion Sensor, a distributed, globally scoped, Internet threat monitoring system. With roots in wide, dark address monitoring, the IMS extends these techniques to include a distributed blackhole network with a lightweight responder and a novel payload signature and caching mechanism. Together, these capabilities afford new insight into Internet worms, denial of service attacks, and malicious scan activity. First, we presented the IMS architecture and highlighted the innovative capacities of the system. The distributed blackhole network allows increased visability into more distant events. The lightweight responder is designed to differentiate traffic services while remaining independent of application semantics. Finally, the payload signature and caching mechanism reduces the overhead associated with storing request payloads. We then presented this architecture in the context of a 28 block, 18 organization distributed deployment. Highlighting the innovative capabilities of IMS, we examined three distinct large-scale events including, the Blaster worm (August 2003), the Bagle backdoor scanning (March 2004), and the SCO denial of service attacks (December 2003). There remain several interesting issues that would enhance the capabilities of the IMS. First, we are interested in the issue of fingerprinting the blackhole sensor and inclusion in blacklists. We wish to examine several of the antifingerprinting techniques discussed in Section 2. Second, we wish to further explore the tradeoffs between breadth and depth of threat monitoring architectures. The most promising improvement being the creation of a hybrid system that combines host-based sensors with wide address space monitors. Finally, we hope to develop additional techniques for characterizing attackers. Techniques such as passive OS fingerprinting [18] and firepower calculations will provide additional information about the scope and impact of an ongoing attack. Acknowledgments This work was supported by the Advanced Research and Development Activity (ARDA) under contract number NBCHC The authors would like to thank all the IMS participants for their help and suggestions. We would also like to thank Arbor Networks and Larry Blunk, Bert Rossi, and Manish Karir at Merit Network for their assistance and support through this paper. The IMS project had its roots in an earlier system created by Dug Song, Robert Stone, and G. Robert Malan. References [1] CERT. Incident Note IN : W32/Novarg.A Virus. html, [2] CERT Coordination Center. CERT Advisory CA Nimda Worm [3] CERT Coordination Center. Code Red II: Another Worm Exploiting Buffer Overflow In IIS Indexing Ser-
13 vice DLL. Available at notes/in html, [4] B. Cheswick. An evening with Berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter 1992 USENIX Conference: January 20 January 24, 1992, San Francisco, California, pages , Berkeley, CA, USA, Winter [5] F. Cohen. A Short Course on Computer Viruses. John Wiley & Sons, 2nd edition, April [6] F. Cohen. The deception toolkit (DTK). net/dtk/dtk.html, June [7] E. Cooke, M. Bailey, Z. M. Mao, D. Watson, and F. Jahanian. Toward understanding distributed blackhole placement. In Proc of ACM CCS Workshop on Rapid Malcode, pages ACM Press, October [8] M. Corporation. What you should know about the Sasser worm. incident/sasser.mspx, May [9] S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages , Oakland, CA, May [10] C. S. Inc. Netflow services and applications ioft/neflct/tech/napps_wp.htm. [11] D. Moore. Network telescopes: Observing small or distant security events. In 11th USENIX Security Symposium, Invited talk, San Francisco, CA, Aug Unpublished. [12] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Security & Privacy, 1(4):33 39, [13] D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Network telescopes. papers/2004/tr /, July [14] D. Moore, G. M. Voelker, and S. Savage. Inferring Internet denial-of-service activity. In Proceedings of the Tenth USENIX Security Symposium, pages 9 22, Washington, D.C., Aug [15] J. Nazario. Defense and detection strategies against Internet worms. Artech, [16] J. Nazario, M. Bailey, and F. Jahanian. The spread of the Blaster worm. Submitted for publication. [17] R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of internet background radiation. telescope.pdf, June [18] T. H. Project. Know Your Enemy: Passive Fingerprinting, Identifying remote hosts, without them knowing [19] N. Provos. Honeyd A virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, Feb [20] SANS. Sans - Internet storm center - cooperative cyber threat monitor and alert system, June [21] C. Shannon and D. Moore. The spread of the Witty worm. witty/, June [22] D. Song, R. Malan, and R. Stone. A snapshot of global Internet worm activity. FIRST Conference on Computer Security Incident Handling and Response 2002, June [23] D. Song, R. Malan, and R. Stone. A snapshot of global Internet worm activity. Arbor Network Technical Report, June [24] L. Spitzner. Honeypots: Tracking Hackers. Addison-Wesley, [25] L. Spitzner et al. The honeynet project. honeynet.org/, June [26] S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium. USENIX, Aug [27] W. R. Stevens. TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley, [28] J. Stewart. [full-disclosure] [fwd: [th-research] bagle remote uninstall]. full-disclosure/2004-january/ html, January [29] R. Stone. CenterTrack: An IP overlay network for tracking DoS floods, [30] Symantec. Security Response - W32.Beagle.A. venc/data/[email protected], [31] I. Trend Micro. WORM AGOBOT.GEN - Description and solution. virusencyclo/default5.asp?vname=worm_agobot. GEN, [32] P. B. Vinod Yegneswaran and D. Plonka. On the design and use of Internet sinks for network abuse monitoring. In Recent Advances in Intrusion Detection Proceedings of the 7th International Symposium (RAID 2004), Sophia Antipolis, French Riviera, France, Oct [33] N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In Proc of ACM CCS Workshop on Rapid Malcode, pages ACM Press, October [34] V. Yegneswaran, P. Barford, and S. Jha. Global intrusion detection in the DOMINO overlay system. In Proceedings of Network and Distributed System Security Symposium (NDSS 04), San Diego, CA, February 2004.
On Wednesday, 16 July 2003, Microsoft Security
The Blaster Worm: Then and Now The Blaster worm of 2003 infected at least 100,000 Microsoft Windows systems and cost millions in damage. In spite of cleanup efforts, an antiworm, and a removal tool from
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
On Wednesday, 16 July 2003, Microsoft
The Blaster Worm: Then and Now The Blaster worm of 2003 infected at least 100,000 Microsoft Windows systems and cost millions in damage. In spite of cleanup efforts, an antiworm, and a removal tool from
Honeyd Detection via Packet Fragmentation
Honeyd Detection via Packet Fragmentation Jon Oberheide and Manish Karir Networking Research and Development Merit Network Inc. 1000 Oakbrook Drive Ann Arbor, MI 48104 {jonojono,mkarir}@merit.edu Abstract
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Literature Review: Network Telescope Dashboard and Telescope Data Aggregation
Literature Review: Network Telescope Dashboard and Telescope Data Aggregation Samuel Oswald Hunter 20 June 2010 1 Introduction The purpose of this chapter is to convey to the reader a basic understanding
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
HoneyBOT User Guide A Windows based honeypot solution
HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor
A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics
A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics by Michael Donald Bailey A dissertation submitted in partial fulfillment of the requirements
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Analysis of Attacks towards Turkish National Academic Network
Analysis of Attacks towards Turkish National Academic Network Murat SOYSAL, Onur BEKTAŞ Abstract Monitoring unused IP address is an emerging method for capturing Internet security threads. Either an attack
Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Investigate the
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006
CSE331: Introduction to Networks and Security Lecture 18 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Attacker
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor
How Cisco IT Protects Against Distributed Denial of Service Attacks
How Cisco IT Protects Against Distributed Denial of Service Attacks Cisco Guard provides added layer of protection for server properties with high business value. Cisco IT Case Study / < Security and VPN
Denial of Service. Tom Chen SMU [email protected]
Denial of Service Tom Chen SMU [email protected] Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types
Inferring Internet Denial-of
Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006
CSE331: Introduction to Networks and Security Lecture 17 Fall 2006 Announcements Project 2 is due next Weds. Homework 2 has been assigned: It's due on Monday, November 6th. CSE331 Fall 2004 2 Summary:
Characterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown [email protected] B. Irwin Department of Computer Science
DDoS Overview and Incident Response Guide. July 2014
DDoS Overview and Incident Response Guide July 2014 Contents 1. Target Audience... 2 2. Introduction... 2 3. The Growing DDoS Problem... 2 4. DDoS Attack Categories... 4 5. DDoS Mitigation... 5 1 1. Target
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Gaurav Gupta CMSC 681
Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Internet Worm Classification and Detection using Data Mining Techniques
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. 1 (May Jun. 2015), PP 76-81 www.iosrjournals.org Internet Worm Classification and Detection
IntruPro TM IPS. Inline Intrusion Prevention. White Paper
IntruPro TM IPS Inline Intrusion Prevention White Paper White Paper Inline Intrusion Prevention Introduction Enterprises are increasingly looking at tools that detect network security breaches and alert
Network Monitoring Tool to Identify Malware Infected Computers
Network Monitoring Tool to Identify Malware Infected Computers Navpreet Singh Principal Computer Engineer Computer Centre, Indian Institute of Technology Kanpur, India [email protected] Megha Jain, Payas
Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno
CSE 490K Lecture 14 Botnets and Spam Tadayoshi Kohno Some slides based on Vitaly Shmatikov s Botnets! Botnet = network of autonomous programs capable of acting on instructions Typically a large (up to
Intrusion Forecasting Framework for Early Warning System against Cyber Attack
Intrusion Forecasting Framework for Early Warning System against Cyber Attack Sehun Kim KAIST, Korea Honorary President of KIISC Contents 1 Recent Cyber Attacks 2 Early Warning System 3 Intrusion Forecasting
How To Store Multi Format Data In A Network Security System
Resource-Aware Multi-Format Network Security Data Storage Evan Cooke, Andrew Myrick, David Rusek, Farnam Jahanian Department of Electrical Engineering and Computer Science University of Michigan {emcooke,
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network
Pioneering Technologies for a Better Internet Cs3, Inc. 5777 W. Century Blvd. Suite 1185 Los Angeles, CA 90045-5600 Phone: 310-337-3013 Fax: 310-337-3012 Email: [email protected] The Reverse Firewall: Defeating
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
SECURING APACHE : DOS & DDOS ATTACKS - II
SECURING APACHE : DOS & DDOS ATTACKS - II How DDoS attacks are performed A DDoS attack has to be carefully prepared by the attackers. They first recruit the zombie army, by looking for vulnerable machines,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Denial of Service Attacks, What They are and How to Combat Them
Denial of Service Attacks, What They are and How to Combat Them John P. Pironti, CISSP Genuity, Inc. Principal Enterprise Solutions Architect Principal Security Consultant Version 1.0 November 12, 2001
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Denial of Service (DoS) Technical Primer
Denial of Service (DoS) Technical Primer Chris McNab Principal Consultant, Matta Security Limited [email protected] Topics Covered What is Denial of Service? Categories and types of Denial of
WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013
CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
51-30-60 DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-30-60 DATA COMMUNICATIONS MANAGEMENT PROTECTING A NETWORK FROM SPOOFING AND DENIAL OF SERVICE ATTACKS Gilbert Held INSIDE Spoofing; Spoofing Methods; Blocking Spoofed Addresses; Anti-spoofing Statements;
