Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis



Similar documents
A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory

The Bro Network Intrusion Detection System

The Open Source Bro IDS Overview and Recent Developments

Firewall Firewall August, 2003

COMP416 Lab (1) Wireshark I. 23 September 2013

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Wireshark. Fakrul (Pappu) Alam

Network Traffic Analysis

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

The Bro Network Security Monitor. Broverview

How to (passively) understand the application layer? Packet Monitoring

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Bro at 10 Gps: Current Testing and Plans

Introduction to Passive Network Traffic Monitoring

Using Wireshark to Create Network-Usage Baselines

Lab VI Capturing and monitoring the network traffic

Overview. Protocol Analysis. Network Protocol Examples. Tools overview. Analysis Methods

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Monitoring Network Security with the Open-Source Bro NIDS

Safe network analysis

An Overview of the Bro Intrusion Detection System

Solution of Exercise Sheet 5

High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab

Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Wireshark Deep packet inspection with Wireshark

Network Security. Network Packet Analysis

How to protect your home/office network?

Websense Web Security Gateway: What to do when a Web site does not load as expected

EXPLORER. TFT Filter CONFIGURATION

Firewall Log Format. Log ID is a Unique 12 characters code (c1c2c3c4c5c6c7c8c9c10c11c12) e.g ,

Cisco Configuring Commonly Used IP ACLs

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network Security. Network Scanning

DMZ Network Visibility with Wireshark June 15, 2010

Firewall VPN Router. Quick Installation Guide M73-APO09-380

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Linux MDS Firewall Supplement

Multi-Homing Dual WAN Firewall Router

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Practical Network Forensics

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC)

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Configuring Health Monitoring

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

CS197U: A Hands on Introduction to Unix

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Firewalls. Chapter 3

Cisco ASA, PIX, and FWSM Firewall Handbook

Colasoft Capsa Technical White Paper. Maximize Network Value

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Firewalls. Chien-Chung Shen

Introduction to Network Security Lab 1 - Wireshark

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server

DDoS Mitigation Techniques

Wireshark Tutorial INTRODUCTION

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Packet Sniffing with Wireshark and Tcpdump

Firewall Defaults and Some Basic Rules

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Network Forensics Network Traffic Analysis

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Linux Network Security

Chapter 3 Using Access Control Lists (ACLs)

Configuring Class Maps and Policy Maps

darkstat - a network traffic analyzer Introduction Installation LinuxFocus article number by Mario M.

Firewalls. Pehr Söderman KTH-CSC

Networks & Security Course. Web of Trust and Network Forensics

Uma Ferramenta Essencial! Prof. Fred Sauer, D.Sc.

EKT 332/4 COMPUTER NETWORK

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Introduction of Intrusion Detection Systems

Flow Analysis Versus Packet Analysis. What Should You Choose?

NETWORK SECURITY WITH OPENSOURCE FIREWALL

Chapter 15. Firewalls, IDS and IPS

A S B

12. Firewalls Content

Firewalls. Network Security. Firewalls Defined. Firewalls

Introduction. Background

Cryptography and network security

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Detecting Attacks. Signature-based Intrusion Detection. Signature-based Detection. Signature-based Detection. Problems

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Network Packet Analysis and Scapy Introduction

SonicOS 5.9 One Touch Configuration Guide

CSCI Firewalls and Packet Filtering

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Lab 1: Network Devices and Technologies - Capturing Network Traffic

Transcription:

Flow-level analysis: wireshark and Bro Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis 1

wireshark tshark Network packet analyzer for Unix/Windows Displays detailed packet stats GUI (wireshark) or command-line (tshark) Intended audience: Network admins (troubleshooting) Security engineers (security problems) Developers (debugging protocols) YOU J What it is not: Not for large packet traces: Not for high-speed links Out of memory => crash! 2

tshark Usage: tshark [options]... Capture interface: -i <interface> loopback) name or idx of interface (def: first non- -f <capture filter> packet filter in libpcap filter syntax -s <snaplen> packet snapshot length (def: 65535) -p don't capture in promiscuous mode -D print list of interfaces and exit -L print list of link-layer types of iface and exit -r <infile> stdin!) set the filename to read from (no pipes or Processing: -R <read filter> packet filter in Wireshark display filter syntax -n disable all name resolutions (def: all enabled) -d <layer_type>==<selector>,<decode_as_protocol>... "Decode As", see the man page for details Example: tcp.port==8888,http -z <statistics> various statistics, see the man page for details Miscellaneous: -h display this help and exit -v display version info and exit 3

Basic stats with tshark Protocol summary of the trace: > tshark q z io,phs -r trace-1.pcap All traffic from/to a host every minute: > tshark -q z io,stat,60,ip.addr==xxx r trace-1.pcap All TCP conversations of the trace: > tshark q z conv,tcp -r trace-1.pcap All Telnet conversations of the trace: > tshark q z conv,tcp,telnet -r trace-1.pcap All UDP conversations of the trace: > tshark q z conv,udp -r trace-1.pcap All ICMP conversations of the trace: > tshark q z conv,tcp -r trace-1.pcap R icmp 4

Basic stats with wireshark General summary of the trace Protocol hierarchy stats IP-level protocols Transport protocols ARP ICMP Conversations Follow a telnet session Follow a DNS flow Check IGMP messages Endpoints Heavy-hitters Low-hitters (scans) Packet size distribution 5

The Bro system Real-time network analysis framework Unix-based network intrusion detection system Misused for traffic analysis, e.g., by INET Emphasis on Application-level semantics Manipulating packets is uncommon/painful, e.g., wireshark Tracking information over time Within and across flows Archiving for post-mortem analysis Scalability, i.e. Gbit/second links 6

The Bro system (2) Analyzing data means programming the analysis No specification No magic in Bro: The user has to specify what has to be detected Programming the analysis ~ behavioral analysis No good/evil But matched/unmatched 7

Connection summaries One line summary for all connections Basic, but saves a lot of time > bro r trace-1.pcap tcp (output in conn.log) Time Duration Source Destination Service 964953011 0.063756 10.20.12.187 207.126.127.69 http SrcPort DstPort Proto SrcBytes DstBytes State 9002 80 tcp 0? RSTR X Try for UDP and ICMP 8

Connection summaries (2) Connection states SF REJ S0 OTH RSTO Normal establishment and termination Connection attempt rejected Connection attempt seen, no reply No SYN seen, partial connection Connection established, originator aborted 9

Connection summaries (3) Fraction of connections with a given state? TCP: SF, REJ, S0, OTH, RSTO UDP: SF, REJ, S0, OTH, RSTO ICMP: OTH 10

Weird activity Network traffic contains lots of weirdoes Activity which does not conform to standard but is not an attack Example: data being sent after RST > bro r trace-1.pcap weird Scans > bro r trace-1.pcap scan 11

Protocol analyzer Protocol-specific analysis Log activity Check for protocol-specific attacks Bro ships with analyzers for many protocols: FTP, HTTP, POP3, IRC, SSL, DNS, NTP, Example: FTP analyzer > bro r trace-1.pcap ftp > cat ftp.log 12

Packet filter Bro analyzes only the packets required by scripts analysis Builds dynamically packet filter Seeing packet filter: > bro tcp ftp smtp print-filter Packet filter can be changed Bro skips whatever traffic does not match filters! 13

Dynamic protocol detection How does Bro know the analyzer for a connection? Default mechanism: examine the ports Problem: well-known ports are unreliable Bro can analyze protocols independent of ports Dynamic protocol detection Current support for HTTP, IRC, SMTP, SSH, FTP, POP3, BITTORRENT Identifies potential protocol usage with signatures and then validates by parsing > bro r trace-1.pcap -f tcp http-request httpreply dpd > bro r trace-1.pcap -f tcp http-request httpreply brolite 14