PRACTICAL EXPERIENCES BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR. ` Mark Graham



Similar documents
Flow Analysis Versus Packet Analysis. What Should You Choose?

Palo Alto Networks. Security Models in the Software Defined Data Center

NetFlow: What is it, why and how to use it? Miloš Zeković, ICmyNet Chief Customer Officer Soneco d.o.o.

Scalable Extraction, Aggregation, and Response to Network Intelligence

Networking for Caribbean Development

One software solution to monitor your entire network, including devices, applications traffic and availability.

Network Monitoring. Easy, failsafe, and complete visibility of your network. Our customers have the same view as our NOC technicians.

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

Software Defined Network (SDN)

PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Master Your Network for Years to Come.

PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.

Xen Cloud Platform Update

Uila SaaS Installation Guide

PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Secure Cloud-Ready Data Centers Juniper Networks

Roman Hochuli - nexellent ag / Mathias Seiler - MiroNet AG

Citrix XenServer 7 Feature Matrix

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

SDN Architecture and Service Trend

Open Source in Network Administration: the ntop Project

Enabling Application Aware Networks The Next Generation Data Centre with Citrix NetScaler & Cisco Nexus. Ralph W. Lorkins Lead Systems Engineer

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide

VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers

Onboarding VMs to Cisco OpenStack Private Cloud

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Flow Based Traffic Analysis

How To Write A Network Plan In Openflow V1.3.3 (For A Test)

Designing Virtual Network Security Architectures Dave Shackleford

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Enhancing Flow Based Network Monitoring

Network Monitoring using MMT:

Definition of a White Box. Benefits of White Boxes

Network Monitoring and Management NetFlow Overview

Protecting Your SDN and NFV Network from Cyber Security Vulnerabilities with Full Perimeter Defense

Use Cases for the NPS the Revolutionary C-Programmable 7-Layer Network Processor. Sandeep Shah Director, Systems Architecture EZchip

Virtualization, SDN and NFV

HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS

Network security Exercise 10 Network monitoring

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Quantum Hyper- V plugin

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

F V CE Brocade Communications Systems, Inc. PROPRIETARY INFORMATION 2

Cloud Courses Description

NetFlow The De Facto Standard for Traffic Analytics

Introduction to Netflow

Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

High-Speed Network Traffic Monitoring Using ntopng. Luca

Programmable Networking with Open vswitch

Underneath OpenStack Quantum: Software Defined Networking with Open vswitch

NetFlow/IPFIX Various Thoughts

Saisei and Intel Maximizing WAN Bandwidth

Monitoring high-speed networks using ntop. Luca Deri

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information

PCI DSS and the A10 Solution

OpenDaylight Project Proposal Dynamic Flow Management

Scrutinizer. Application traffic analytics, visualization and reporting tool

Application Latency Monitoring using nprobe

Intrusion Detection System

How To Identify Different Operating Systems From A Set Of Network Flows

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

The ntop Project: Open Source Network Monitoring

Signature-aware Traffic Monitoring with IPFIX 1

Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case.

Monitoring Network Traffic using ntopng

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

WatchGuard Training. Introduction to WatchGuard Dimension

OpenStack/Quantum SDNbased network virtulization with Ryu

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

SDN v praxi overlay sítí pro OpenStack Daniel Prchal daniel.prchal@hpe.com

Technology Highlights Of. (Medusa)

End-to-End Network Centric Performance Management

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Saisei FlowCommand FLOW COMMAND IN ACTION. No Flow Left Behind. No other networking vendor can make this claim

Delivering Managed Services Using Next Generation Branch Architectures

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

vsphere Networking vsphere 6.0 ESXi 6.0 vcenter Server 6.0 EN

Meeting the Challenges of Virtualization Security

Malicious Network Traffic Analysis

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

From NetFlow to IPFIX the evolution of IP flow information export

Transcription:

PRACTICAL EXPERIENCES OF BUILDING AN IPFIX BASED OPEN SOURCE BOTNET DETECTOR ` Mark Graham

OUTLINE RESEARCH PROBLEM: Botnet detection in Cloud Providers FLOW: IPFIX and NetFlow CONCEPTUAL FRAMEWORK: Build environment & challenges RESULTS CONCLUSIONS: Why do the results matter?

ABOUT ME PhD Student at Anglia Ruskin University, Cambridge, UK Just passed my 2 nd Year Confirmation on Candidature Supervisors: Adrian Winckles, Dr Erika Sanchez-Velazquez Working PhD title: A Botnet Needle in a Virtual Haystack(s)

RESEARCH PROBLEM To create a botnet detection mechanism for cloud service provider networks. Why a CSP environment? IOT - Ease of access for centralised data Attacks - From the cloud, on the cloud Build Criteria: Privacy - Cannot site AV in tenant environment Isolation - A tenant cannot access another tenant IPv6 - must support this next gen protocol

RESEARCH PROBLEM ATTACKS ON CSPS 1) HOST ESCAPE CRISIS MALWARE (2012) 2) INTRA-VM ATTACKS RISTENPART ET AL. (2006) WANG & LEE (2006) 3) VM ESCAPE CLOUDBURST MALWARE (2009) VENOM (2015)

A BRIEF HISTORY OF FLOW 1980 s - SNMP 1990 s - Syslog 2002 - NetFlow v5 (Cisco) 2009 - NetFlow v9 (Cisco) 2013 - IPFIX (IETF Standard: RFC 7011-7015)

WHY FLOW? Flows based on PDU header information 1) Publically available metadata (v s PCAP does intrusive DPI) 2) Data storage savings (3.1GB PCAP; 43KB in IPFIX) PCAP is a phone call; flow is the phone bill (who, when, how long) Traffic detection (v s forensic/signature detection) Botnet takedown requires locating C&C NFv5 + PCAP used in botnet detection research since 2007 as a data capture method to feed into detection algorithms: Bothunter, Botsniffer, Botcop, Botzilla, BLINC, etc.

IPFIX V NETFLOW IPFIX was developed to address the drawbacks of NetFlow: Standard: Vendor Neutrality Extensible: NFv5 fixed template: 18 fields NFv9-79 fields (104 if Cisco) IPFIX - 433 fields (IANA) Protocol: NF is UDP; IPFIX supports UDP / TCP / SCTP (TLS) Security: IPFIX has C.I.A by design; including data obfuscation Next Gen: IPFIX supports IPv6, MPLS and multi-cast Caveat: Cisco NFv9 support some of these, but proprietary

CRITERIA FOR DATA CAPTURE ELEMENT Cloud and IoT provider virtualised environments Respect cloud tenant data privacy (?) COTS & open source Feed into a neural network; which feeds into SDN / VM containment Ideally support NetFlow and IPFIX for experimental comparison

CONCEPTUAL DESIGN: VIRTUALISATION PLATFORM 1) Hypervisors: Xen (Citrix), Hyper-V (Microsoft), ESXi (VMWare) Xen: Open Source Xen: Common in CSPs (AmazonAWS, OpenStack, Apache CloudStack) Xen: Full Para-virtualisation 2) Software Switches: OVS (Open vswitch), Hyper-V, Nexus (Cisco), vswitch (VMWare) OVS: Open Source OVS: Exports IPFIX, NetFlow v5/v9 and sflow OVS: Sits well with Xen Hypervisor

EXPERIENCE OF BUILDING THE SYSTEM #1 Citrix XenServer 6.2.0: OS: Linux Centos v5.5 i386 Hypervisor: Xen v4.1.5 Hypervisor Mgmt: XenCentre (GUI) Virtual Switch: Open vswitch v1.4.6 This worked fine for NetFlow v5, but

EXPERIENCE OF BUILDING THE SYSTEM #1 1. XenCentre GUI does not support IPFIX OK - we could use command Line XAPI Toolstack 2. Open vswitch only supports IPFIX on v1.10+ We have OVS v1.4.6 3. Open vswitch v1.10 requires Centos 5.5 i686 We have Centos 5.5 i386 - ok, lets upgrade XenServer partitions DOM0 into 4GB, of which 3.8GB is used by Xen.

EXPERIENCE OF BUILDING THE SYSTEM #1 1. XenCentre GUI does not support IPFIX OK - we could use command Line XAPI Toolstack 2. Open vswitch only supports IPFIX on v1.10+ We have OVS v1.4.6 3. Open vswitch v1.10 requires Centos 5.5 i686 We have Centos 5.5 i386 - ok, lets upgrade XenServer partitions DOM0 into 4GB, of which 3.8GB is used by Xen. I am not a Citrix expert Centos refused to be upgraded

EXPERIENCE OF BUILDING THE SYSTEM #2 Citrix XenServer Creedence v6.5: OS: Linux Centos v5.10 i686 Hypervisor: Xen v4.4 (64 bit) Virtual Switch: Open vswitch v2.1.2 Supports IPFIX But, IPFIX would not export timestamps And IPFIX would not aggregate

EXPERIENCE OF BUILDING THE SYSTEM #2 Citrix XenServer Creedence v6.5: OS: Linux Centos v5.10 i686 Hypervisor: Xen v4.4 (64 bit) Virtual Switch: Open vswitch v2.1.2 Supports IPFIX But, IPFIX would not export timestamps And IPFIX would not aggregate I am not an OVS expert OVS refused to work with IPFIX

EXPERIENCE OF BUILDING THE SYSTEM #3 Mark s Bespoke Build v1.0: OS: Ubuntu 14.04 NEW OS Hypervisor: Xen Project v4.4 (64 bit) STANDALONE Hypervisor API: XAPI Toolstack ADDITION Virtual Switch: Open vswitch v2.0.2 DOWNGRADED IPFIX Exporter/Collector: nprobe v6.15 ADDITION 3 HOUR TOTAL INSTALL

CLOUD STACK:

PROBE LOCATION PROBE #1 PROBE #2.1.2.3.4 HOST SERVER PROBE #4 PROBE #5 HOST.11.12 SERVER PROBE #3.100 FIREWALL.101 IPFIX COLLECTOR PROBE #6

PROBE LOCATION PROBE #1 PROBE #2.1.2.3.4.1.2.3.4.11.12 DOM-U DOM-0.11.12 DOM-U DOM-0.100.101 PROBE #3.100.101

PROBE LOCATION.1.2.3.4.1.2.3.4 PROBE #4.11.12 DOM-U DOM-0 PROBE #4 PROBE #5.11.12 DOM-U DOM-0 PROBE #7 PROBE #6.100.101.100.101

CURRENT WORK: IPFIX TEMPLATE Version: 10 (2) Length (2) Export Time Stamp = 2015-01-01 12:59:59 (4) Sequence Number = 0 (4) Observation Domain ID = 123456 (4) Set ID = 1 (2) Set Length (2) Template ID = 456 Field Count = 8 Flow_Start_MilliSeconds = 152 Field Length (4) Flow_End_MilliSeconds = 153 Field Length (4) IN_Bytes = 1 Field Length (4) IPv4_DST_Addr = 12 Field Length (4) L4_SRC_Port = 7 Field Length (2) L4_DST_Port = 11 Field Length (2) Protocol = 4 Field Length (1) BiFlow_Direction = 239 Field Length (1)

FUTURE WORK: CSP NEUTRALISATION ECO-SYSTEM Traffic Detector (IPFIX Template) Threat Intelligence (Honeypots) Neural Network (Bot Detection AI) Bot Neutralisation (SDN & VM placement)

FUTURE WORK: VISUALISATION All Protocols HTTP Only

LIMITATIONS OF THE SYSTEM Deep Packet Inspection Discarding the payload for privacy comes at a cost: Can you detect botnets without DPI information? (Probably not) IPFIX allows customisable Information Elements to capture DPI information We have developed a DPI template: HTTP, DNS, SMTP & IRC. Where is the cross-over with tenant privacy? (Need to measure to detect) Encryption / VPN Traffic Payload encryption wont impact traffic communication graphs But encrypted PDU headers within a VPN will impact collection

CURRENT WORK: EXTENDED IPFIX TEMPLATE Version: 10 (2) Length (2) Export Time Stamp = 2015-01-01 12:59:59 (4) Sequence Number = 0 (4) Observation Domain ID = 123456 (4) Set ID = 1 (2) Set Length (2) Template ID = 457 Field Count = 11 DNS ID DNS TTL DNS Query Name DNS IP Address HTTP GET HTTP Referer HTTP Location HTTP Age HTTP Cookie HTTP Set Cookie HTTP Via

BOTNETS FOR TESTING C&C P2P IRC

CONCLUSION Using COTS technology we created a botnet traffic capture mechanism: 80%+ CSPs already collect flow traffic for network management Probe must be located on the hypervisor IPFIX template for botnet detection Clouds will host IoT and Smart Cities: Cloud is an attack platform (ideal breeding ground of botnets) Cloud is an attack target (storage, other tenants, VE malware) Traditional AV is not suited for botnets

THANK YOU mark.graham@anglia.ac.uk