Attack and Defense Techniques 2



Similar documents
Attack and Defense Techniques

How To Understand A Network Attack

FIREWALL AND NAT Lecture 7a

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Solution of Exercise Sheet 5

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Chapter 15. Firewalls, IDS and IPS

Chapter 8 Network Security

Chapter 8 Security Pt 2

INTRODUCTION TO FIREWALL SECURITY

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewalls and Intrusion Detection

Networking for Caribbean Development

Firewalls P+S Linux Router & Firewall 2013

Stateful Firewalls. Hank and Foo

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Outline (Network Security Challenge)

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Chapter 6: Network Access Control

CSCI 4250/6250 Fall 2015 Computer and Networks Security

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

From Network Security To Content Filtering

Firewalls, IDS and IPS

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CSE543 - Computer and Network Security Module: Firewalls

Firewalls. Ahmad Almulhem March 10, 2012

VLAN und MPLS, Firewall und NAT,

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CS5008: Internet Computing

Firewall Firewall August, 2003

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

GregSowell.com. Mikrotik Security

Chapter 9 Firewalls and Intrusion Prevention Systems

CSC574 - Computer and Network Security Module: Firewalls

Two State Intrusion Detection System Against DDos Attack in Wireless Network

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Analysis of Network Packets. C DAC Bangalore Electronics City

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

CS 356 Lecture 16 Denial of Service. Spring 2013

CSCI Firewalls and Packet Filtering

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Firewalls 1 / 43. Firewalls

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Firewalls (IPTABLES)

Gateway Security at Stateful Inspection/Application Proxy

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Internet Worms, Firewalls, and Intrusion Detection Systems

Introduction TELE 301. Routers. Firewalls

Firewall Defaults and Some Basic Rules

Security Technology: Firewalls and VPNs

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Taxonomy of Intrusion Detection System

Introduction of Intrusion Detection Systems

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls & Intrusion Detection

Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS

SonicOS 5.9 One Touch Configuration Guide

TDC s perspective on DDoS threats

CMPT 471 Networking II

Firewalls and Network Defence

Internet Security Firewalls

Network Security - ISA 656 Firewalls & NATs

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

CSCE 465 Computer & Network Security

CIS 433/533 - Computer and Network Security Firewalls

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Cryptography and network security

- Introduction to Firewalls -

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Internet Ideal: Simple Network Model


Network Security Management

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CS Computer and Network Security: Firewalls

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

COSC4377. Chapter 8 roadmap

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

About Firewall Protection

Transcription:

Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands

Firewalls

Network firewall Internet 25 80 445 25 80 3

Personal firewall Runs on the computer of the user Same filtering capabilities as network firewall Filter may also distinguish between computer programs 25 mail.exe abcd.exe 4

Network-level firewall Filters on IP header fields, such as: Source/Destination IP address Type of Transport protocol Default policies: Discard: what is not explicitly permitted is discarded Forward: what is not explicitly prohibited is allowed Stallings calls this Packet-filtering firewall 5

Transport-level firewall Filters additionally on TP header fields, such as: Source Port Destination Port Flags (SYN, AK) Stallings calls this ircuit-level Gateway SYN SYN, AK AK established 6

Application-level firewall HTTP client HTTP Proxy FTP Proxy xyz Proxy HTTP server TP TP TP TP IP IP 7

Application-level firewall Inspects the contents of packets May filter certain websites, mail-viruses etc. Firewall may accept only trusted connections Logging of accepted connections is easy Performance may be problematic Since this type of firewall is quite complex, it may become a security risk itself 8

Stateless firewall Treats each packet in isolation Has no memory of previous packets For each packet checks firewall rules again Easy to implement / very efficient an not easily handle protocols that use random ports, such as FTP 9

Stateless firewall - Example action src port dest port flags allow * * * 80 * allow {our hosts} * * * * block * * * * * 10

Stateful firewall IF (packet belongs to an existing association )! THEN {accept packet}! ELSE {checks firewalls rules;! IF (packet may pass)! THEN {store association in state table}! ELSE {discard packet}}! Time-out inactive connections onnections may send keep alive SYN attack can overflow State table 11

Stateful firewall Associations may be: TP connections UDP flows IMP request/response pairs Stateful firewalls can, for example, be configured to: Allow associations initiated by internal systems Deny associations initiated by external systems Stateful firewalls can easily deal with protocols such as FTP 12

Where to put the firewall Internet Mail WEB DMZ ritical systems 13

Firewalls versus Network Address Translators Origin of NATs is different from that of firewalls Like Application-level firewalls, NATs modify IP addresses and Port numbers In general, NATs do not inspect application data NATs can be compared to transport-level firewalls Like certain firewall configurations, certain type of NATs accept incoming data only after an external connection has been established If both sides have firewalls / NATs, communication may be difficult / impossible

DNS tunneling

DNS tunneling You sit at the airport WLAN provided, but any access to a Web server, FTP, P2P, is chargeable Is there a way to avoid the fee? Would it be an attack? You are bypassing the billing/security policy of your ISP Data exfiltration for cyber-espionage

DNS tunneling: upstream host helloworld.mydomain.nl? DNS server of ISP helloworld.mydomain.nl? DNS server mydomain.nl

DNS tunneling: upstream Query can contain up to 252 characters haracter set restricted: not case-sensitive,... ~5 bit/character, ~110 bytes

DNS tunneling: downstream helloworld.mydomain.nl? host DNS server X response: hi! response: hi! helloworld.mydomain.nl? DNS server mydomain.nl

DNS tunneling: downstream Main limitation: Response < 512 bytes to prevent fragmentation Server responds with TXT-record: haracter set restricted: 7 bit ASII ~6 bit/character, ~220 bytes As for amplification, EDNS (RF 2671) allows larger answers Using MX-records and A-records is possible, too, but more complicated (data may be reordered)

Example of DNS Tunneling (Iodine) 1329812676.512747 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [S] 1329812676.515310 IP 1.1.1.1.51823 > 2.2.2.2.53: 22911+ [1au] NULL? 0eaba82M-J2hbM->M-nYM-VwjM-GM-MRbM-^M-^PM-\M- UM-HcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-BM-jdilmnuM-iM-bM-ktaM-^XyUwtf.M- BM-^M-o8M-]M-=M-xM-=M-FouZzM-JwaeM-NaM-u.test.domain.nl 1329812676.524541 IP 192.168.1.1.3128 > 192.168.1.2.60531: Flags [S.] 1329812676.525743 IP 2.2.2.2.53 > 1.1.1.1.51823: 15184 1/0/1 NULL (140)M-N.test.domain.nl. (130) 1329812676.524573 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [.] 1329812676.526742 IP 1.1.1.1.51823 > 2.2.2.2.53: 30638+ [1au] NULL? 0ibbb82M-J2hbM->M-nYM-VgjM-GM-MBbM-^M-^PM-\M-TM- XcvM-DtimMeM-`M-KyM-aM-VM-IM-yM-yM-DYM-eM-X3qWgM-JM-SM-qSM-?M- >M-bYyU.xpM-_M-VM-`M-HEM-LJM->M-nf6upM-{M- >.test.domain.nl. (126) 1329812676.557242 IP 2.2.2.2.53 > 1.1.1.1.51823: 22911 1/0/1 NULL (144) 1329812676.525189 IP 192.168.1.2.60531 > 192.168.1.1.3128: Flags [P.], (request web page) 1329812676.558096 IP 1.1.1.1.51823 > 2.2.2.2.53: 38365+ [1au] NULL? 0mbbc82M-J2hbM->M-nYM-VhdM-yEM-rdM-?M->M-q5MM- tcvm-dtimm-em-`m-kym-am-vm-im-ym-ym-dym-em-x3qwmm-jm- SM-M-M-DdbM->M-bM-p4.M-=wM-icOM-x4oM-YM-kM-gM- SiHM-OM-guM-JcPM-<M-=rM-K0M-rf8M-cM-=M-XPgM-@M-HM-RM- \5FM-SM-uM-yM-M-PM->GM-]M-hiM-?M-wQM-KFM-HM.0M-wM- zm-_um-zm-mwm-rm-6m-?m-ppwm-trpm-rm-fwyum-\qm- FGtM-NBM-sgM-<huuTNl6NQ1FM-KvSkWM-H9ESaIM-AX.M-OHM- OM-bYM-wM-PM-3MM-MM-dM-HAM-\3rM-bM-LMM-QfM-^ALM- UM-g18UhM-]QaM-K6M-lM-mlM-IM-`M-naIDM-NM-cM- >.test.domain.nl. (274)

How to detect DNS tunneling? Tunnel packets have different characteristics compared to regular DNS packets. http://armatum.com/blog/2009/a-study-of-dns/

Intrusion Detection Systems

Intrusion Detection System Intrusion detection is the process of identifying (and responding to) malicious activities targeted at computing and network resources Goal: identify intrusions and report them IDS Log model matching data 24

IDS Taxonomy For more info: A revised taxonomy for intrusion-detection systems, Debar, Dacier, Wespi, 2000 http://www.springerlink.com/content/4xq65ng0l0801626/

Knowledge-based vs Behavior-based Also signature-based vs anomaly-based Signature-based IDS: Model/definition of attacks Use exploits or attack signatures an only detect known attacks Example: SNORT model matching capture Log Anomaly-based: Model of normal behavior Detect deviations an detect unknown attacks It often needs tuning

IDS - Performance Log model Ground Truth Benign Malicious IDS Outputs Positive Negative TRUE POSITIVE This is really an attack FALSE POSITIVE IDS reports malicious activity, though activity is OK FALSE NEGATIVE IDS fails to report an activity as malicious TRUE NEGATIVE This is really safe traffic Report rate False negatives ross Error rate matching capture False positives sensitivity 27

Performance tuning example Tuning can be modeled as an optimization problem max wθ α TN + β TP

What is missing in the taxonomy? Network flows

Flow-based intrusion detection an you perform intrusion detection in a backbone network? Several Gbps (link UT-SURFnet 10Gbps; ESnet going towards 100Gbps) Deep packet inspection is typically not scalable to these rates Aggregation: data reduction! First look only to packet headers Not enough: network flows Applicable also in presence of data encryption

Network flows As defined by the IETF IPFIX working group: A set of IP packets passing an observation point in the network during a certain time interval and sharing a set of common properties (RF 3917). Basic flow definition: (src IP, src port, dst IP, dst port, IP protocol, number of packets, number of bytes)! Data reduction: 30x (almost as the heights of a Xperia mini vs a phone booth)

Flow-based Intrusion Detection The cost of data reduction: no payload available What can be detected: attacks that create variations in volume/number of flows Scans DDoS Spam campaigns

an we detect worm spreading using flows? Example: graph-based detection of hit-list worms Hit-list: bootstrapping the spreading phase It would change the connection patterns in a network S S S A S S S S A S S LIENT SERVER Number of hosts A ATTAKER onnected components S S

Other defense techiques

It all starts with monitoring... From last week lecture: the network telescope Identify intensity and frequency of attacks (DoS) Misconfigurations Worm spreading (ode Red, Sapphire) Botnet behaviors See http://www.caida.org/publications/papers/

Spam: some numbers In May 2009, 58% of all spam e-mails were delivered by botnets USA, September, 2009: Zeus: 3.6 million zombies Koobface: 2.9 million zombies

Spam-ampaign on Storm Botnet 347.590.389 82.700.000 10.522 28 (Source: Spamalytics: An Empirical Analysis of Spam Marketing onversion, Kanich et al., 2008)

DNS Blacklists How do we know if a host has sent SPAM? SPAM filter on the local Mail server SPAM traps: hosts that receive and collect information about SPAM messages DNS-Blacklist: list of IP addresses that sent mail to SPAM traps Periodically updated Many of them are publicly availble (BL, PSBL etc..) They use DNS as query protocol for retrieving data

Bad Neighborhoods Suppose you do not want/ cannot access the body of a mail. an you say if it is SPAM or not? There is a correlation between the source IP address of a message and the amount of malicious activities from the same subnetwork