Building an Early Warning System in a Service Provider Network



Similar documents
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

Securing the system using honeypot in cloud computing environment

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Security Toolsets for ISP Defense

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

Putting the Tools to Work DDOS Attack

Multifaceted Approach to Understanding the Botnet Phenomenon

AT&T Real-Time Network Security Overview

About Botnet, and the influence that Botnet gives to broadband ISP

Detecting peer-to-peer botnets

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Honeypots / honeynets

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Hunting down a DDOS attack

Stop DDoS Attacks in Minutes

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Firewalls and Intrusion Detection

INTRODUCTION TO FIREWALL SECURITY

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Denial of Service Attacks

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Malicious Network Traffic Analysis

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Networking for Caribbean Development

Keywords Intrusion detection system, honeypots, attacker, security. 7 P a g e

How to launch and defend against a DDoS

How to build and run a Security Operations Center

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

A Critical Investigation of Botnet

Campus LAN at NKN Member Institutions

Information Security Threat Trends

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

PROFESSIONAL SECURITY SYSTEMS

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

Top 5 Essential Log Reports

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help

HoneyBOT User Guide A Windows based honeypot solution

NGN Next Generation Nightmare? What telco 2.0 really means

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

FortiDDos Size isn t everything

Bleeding Edge DDoS Mitigation Techniques for ISPs

Denial of Service Attacks

The HoneyNet Project Scan Of The Month Scan 27

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Seminar Computer Security

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Chapter 9 Firewalls and Intrusion Prevention Systems

Team Cymru. Network Forensics. Ryan Connolly, <

TDC s perspective on DDoS threats

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

THE BEST WAY TO CATCH A THIEF. Patrick Bedwell, Vice President, Product Marketing

CYBERTRON NETWORK SOLUTIONS

Yahoo Attack. Is DDoS a Real Problem?

DDoS Overview and Incident Response Guide. July 2014

Attacks Against the Cloud: A Mitigation Strategy. Cloud Attack Mitigation & Firewall on Demand

Cisco IOS Flexible NetFlow Technology

Distributed Denial of Service protection

BotNets- Cyber Torrirism

NetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Traffic Diversion Techniques for DDoS Mitigation using BGP Flowspec. Leonardo Serodio May 2013

Network reconnaissance and IDS

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Botnets: The Advanced Malware Threat in Kenya's Cyberspace

How To Perform A Large Scale Attack On A Large Network

SECURING APACHE : DOS & DDOS ATTACKS - II

Certified Ethical Hacker Exam Version Comparison. Version Comparison

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

General Network Security

CMPT 471 Networking II

Service Provider Solutions. DDoS Protection Solution. Enabling Clean Pipes Capabilities

Second-generation (GenII) honeypots

Introduction: 1. Daily 360 Website Scanning for Malware

Use of Honeypot and IP Tracing Mechanism for Prevention of DDOS Attack

Cheap and efficient anti-ddos solution

Radware s Behavioral Server Cracking Protection

Transcription:

Building an Early Warning System in a Service Provider Network Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom nico@securite.org - http://www.securite.org/nico/ version 1.1

Building an Early Warning System in a Service Provider Network Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom nico@securite.org - http://www.securite.org/nico/ version 1.1

Agenda» What are ISPs/NSPs looking for?» Honeynet-like sensors > Routers as honeypots > DDoS detection with honeybots > Traffic diversion to honeyfarms» Other information sources > System data > Security data > Network data» Early Warning System > Putting all the information bits together» Conclusion 3

DDoS, Worms and the Underground» MEECES an acronym for > Money > Ego > Entertainment > Cause > Entrance into social groups > Status» Max Kilger (Honeynet Project) > Applies to the underground/ hacker /blackhat community > INTEL agencies MICE (Money, Ideology, Compromise, Ego) 4

DDoS, Worms and the Underground» What have we seen up to now > Cause/Hacktivism: - Web site defacement - DDoS (SCO, WU/MSFT, etc) > Ego/Status: - I have more (network) power than you - I m not going to loose that item in <online game> > Entertainment - Hey look, I just DoSed <favorite IRC user/website> > Entrance into a social group - Wanna trade this botnet? 5

DDoS, Worms and the Underground» What have we seen up to now > Money: - BGP speaking routers - SPAM, botnets, open proxies, etc. - C/C numbers incl. personal information, ebay accounts, etc.» Where are we today? Real money > Pay or get DDoSed > Worms for SPAM > Organized crime using real world proven ways of making money on the Internet > Targets: online business, mainly gaming/gambling/betting sites nowadays 6

DDoS, Worms and the Underground» Where are we today > Loosing a botnet isn t a tragedy > Mass-acquisition tools are mandatory > Protect your property (host and communication channel) - Control channel over IRC/P2P/not so common protocols/ipv6 (anonymous) - Secure the host to avoid multiple zombies/agents > Not for fun on free time anymore (people with network and DoS filtering technology/techniques skills) > The skills, knowledge, organization and hierarchy are not different/worse in the blackhat world anything but not the chaotic world we all expect 7

DDoS, Worms and the Underground» Where are we today > A few hundred/thousand dollars/euros is a yearly salary in poor countries > AP and SA are the main sources, not (just).ro anymore > Usually good education, leaving in a country with a high number of unemployed people > Most of the communications are in-band (Internet), out-ofband is limited to hacker meetings or local phone calls > Do you have the resources to analyze TBs a day of IRC logs coming from compromised hosts/honeypots (in x different languages)? 8

DDoS, Worms and the Underground» A vulnerability s life cycle: worm or not? Victims Proof of Concept Automated Noise Exploit PoC + Exploit + Worm? Time Vulnerability found Vulnerability found again Disclosure bad patch Patch available Patch deployed > Key: is the exploit generic? [Messenger vs LSASS] Full/fixed patch 9

What are ISPs/NSPs looking for?» An EWS in a large network > Detect - DDoS attacks - (Unknown) worms - SPAM - Covert channels - Hacked system - Open proxies - Scans > Detect it early! > Cover a large network - Distributed approach, bandwidth/pps requirements and system performance > Easy to detect/fingerprint? 10

What are ISPs/NSPs looking for?» An EWS in a large network > Lots of data > Information sources - Honey* sensors - Systems and Applications - Security devices - Network» Quick 101 - BGP - MPLS - Netflow - DDoS - Honeypot 11

Honeyrouters» Routers as honeypots > BGP speaking routers > Traded in the underground: more value than ebay accounts or valid CC numbers - Makes them good targets > Password policy issue - Are miscreant just scanning for open telnet/ssh or brute force the login and try out commands? > BGP route injection: DDoS attack or SPAM? 12

Honeyrouters» Network architecture internet BGP session filter honey tacacs AAA 13

Honeyrouters» Using honeyd > Cisco CLI/telnet script > SNMP script» Using an UNIX+Zebra > Cisco-like CLI» Using a Cisco router > Real BGP feed - read-only BGP session > Real fake account - AAA and TACACS+ > Real network connectivity - IP filtering and rate-limiting 14

Honeybots» DDoS attack detection with honeybots/honeyzombies > DDoS attack detection - Netflow, ACLs, SNMP, etc. > Other SPs DDoS detection - Backscatter data - Honeybots. 0) Infected host post-mortem/forensics. 1) Run bots and DDoS agents/zombies in a sandbox. 2) Watch IRC, P2P, control channel communications 15

Honeybots» Network Architecture ircd/p2p command/control channel internet filter host malware (ddos agent/zombie) 16

Honeyfarms» Traffic diversion to honeypots ibgp route bgp edge internet MPLS LSP filter honeypot honeypot edge traffic flow honeypot 17

Honeyfarms» Traffic diversion to honeypots > Easy traffic rerouting > May be invisible > Limitations - RTT/TTL may change - Overhead (L2TP and especially GRE/IPIP) > Use low-interaction honeypots - Basic TCP/UDP listeners, no real active response - honeyd > Avoid high-interaction (unless you have time and resources) > Established sessions - p0f v2: learn what the source may run on 18

System Data» System information sources > Exposed services - SMTP (mail server/relay): virus@mm - DNS (authoritative/caching): Zonelabs/TAT14 - HTTP (portal/cache) > System logs 19

System Data» What not to do (at least not as an SP) > Use honeypots/fake open relays to detect and fight SPAM - Risk of ending up in RBLs > Use open proxies to detect surfing, phising, etc. > Use honeypots/honeybots to bite back and clean up attacking systems: Active Defense - Legal issues - Not customers and even if they are AUP? - Usually causes more harm than good! > But an interesting approach inside an IT network - Automated network management - Perimeter is defined 20

Security Data» Security information sources > Firewalls > xids > Anti-virus > Security logs 21

Network Data» Network information sources > Routers - ACLs - urpf and interface counters - Requires a mix of scripts and SNMP polling > Traffic - Netflow. Header (src/dst IP, src/dst port, protocol, ingress interface, ToS but exports TCP flags, ASN, etc) and inbound only - Full traffic dump (RMON/SPAN/RTE/tap) in specific locations (hosting center upstreams, DSL/dial aggregation, etc) - Dark IP space - Sinkholes 22

Network Data» Network information sources > Routing - BGP updates - Route-server - Projects. RIPE RIS. Netlantis 23

Netflow and BGP» Network Architecture tr SOC ixpr tr collector controller collector ccr ar Router types Edge Access ppr ccr ar Flows (Sampled) Netflow and R/O BGP session Aggregated Netflow and BGP information (SNMP) Alerts 24

Dark IP space/sinkholes» Network Architecture customer bgp internet filter unallocated network traffic sinkhole customer customer 25

Dark IP space/sinkholes» Collecting backscatter data Bad guy Master agent Victim (s) Slave agents (zombies, bots) Owned host Third parties [backscatter] 26

Dark IP space/sinkholes» Setup > BGP speaking router - Route-reflector - Full ibgp mesh > Announce PA/PI allocations > Non-allocated/unused prefixes routed to the sinkhole/darkip monitor > More-specific route followed for allocated (customer space) > Dynamic (add/remove) - Take the prefixes history into account. Ceased customers. Allocation method (dial/dsl): lots of short term noise > Central or distributed/regional deployment? - IP Anycast 27

Dark IP space/sinkholes» Data analysis > What kind of information will you get? > How to identify backscatter from other (rogue) traffic 28

Early Warning System» EWS > Share/reuse data with/from your SOC (SIM/SEM) central syslog server applications logs security logs and events network sources honey* sources aggregate/correlate lookup display/alert search SIM/SEM 29

Early Warning System» EWS > Which data have value? - High value - Low value > Use the human eye to catch anomalies > Challenge: how to display and visualize data» Can be deployed and useful inside an IT network» Don t put your network at risk by deploying these sensors 30

Conclusion» Conclusion» See also > Backbone and Infrastructure Security Presentations - http://www.securite.org/presentations/secip/ > (Distributed) Denial of Service Presentations - http://www.securite.org/presentations/ddos/» Q&A» Thanks > Lolo, Phil, Marc, Lance, Jose and Toby Image: www.shawnsclipart.com/funkycomputercrowd.html 31