Intrusion Log Sharing University of Wisconsin-Madison



Similar documents
1 Log visualization at CNES (Part II)

Traffic Monitoring : Experience

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Introduction of Intrusion Detection Systems

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Blacklisting and Blocking

highly predictive blacklisting

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Multi-Homing Security Gateway

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

TEACHING AND EXAMINATION SCHEME FOR

Intrusion Detection Systems with Correlation Capabilities

Norton Personal Firewall for Macintosh

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

McAfee Next Generation Firewall (NGFW) Administration Course

Configuring Security for FTP Traffic

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

USM IT Security Council Guide for Security Event Logging. Version 1.1

University of Hawaii at Manoa Professor: Kazuo Sugihara

DJRA1.6 FINAL RELEASE OF NEW GRID MIDDLEWARE SERVICES

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

FIREWALL AND NAT Lecture 7a

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Intrusion Detection Systems

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

IDS / IPS. James E. Thiel S.W.A.T.

Introduction to LAN/WAN. Network Layer

Case Study: Instrumenting a Network for NetFlow Security Visualization Tools

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log

F-SECURE MESSAGING SECURITY GATEWAY

Supporting Multiple Firewalled Subnets on SonicOS Enhanced

A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus

Intrusion Detection in AlienVault

Calculation Algorithm for Network Flow Parameters Entropy in Anomaly Detection

A Biologically Inspired Approach to Network Vulnerability Identification

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

Guidelines for Web applications protection with dedicated Web Application Firewall

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SYSPRO Point of Sale: Architecture

ThreatSTOP Technology Overview

Contents. Intrusion Detection Systems (IDS) Intrusion Detection. Why Intrusion Detection? What is Intrusion Detection?

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Is your SIEM ready.???

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Attack and Defense Techniques 2

How To Protect Your Network From Attack From A Hacker On A University Server

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Intrusion Detection System (IDS)

Blacklist Example Configuration for StoneGate

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

Using IPsec VPN to provide communication between offices

Conclusions and Future Directions

Detecting rogue systems

Internet Services. CERN IT Department CH-1211 Genève 23 Switzerland

Banking Security using Honeypot

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

NERC CIP Version 5 and the PI System

The Comprehensive Guide to PCI Security Standards Compliance

Best Practices for Deploying SSDs in a Microsoft SQL Server 2008 OLTP Environment with Dell EqualLogic PS-Series Arrays

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Fuzzy Network Profiling for Intrusion Detection

Firewall Security: Policies, Testing and Performance Evaluation

Security Technology: Firewalls and VPNs

Firewall Firewall August, 2003

CorreLog Alignment to PCI Security Standards Compliance

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Setting Up Scan to SMB on TaskALFA series MFP s.

Challenges in Cyber Security Experiments: Our Experience

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Transcription:

Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt (bethenco@cs.wisc.edu) Jason Franklin (jfrankli@cs.wisc.edu) Mary Vernon (vernon@cs.wisc.edu) 1

Talk Outline Background: Blacklists, DOMINO System Open Questions DShield logs Preliminary Analysis Results Ongoing Work 2

Background: Blacklists Goal: deny access to hosts considered bad relative to the site s policies e.g., a host that performs a port scan Given: a set of firewall and NIDS logs generate: a blacklist of hosts to block Blacklist failure: when a connection is not blocked and the source host is later on the blacklist 3

Background: DOMINO System architecture: 20+ axis nodes in an overlay network each axis node: maintains a NIDS & an active sink obtains NIDS logs from satellite nodes exchanges hourly, daily, and monthly blacklists with other axis nodes & distributes to satellite nodes provides query engine with capability to trigger a new summary 4

Background: DOMINO System Analysis of 1600 NIDS logs 40-60 logs together give correct ordering of offenders & target ports /24 site logs or /16 site logs 1024 offenders perform 90% of the scans in a given hour the similarity in 2 sites blacklist orderings is correlated with the IP distance between the sites 2 years required to scan entire subnet to avoid top 60 hourly or daily blacklist 5

Background: DOMINO System each axis node votes for an alert if: 200% increase in hourly number of scans, 100% increase in number of offenders during hour, and number of offenders is > 5 50 access nodes & 20% consensus: avg. reaction time for SQL Snake is close to 0 6

Background: DOMINO System summary: 20+ axis nodes, each with satellite nodes sharing blacklists increases site s knowledge of global top offenders & global top target ports consensus alerts for increase in scans & offenders decreases average reaction time for worms not known: whether sharing logs decreases blacklist failure 7

Open Questions 1) benefit of obtaining NIDS logs from other sites for blocking future attacks What is the maximum increase in the percentage of future attacks that a site can block? i.e., with full blacklist from each other site compared with only the site s own blacklist What percentage of future attacks can t be identified from the global blacklist? 8

Open Questions 1) benefit of obtaining logs from a single active sink (compared to NIDS logs) for blocking future attacks 2) If NIDS logs are beneficial, which minimal set of peers provides the maximum benefit? 3) How frequently should log information be exchanged? 9

Metric: Blacklist Quality B i : blacklist at beginning of time period i I i : set of hosts that attempt connections during i quality of the blacklist at time i: q i B i I i B i1 I i B i1 % of attackers that can t be identified: 10 1 q i

Shared Blacklist Max. Benefit maximum possible benefit of shared blacklists: compare quality of B i = local blacklist vs B i = global blacklist q i B i I i B i1 I i B i1 11

Experimental Data DShield project: central repository of NIDS & firewall log data collected from 1600 providers across Internet number of hosts: 1 to 65,000 number of log entries per second: 10-5 to 100 Initially: 4 consecutive days of data 12

What is DShield? ~30 million log entries collected per day Log entries are of the form <time, date, submitter, source IP, source port, dest. IP, dest. port> Live statistics published at www.dshield.org 13

DShield Sites: Size & Log Entry Rate 14

Visualization of Log Data Each pixel, colored by source IP address, represents a failed connection Port scans show up as horizontal sequences of identically colored pixels 15

Experimental Setup Network intrusion logs from 1600 sites obtained from DShield project 4 consecutive days of complete log data Compute for each hour: Number of attack sources not in site s blacklist Number of attack sources not in global blacklist 16

Preliminary Results Connections this site can block using only its own experience 17

Preliminary Results Connections this site can block with the help of other sites 18

Preliminary Results Connections this site cannot block with any data 19

Preliminary Results Site with max attack sources, max not in site blacklist & max not in global blacklist 20

Preliminary Results Site with max absolute gain from log sharing 21

On-going Work Active Sink Benefit maximum increase in percentage of future attacks that can be blocked using blacklist from a single active sink vs size of the sink 22

Ongoing Work Optimal Peering Problem which minimal set of peers provides maximum benefit for blocking future attacks? is the optimal set of peers time-varying? static or adaptive algorithm for determining the set of peers 23

Ongoing Work Essential Data Selection problem What minimum subset of data exchange achieves maximum benefit for blocking future attacks? Log file summary creation Incremental log transmission 24

Questions Questions? Comments? 25

26

Intrusion Log Sharing University of Wisconsin-Madison John Bethencourt (bethenco@cs.wisc.edu) Jason Franklin (jfrankli@cs.wisc.edu) Mary Vernon (vernon@cs.wisc.edu) 27