Network Monitoring using MMT:



Similar documents
Network Security Testing using MMT: A case study in IDOLE project

Network Monitoring for Cyber Security

Flow Analysis Versus Packet Analysis. What Should You Choose?

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Guidelines for Web applications protection with dedicated Web Application Firewall

UNMASKCONTENT: THE CASE STUDY

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Indexing Full Packet Capture Data With Flow

FortiWeb 5.0, Web Application Firewall Course #251

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Networking for Caribbean Development

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Cross Site Scripting in Joomla Acajoom Component

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

PART D NETWORK SERVICES

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Cyber Security Workshop Ethical Web Hacking

Intrusion detection for web applications

What is Web Security? Motivation

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

10 Things Every Web Application Firewall Should Provide Share this ebook

Bridging the gap between COTS tool alerting and raw data analysis

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Nemea: Searching for Botnet Footprints

Network Intrusion Analysis (Hands-on)

Networks and Security Lab. Network Forensics

The Hillstone and Trend Micro Joint Solution

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Check list for web developers

Access Control Rules: URL Filtering

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Intrusion Detection System

APPLICATION PROGRAMMING INTERFACE

RSA Security Analytics

DPI and Metadata for Cybersecurity Applications

Network Security Deployment (NSD)

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

April 11, (Revision 2)

Exercise 7 Network Forensics

Where every interaction matters.

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Missing the Obvious: Network Security Monitoring for ICS

IBM Advanced Threat Protection Solution

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Open Source in Government: Delivering Network Security, Flexibility and Interoperability

Web Application Security 101

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Essential IT Security Testing

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

FortKnox Personal Firewall

Monitor Network Activity

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

ACKNOWLEDGMENT. I would like to thank Allah for giving me the patience to work hard and overcome all the

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Release Notes for Websense Security v7.2

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

Open Source Software for Cyber Operations:

Web Application Worms & Browser Insecurity

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Web Application Security Considerations

Firewall and UTM Solutions Guide

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Security 101: BIG-IP ASM and IPS Differences Defined

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Malicious Network Traffic Analysis

Online Network Traffic Security Inspection Using MMT Tool

SANS Top 20 Critical Controls for Effective Cyber Defense

DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES

Security Intelligence Blacklisting

Dynamic Rule Based Traffic Analysis in NIDS

How To Prevent Hacker Attacks With Network Behavior Analysis

Chapter 9 Firewalls and Intrusion Prevention Systems

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

WEB ATTACKS AND COUNTERMEASURES

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

Transformation of honeypot raw data into structured data

Protection, Usability and Improvements in Reflected XSS Filters

Introduction: 1. Daily 360 Website Scanning for Malware

CS5008: Internet Computing

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

SECURING APACHE : DOS & DDOS ATTACKS - II

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

How To Monitor Network Activity On Palo Alto Network On Pnetorama On A Pcosa.Com (For Free)

Web Application Security

Data Breaches and Web Servers: The Giant Sucking Sound

Monitor Network Activity

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Transcription:

Network Monitoring using MMT: An application based on the User-Agent field in HTTP headers Vinh Hoa LA Ɨ Raul FUENTES Ɨ PhD Student Prof. Ana CAVALLI Ɨ Ƭ Supervisor Ɨ Telecom SudParis, IMT Ƭ Montimage France

IDOLE project IDOLE: 3-year French project on Investigation and Operated Detection in Large Scale Passive tools of detection, high-speed correlation, and investigation after incidents. Started since late 2014

Contents Motivation Network Monitoring Montimage Monitoring Tool (MMT) User-Agent field case study Problem statement Methodology Experimental results Discussions Conclusion & perspectives

Motivation Network monitoring by examining metadata Metadata: data about data, an abstract (structural/descriptive) of data, a piece of data... Example: A book ~ data A library ~ data The position of the book in the library (which room, which shelf) ~ metadata IMT s role in IDOLE project: Advanced monitoring techniques for detection and investigation using metadata. Why metadata? Velocity First step: Monitoring using User- Agent Field in HTTP s headers?

Network Monitoring The range of Network Monitoring: Full Packet Capture: Capture everything that goes across the network Typically used on a single network Example: PCAP Meta Data Capture: Capture data associated with a particular network activity Typically in the form of logs Examples: For email traffic capture: from, to, subject, date, attachments For web traffic capture: Source IP, destination IP, URL, User Agent String NetFlow: NetFlow aggregates related packets into unidirectional flows The flow records are collected and stored for later analysis Examples: SiLK, Argus

- C library. Network Monitoring Using MMT (Montimage Monitoring Tool) MMT-Extract - Enable the extraction of wanted-attributes (protocol fields, application exchanged messages or logs ). MMT-Sec - Security rules written in XML referring to both expected and unexpected behaviors. MMT-Operator - Allow a customizable graphical user interface to display the result (still under development) MMT is a DPI tool able to run in real time or with traces files.

Network Monitoring Using MMT (Montimage Monitoring Tool) MMT s position to listen to live traffic

User-Agent field case study: Problem statement What is user agent field? - Statistical purposes - The tracing of protocol violations - Automated recognition of user agents for the sake of tailoring responses. Example of a HTTP header: HTTP request

User-Agent field case study: Problem statement Stored and Reflected XSS (cross-site scripting) 3)Web server stores user-agent strings 2) Hacker connects to the Web server. 4) Admin opens internet browser and views user agent section. Web Server Web Server 1) Hacker modifies the User- Agent with an evil script. User-agent: Mozilla/5.0 <script>alert( XSS Example );(</script><! Stored XSS Sys Admin 5) Server returns the evil script to the admin. The script is executed by the admin s browser.

User-Agent field case study: Problem statement Stored and Reflected XSS (cross-site scripting) 1) Hacker sends malware to the victim which includes a proxy agent. Web Server 3) Victim browses to website that has reflected XSS vulnerability Web Server 4) The web server returns the user-agent in the response. 2) Malware on victim changes browser settings to use hacker proxy agent and user agent. Reflected XSS 5) The victims browser executes the script.

Example 1 User-Agent field case study: Problem statement SQL injection via user agent field 3) Database reads user agent data and executes SQL injection. 1) Hackers creates a manual http request with an SQL injection in the user agent field. Web Server 2) Web analytics collects user agent fields for marketing. Database server Example 2 Web Server 1) Hacker modifies user agent to include an SQL query, 2) Server returns an SQL error in its response page.

User-Agent field case study: Methodology

Experimental results Experiments with offline traffic: Input: PCAP files Ex1 (Tab.I): Rather small traffic. PCAP files contain different malware traffic within normal one (214 036 HTTP GET packets). The packet loss rate is calculated as follow: packet_loss_rate = number_of_packets_lost number_of_packets_sent We noticed not only the deficiencies of SNORT in terms of detection but also a slight dominance of MMT regarding extraction issue. Reason: SNORT utilizes only rules identifying blacklisted User-Agent strings, in other words, only a signature-based technique. Therefore, SNORT is incapable against new abnormal behavior.

Experimental results Experiments with offline traffic: Ex2 (Tab.II): Huge traffic Input: a data-set consists of 80 files PCAP containing 83,850,638 packets with total volume of 39.2 GB. Only read and extract In the first five tests, we ran MMT, SNORT and TCPdump all alone (limited in maximum parallel programs that could consume CPU/RAM resource or network bandwidth) In later five tests, we ran several applications at the same time.

Experimental results Experiments with offline traffic: Ex2 (cont): Execution time of MMT, SNORT and TCPdump in function of traffic volume

Experimental results Experiments with live traffic: Ex3 (Tab.IV): Automatically A simple C application that enables reading normal/abnormal User-Agent strings prepared in a text file and passing the HTTP requests containing them to a web-server.

Experimental results Experiments with live traffic: Ex4 (Tab.V): Manually Mozilla Firefox s Add-on named TAMPER DATA is used to edit manually the User-Agent field and thus, to generate malicious HTTP requests.

Discussions MMT s strength: Heterogeneous intrusion detection approach High-speed extraction and real-time detection Attribute extraction and legal problems MMT is more than a network security monitor: In the presented case study, we concentrate only on security issues. In practice, MMT can also monitor user activities and troubleshoot the network.

Conclusion & perspectives MMT is an extensible and flexible monitoring tool: Applicable as a real-time automated detection of malicious User-Agent strings Applicable for large scale networks, not limited in security but even for other network issues. Our detection approach covers two kinds of threats: attacks in which attackers modify intentionally the User-Agent field in order to perform their evil intention (e.g., SQL injection, Stored and Reflected XSS, and DoS) malicious traffic corresponding to suspicious threats (e.g., malware, botnets or virus) generated intentionally or unintentionally by infected users or proxies.

Conclusion & perspectives Detecting a malicious User-Agent string is NOT ENOUGH to determine a harmful user agent. A good starting point of network traffic inspection. The related IP address and/or domain, payload data sent and received by this host and other correlated hosts should be investigated. Perspectives: Broaden our research over total HTTP headers including other field (e.g., cookies) as well as other network protocols (e.g., SMTP). Correlate different rules and extractions in order to detect more complicated intrusions or attacks (e.g., heart-bleed bug, botnets, etc.)

Thank you!