Online Network Traffic Security Inspection Using MMT Tool



Similar documents
Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

CSCE 465 Computer & Network Security

Introduction to Wireless Sensor Network Security

Intrusion Detection for Mobile Ad Hoc Networks

Wireless Sensor Networks Chapter 14: Security in WSNs

Current and Future Research into Network Security Prof. Madjid Merabti

Computer Security: Principles and Practice

Network Monitoring using MMT:

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Computer Security DD2395

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security Demonstration - Snort based IDS Integration -

Network Security Testing using MMT: A case study in IDOLE project

Intrusion Detection Systems

Introduction of Intrusion Detection Systems

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CTS2134 Introduction to Networking. Module Network Security

Traffic Analyzer Based on Data Flow Patterns

NETWORK SECURITY (W/LAB) Course Syllabus

Intrusion Detection in AlienVault

Network/Internet Forensic and Intrusion Log Analysis

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Network Intrusion Detection Systems. Beyond packet filtering

CHAPTER 1 INTRODUCTION

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

DJRA1.6 FINAL RELEASE OF NEW GRID MIDDLEWARE SERVICES

Intrusion Detection from Simple to Cloud

Computer Security DD2395

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IDS : Intrusion Detection System the Survey of Information Security

Intrusion Detection: Game Theory, Stochastic Processes and Data Mining

Role of Anomaly IDS in Network

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

How To Write A Transport Layer Protocol For Wireless Networks

Firewalls Netasq. Security Management by NETASQ

Dynamic Rule Based Traffic Analysis in NIDS

STUDY OF IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) VIA DIFFERENT APPROACHS

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Network & Agent Based Intrusion Detection Systems

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

MASSIF: A Highly Scalable SIEM

SBSCET, Firozpur (Punjab), India

WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Radware s Behavioral Server Cracking Protection

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

CSCI 4250/6250 Fall 2015 Computer and Networks Security

SURVEY OF INTRUSION DETECTION SYSTEM

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Information Security Basic Concepts

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Network Security 101 Multiple Tactics for Multi-layered Security

Security in Ad Hoc Network

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

WINSOME: a Middleware Platform for the Provision of Secure Monitoring Services over Wireless Sensor Networks

CS5008: Internet Computing

INTRUSION DETECTION SYSTEMS and Network Security

Self-protecting multi-cloud applications

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

PROFESSIONAL SECURITY SYSTEMS

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

The Comprehensive Guide to PCI Security Standards Compliance

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

DDoS Protection Technology White Paper

CorreLog Alignment to PCI Security Standards Compliance

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Project 25 Security Services Overview

RAVEN, Network Security and Health for the Enterprise

FISMA / NIST REVISION 3 COMPLIANCE

Prediction of DDoS Attack Scheme

Transcription:

Online Network Traffic Security Inspection Using MMT Tool Wissam Mallouli, Bachar Wehbi, Edgardo Montes de Oca Michel Bourdellès, Denis Rocher and Arnaud Baloche Montimage EURL, 39 rue Bobillot, 75013 Paris France THALES CS, 160 Bd de Valmy, 92704 Colombes France 9th Workshop on System Testing and Validation (STV) Wednesday October 24, 2012

Company Overview Montimage is an innovative SME Creation year: 2004 Location: 39 rue Bobillot 75013 Paris Services Reliable software design and development Test and validation Innovative testing and monitoring tools (functional, security, QoS) Flagship tool : Montimage Monitoring Tool (to be released 2012 as Open Source) 19/04/12 2

Motivation Different methodologies: Signature based analysis: e.g. SNORT, Cisco intrusion prevention system Behavior based analysis: anomaly detection based on state-full protocol analysis: Using scripts, e.g. BRO (scripting language enabling protocol and semantic analysis), Hard coded security properties, proprietary tools 19/04/12 Using Model, e.g. MMT

Motivations Different technologies: Network-based IDPS: examines network traffic and monitors multiple hosts Host-based IDPS: identifies intrusions by analyzing system calls, logs, file-system modifications... Wireless IDPS: specialized for wireless communication Network Behavior Analysis (NBA) Security Information and Event Management (SIEM): integrates and correlates different sources 19/04/12

Motivations Problems: To many false positives due to bad traffic (bugs, corrupted and lost packets) Performance and scalability: tracking of simultaneous sessions Denial of service attacks are not based on incorrect behaviour Proposed solutions: Specialized detection and correlation of different data sources Distributed detection mechanisms: integrate and correlate different sources Combine different methods and techniques: QoS, machine learning, statistics, pattern matching... Transparency: open source engine, properties to analyze are known by the end user. 19/04/12

MMT Overview User defined reports Add analysis modules HW/SW Probe Can be installed on dedicated HW Modular solution Software library (SDK) Can be integrated in 3rd party SW Add plugins 19/04/12 6

MMT in a transport network Scenario

MMT: Innovation Use of security properties to describe both wanted and unwanted behaviour Not exclusively based on pattern matching like most intrusion detection techniques More abstract description of sequence of events (MMT properties) Can integrate performance indicators, statistics and machine learning techniques; as well as countermeasures Allows combining centralised and distributed analysis to detect 0-day attacks (under development) Applicable in several domains (at protocol, application and business levels) Open-source generic core with a plug-in architecture Allows combining active and passive approaches

MMT properties (1/3) MMT-Security properties have two types: A Security rule describes the expected behaviour of the application or protocol under-test. The non-respect of the MMT-Security property indicates an incorrect behaviour. An Attack describes a malicious behaviour whether it is an attack model, a vulnerability or a misbehaviour. The respect of the MMT-Security property indicates the detection of an abnormal behaviour that might indicate the occurrence of an attack.

MMT properties (2/3) Set of properties specifying constraints on the message exchange e.g., the access to a specific service must always be preceded by an authentication phase Set of properties referring to a vulnerability or to an attack e.g, a big number of requests from the same user in a limited period can be considered as a behavioral attack 19/04/12 10

MMT properties (3/3) A security property is composed of 2 parts: A Context A Final condition (trigger) The Context and Trigger of a property are composed of: Events Simple events Complex events linked by logical operators (AFTER/BEFORE/AND/OR) A simple event is composed of: Attributes (values of packet fields, values of sessions attributes, time of reception, length of message, statistics ) Conditions on attributes (IP @ equal to 1.2.3.4)

Radio Protocol case study Provided by Thales: definition of ad-hoc waveform «networking» protocols and algorithms High Data Radio Network Wave Form Technical challenges 19/04/12 Automatic network: no initial planning Network continuity whatever are the stations in the network On the move automatic network reorganization and operation End-to-end heterogeneous user services transmission: voice, messages Decentralized mesh network. No base stations.

Radio Protocol case study Detection of potential attacks Link spoofing, Link withholding attack, Data alteration, Flooding attack, Blackhole attack, Denial of service, Replay Data alteration MAC PDU header MAC PDU header Node A intrusive Node B 19/04/12

Testing architecture SMARTESTING Security test generation model and test purposes specification Generation of test scenarios denoting attacks using Certify-it FSCOM TTCN3 test cases specification Test execution using TT-Workbench MONTIMAGE Specification of 19 security properties Online analysis of captured messages and detection of attacks occurrences

Thales Case study Security rules specification Threat: Deny of service by flooding of RLC_CL_UNIT_DATA_ACK messages Security property: A message RLC_CL_UNIT_DATA_ACK must be preceded with a message RLC_CL_UNIT_DATA_REQ that asked for acknowledgement (R == 00010000) (correlation with the USER_TRANSACTION_ID) BEFORE RLC_CL_UNIT_DATA_ACK message BASE.PROTO == 5152 && MSG_RLC_CL_UNIT_DATA_ACK.U SER_TRANSACTION_ID == MSG_RLC_CL_UNIT_DATA_REQ. USER_TRANSACTION_ID.2 RLC_CL_UNIT_DATA_REQ message that asked for acknowledgment BASE.PROTO == 1056 && MSG_RLC_CL_UNIT_DATA_REQ. QOS_R == 128 Context Trigger

Thales Case study Security rules specification Security requirement: Every node must periodically send a notification message that includes the list of its neighbors on its allocated service slot. Attack scenario 1: A malicious node sends a message on a nonallocated service slot. Specified security properties: If one node receives two successive MSG_SPHY_DATA_IND messages from the same source, then these two messages must to be separated by 50 slots If one node receives two MSG_SPHY_DATA_IND messages from different sources, then these two messages must have two different slot ids

Example report total for each rule list of events (and data) that lead to the verdict

Results and conclusion A plugin for data extraction from collected messages has been developed for layer 2 protocols and services. Will be extended for Layer 3 protocols and services A set of 19 security properties have been specified and checked by Montimage More properties (~50) are in the design phase Future work Distributed monitoring is planned Supported by DIAMONDS project 26/10/2012 18