Troubleshooting & Traffic Mining(TM) Stefan Burschka



Similar documents
Solution of Exercise Sheet 5

From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol

Effective Methods to Detect Current Security Threats

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Malicious Network Traffic Analysis

CS5008: Internet Computing

Building the Next Generation of Computer Security Professionals. Chris Simpson

Security Type of attacks Firewalls Protocols Packet filter

Effective Methods to Detect Current Security Threats

Bypassing firewalls Another hole in the wall ;-) Présentation pour «La nuit du hack» le 13 Juin 2009

Topics in Network Security

Passive Vulnerability Detection

Skype characteristics

Detecting rogue systems

Virtual Private Networks

On the Deficiencies of Active Network Discovery Systems

information security and its Describe what drives the need for information security.

IS L06 Protect Servers and Defend Against APTs with Symantec Critical System Protection

Hadoop Technology for Flow Analysis of the Internet Traffic

Description: Course Details:

Firewalls. Pehr Söderman KTH-CSC

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

Concierge SIEM Reporting Overview

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

How to Configure Captive Portal

Overview. Packet filter

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

Network Defense Tools

Firewalls. Ahmad Almulhem March 10, 2012

Basic & Advanced Administration for Citrix NetScaler 9.2

Web Conferencing Version 8.3 Troubleshooting Guide

INFORMATION SECURITY TRAINING CATALOG (2015)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Introduction to Network Security Lab 2 - NMap

Assignment # 1 (Cloud Computing Security)

Lab Objectives & Turn In

5 Steps to Avoid Network Alert Overload

Mark Bennett. Search and the Virtual Machine

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

Information Leakage in Encrypted Network Traffic

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Proxy firewalls.

Learn Ethical Hacking, Become a Pentester

Network Traffic Analysis

The Hillstone and Trend Micro Joint Solution

Signal Customized Helpdesk Course

Penetration Testing with Kali Linux

Intrusion Detection System

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

capabilities statement

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Chapter 14 Analyzing Network Traffic. Ed Crowley

CS Computer and Network Security: Firewalls

Firewall Examples. Using a firewall to control traffic in networks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Monitor network traffic in the Dashboard tab

Firewalls for small business

CSC574 - Computer and Network Security Module: Firewalls

MikroTik RouterOS Workshop Load Balancing Best Practice. Warsaw MUM Europe 2012

How to protect your home/office network?

McAfee Web Gateway 7.4.1

Malware in the clouds. Building the Undetectable Bot

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

BorderWare Firewall Server 7.1. Release Notes

Monitoring Traffic manager

TECHNICAL CHALLENGES OF VoIP BYPASS

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Penetration Testing 2014

co Characterizing and Tracing Packet Floods Using Cisco R

Networking Technology Online Course Outline

Stephen Coty Director, Threat Research

Wireless Security: Secure and Public Networks Kory Kirk

GregSowell.com. Mikrotik Security

Copyright 2008 Link Technologies,Inc. A Proud Vendor Member of the

CS Computer and Network Security: Firewalls

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Arbor s Solution for ISP

Thingsquare Technology

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

Announcements. Lab 2 now on web site

Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek,

Collecting information

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

IBM Security IBM Corporation IBM Corporation

SSL Inspection Step-by-Step Guide. June 6, 2016

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Big Data: Impact and applications in Grocery Retail

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

When talking about hosting

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Transcription:

Troubleshooting & Traffic Mining(TM) Stefan Burschka

Agenda Intro: Who, What, Problems with big traffic data How to address problems with brain & tools Lots of examples and exercises

What we do: Products: Network Troubleshooting, Forensics, Security TRANALYZER(T3): High Speed and Volume Traffic Analyzer TRAVIZ3: Graphical Toolset for Tranalyzer Complete Tool Sets for TM & Forensics Artificial Intelligence Plugins Research: Brain support 4 multi-dimensional datasets Encrypted TM Big Data Visualization (Traviz) Malware and covert channel detection Nifty stuff 3

Data (Traffic) Mining Forensics Input: Huge Tiny Answer Output: Tiny Large Puzzle Almost Everything Find what everybody missed Find patterns, anomalies and the undetectable. Almost Nothing 193.5.230.129, 80 Tell me everything and especially Owner, gender, colour of hair and underpants, talks to pigs?, OS, type of computer... 4

Traffic Mining(TM): Hidden Knowledge: Listen See, Understand, Invariants, Model Application in Troubleshooting, Security (Classification, Encrypted TM ) Netzwerk usage (VoiP, P2P traffic shaping, application/user profiling) Profiling & Marketing (usage performance- & market- index) Law enforcement and Legal Interception (Indication/Evidence) 5

Right! But why all this? What is the problem?

Problem: Controlled Flight into Terrain There is a union for the lifeform SW I m on strike Seldom problem oriented KISS Engineering High Complexity, small fault tolerance Time- and economic pressure, info overload Customer = Test Lab Banana Principle: Conditioning of cutomers SW became a weapon 7

The Network is slow, The Network is insecure; NO, it's not Microsoft, shut up, It wasn't me... Manager (MBA) Always right, DoR License to Powerpoint Production (poor Techie) Knows, Always warned, Always his fault: FUBAR License to get fired Finance (MBA) Knows basic calculus License to Excel We didn't find the problem in 4 months, can you do the job in 2 weeks? (We supply only 11TB data)

Large unstructured Traffic Datasets(/s) Problem Comprehension? WTF am I looking for? Data Selection: I d like to have Eat what you get! Preprocessing: Dimension Reduction, Feature Selection Data Integrity: Churchill / Murphy Formats: XML, EXCEL Binary, (txt) Tools/Interfaces: Microsoft, Java Bash, awk,db Operating Storage: Cache Memory SSD Disk FBHDD Visualization, AI 9

10 Exercise: What is wrong here?

See the disaster now? Now you have context! 11

Preprocessing/Context/Dimension Reduction Versatile Flow Compression A B Definition: (6-Tuple) Vlan(s), srcip, srcpport, dstip, dstport, L4Protocol Or why not a bit more context and meaning? srcwho, dstwho srcnetwork, dstnetwork Bad, Good Internal / External 12

Tranalyzer Flow Example A 1196278772.439355 1196279184.642073 412.202718 0x9B42 22 192.168.1.10 0x00000001 2119 182.236.128.34 0x8008036C 80 6 00:0f:1f:cf:7c:45_00:00:0c:07:ac:0a_6387 http 6387 8272 464 5437587 0 579 15.494803 1.125660-0.128590-0.999829 1 87 128 128 0x00 0x42 0x0000 116 464 6231 4116 5437724 2253 63754 64831.988281 62501 65535 3342 2904 5713 0x18 0xF900 0x0000 0x03 0x00000000 0x0000-1.0 3 36578 1... B 1196278772.409312 1196279184.642073 412.232761 0x9B43 22 182.236.128.34 0x8008036C 80 192.168.1.10 0x00000001 2119 6 00:d0:00:64:d0:00_00:0f:1f:cf:7c:45_8272 http 8272 6387 5437587 464 0 1380 20.066333 13190.574633 0.128590 0.999829 1 3 63 63 0x00 0x42 0x0000 8146 5440245 109 116 464 8104 5840 5840.000000 65535 0 0 0 0 0x18 0x1B00 0x0000 0x03 0x00000000 0x0000-1.0 36578 3 1... 13

Yeah sure, lots of numbers. But encryption prevents TM! Which features you want to look at?

Encrypted TM: Packet Length Magic Distinguish from by listening Gap in tracks Tump Tump Tump Tump Tump Tump Tump Tump Sound ~ F d p dt dm dt v m dv dt dm dt dm dpkt dpkt dt 15 Packet Length Packet Fire Rate (Interdistance)

3D Statistical Application / User profiling Packet length-interdistance Statistics: Fingerprinting Vulnerable against TM 16

Packet Signal: Encrypted VoIP Mining Packet Length 17 time

Exercise: Multiple Flow Packet Length Signal See the features? Codec training Burschka (Fischkopp) Linux Dominic (Student) Windows SN Ping min l =3 18

So what can I do with it?

Encryption TM SSH Command & Parameter Estimation IPSEC Tunnel: Application / User Profiling Skype Content Guessing: CCC 2011 (Datamining for Hackers) 20

Any other useful features?

Exercise: What is the Unknown? 22

So what? Some real Application now!

The one way TCP flow problem Symptom: on and off access problems TCP flows established, unidirectional T2 proofed: Reverse connection exists, not through firewall OSPF Trampel

Destination IP Connection Matrix Awk {if($16).}. Sort uniq. Source IP

Application / User roles / Malware Detection

Layer3/4 Visualization Graphviz --> simple forensic picture for small datasets

Connection Flow Matrix / t

Anomaly Flow Graph: Network / Host Classification Centrality

Sledgehammer Dimension Reduction: AI

Clustering of Multidimensional Data ESOM: Nonlinear Mapping Retina 31

ESOM Anomaly Picture: 13 Dim statistical T2 Flow parameters Now conceivable by human brain Bot Scanner DNS Zone Transfer 32

Mooooment Loriot

Exercise: AI yourself Microsoft 34

Exercise: Knowledge Extraction Data: Bad Weather - Low Pressure Rain Coat - Clouds Storm - Clouds Rain Noodle - Sun Rain Clouds - Spring Autumn - Pressure sinking Heating Data: Good Weather - Sun Sea Bomb - High Pressure Isobar Sun - Pressure climb Grill Steak - Sun Friends Beer - Sun Beach Clouds - Summer Sun Good Weather = Sun & / Rain Words or Word Chains, which separate most of data sets correctly, have highest Information gain. 35

Questions / Comments Try me! Who wants Bootcamp? http://sourceforge.net/projects/tranalyzer/ http://tranalyzer.com http://sourceforge.net/projects/traviz Google: Dataming for Hackers 36 stefan.burschka@ruag.com