Internet Measurement Research



Similar documents
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. Duisburg, June 19, 2015

Understanding Slow Start

Use Domain Name System and IP Version 6

A Very Incomplete Diagram of Network Attacks

CS5008: Internet Computing

Improving DNS performance using Stateless TCP in FreeBSD 9

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

CS 356 Lecture 16 Denial of Service. Spring 2013

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Security of IPv6 and DNSSEC for penetration testers

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

Description: Objective: Attending students will learn:

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Defending against DNS reflection amplification attacks

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Host Discovery with nmap

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Content Distribution Networks (CDN)

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

A versatile platform for DNS metrics with its application to IPv6

Proxy Server, Network Address Translator, Firewall. Proxy Server

Chapter 7. Address Translation

Chapter 8 Security Pt 2

CIT 380: Securing Computer Systems

Firewall implementation and testing

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Network Infrastructure Under Siege

dnsperf DNS Performance Tool Manual

Infrastructure for active and passive measurements at 10Gbps and beyond

INTRODUCTION TO FIREWALL SECURITY

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms

How do I get to

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

Lecture 5: Network Attacks I. Course Admin

Internet Security [1] VU Engin Kirda

A S B

DOMAIN NAME SECURITY EXTENSIONS

Linux MDS Firewall Supplement

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

DNSSEC and DNS Proxying

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Abstract. Introduction. Section I. What is Denial of Service Attack?

Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

CS 188/219. Scalable Internet Services Andrew Mutz October 8, 2015

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Network Traffic Analysis

EECS 489 Winter 2010 Midterm Exam

CIT 480: Securing Computer Systems. Firewalls

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

BorderWare Firewall Server 7.1. Release Notes

DNS Best Practices. Mike Jager Network Startup Resource Center

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Firewalls, IDS and IPS

Application-layer protocols

Stateful Firewalls. Hank and Foo

Darknet and Black Hole Monitoring a Journey into Typographic Errors

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Attack and Defense Techniques

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Glossary of Technical Terms Related to IPv6

ISM/ISC Middleware Module

Security vulnerabilities in the Internet and possible solutions

CS514: Intermediate Course in Computer Systems

Configuring Health Monitoring

How To Understand A Network Attack

Midterm. Name: Andrew user id:

ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan

Scalable Internet Services and Load Balancing

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

Transformation of honeypot raw data into structured data

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Installing and Configuring Websense Content Gateway

Distributed Denial of Service Attack Tools

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Ralph Dolmans A solution for the DNS amplification attack problem

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

CSE 127: Computer Security. Network Security. Kirill Levchenko

Advanced Networking Technologies

Chapter 15. Firewalls, IDS and IPS

Transcription:

Internet Measurement Research Matthäus Wander <matthaeus.wander@uni-due.de> Kassel, October 1, 2013

Overview How to get measurement data? Research projects Case studies of past projects Ideas and inspiration for new projects Measurement methods, challenges, solutions Matthäus Wander 2

How to Get Measurement Data? Existing data collected by other researchers Research papers are on the web, but not the data Obstacles: Privacy issues, fear of abuse Documentation and anonymization effort Collected data is often bound to one purpose www.datcat.org measurement data catalog Semi-public data: find operator, sign NDA Collect your own Matthäus Wander 3

Collecting Data Passive: monitor existing traffic Test your own network? Persuade NOC? Active: probe networks and hosts Effort vs. data quality (time/bandwidth/latency/loss) Just active sender or also active receiver? Prepare for complaints with active probing Save raw data if possible You may want to further analyze unexpected effects Matthäus Wander 4

Research Projects 1. Determine behavior of NAT routers 2. Count DNSSEC validating clients 3. Global impact of DNS censorship 4. Analysis of public DNSSEC keys 5. Effectiveness of DNS caches 6. Analysis of darknet traffic 6 9 17 30 32 35 Matthäus Wander 5

Determine Behavior of NAT Routers Research Project 1 Matthäus Wander 6

Measurement Method Test Server (campus) Test Client (home) Active measurement between two test programs Client in user home network User must download+run Windows tool Required the then new.net 4 (no Linux/Mac version) Tool needs raw socket and WinPcap (admin privileges) Incentive for users: help us for science Matthäus Wander 7

Measurement Method (2) Asked students and friends to run the tool 40 usable results in 2 weeks Multiple tests, each repeated 3 times Found some anomalies by repeating same test Send result for each test to our server Manual result analysis with Excel Some results suggested more detailed analysis Which wasn t possible, raw IP packets not saved Matthäus Wander 8

Count DNSSEC Validating Clients Research Project 2 Matthäus Wander 9

Measurement Method How many web clients are protected by DNSSEC? <img src="http://dnssec.vs.uni-due.de/r/a" alt="" height="1" width="1"> <img src="http://dnssec.vs.uni-due.de/r/b" alt="" height="1" width="1"> Web Browser HTTP 302 /r/a /r/b HTTP 200 SigOk SigFail DNS Resolver SigOk SigFail DNSKEY Nameserver How to generate page impressions? Matthäus Wander 10

Embed HTML Snippet in Popular Websites Matthäus Wander 11

Autosurf Communities Sign up with autosurf traffic exchanges Automated website visits from various clients Matthäus Wander 12

Webpage with Active Measurement Matthäus Wander 13

Approaches in Related Projects Geoff Huston (APNIC): Buy 350.000 web hits with $100 Flash advertisement Use Flash to query DNSSEC-signed domain names Duane Wessels (Verisign): Register wpad.$tld (RFC 3040 Web Proxy Autodiscovery Protocol) Use DNS-only technique to identify DNSSEC validators Matthäus Wander 14

Result Analysis Apache2.log Bind9.log Parse files Process data in memory Results.txt Statistics.txt GeoIP Parse whole files into memory, then analyze Does not scale with large log files Pipeline parsing and processing Still needs to parse all log files (>10 GB) Ideal: incremental analysis, results on website Matthäus Wander 15

Selection Bias Is this result representative? Group results by country code, AS number, etc. Matthäus Wander 16

Global Impact of DNS Censorship Research Project 3 Matthäus Wander 17

Scenario and Objectives DNS resolver Name server DNS injection: IP router spoofs DNS response Send DNS requests to random IPv4 addresses Check who responds with spoofed answer DNS resolver Name server Send DNS request to open resolvers worldwide Check who is affected by DNS injection Matthäus Wander 18

Prepare for Complaints Announced measurement to our NOC Prepared mail response template Ideal: get AS number to receive abuse mails Set up rdns name and website on scanner host crawler.vs.uni-due.de Contact information Offer blacklisting State purpose of scan Matthäus Wander 19

Probing the IPv4 Internet a.b.c.99: one query into each /24 subnet Omitted 0/8, 10/8, 172.16/12, 192.168/16, 224/3 Ideal: omit BGP prefixes not globally announced Firewall creates state for each query packet Extra CPU cost and limited space (Linux: 2 16 entries) Drops responses with wrong source port/ip address Use packet filter rules without stateful inspection Matthäus Wander 20

Sending Queries and Monitoring Packet Loss DNS queries are UDP datagrams One socket+port suffices for all 14M queries How to differ no service from packet loss? ICMP errors might be an indicator (unused here) Monitor network load with periodic DNS pings Two responders to identify origin of packet loss Matthäus Wander 21

Avoiding Packet Loss First version sent ~22k queries/s Problem: the faster it ran, the less responses arrived Naive solution: wait() to limit sending rate Problem: 200 q/s (~20 KB/s) killed campus router Spread load per destination network over time for c in range(256): for b in range(256): for a in range(256): yield "{0}.{1}.{2}.99".format(a, b, c) IPv4 address space Matthäus Wander 22

Receiving Responses Ensure socket receive buffer doesn t overfill Increase buffer size (SO_RCVBUF) Read from socket in tight recv() loop Output: SQLite db without indices (fast write) Saved parsed responses (less disk, less information) Evaluation: recreated database with indices Receiving data with socket vs. packet capture Socket misses faulty UDP checksums, ICMP errors Pcap misses packets under high load Matthäus Wander 23

Results: Responses for facebook.com Matthäus Wander 24

Querying Open Resolvers Worldwide domain.xy.s1.ip4.verteiltesysteme.net. IN A? (root) Measurement Host Open Resolver net verteiltesysteme B02 (Hetzner) ip4 Dnstest1 (DU) Messy (KS) s1 Measurement Destination Matthäus Wander 25

Open Resolvers and Measurement Destinations OpenResolverProject.org: 1M (out of 25M) root.zone: 1155 root and TLD name servers Matthäus Wander 26

Measurement Process Wait >10 seconds between queries per resolver If open resolver times out, retry (up to 5 times) Matthäus Wander 27

Results: Affected Open Resolvers 15k OR affected by Chinese DNS injection Matthäus Wander 28

Complaints Received Probing IPv4 address space Duisburg NOC: suspected malware Kassel NOC: suspected UDP/53 portscan None from destination networks (notified our NOCs?) Querying open resolvers TLD operator 1: informed us about possible attack TLD operator 2: forbid measurement with their server None from operators of open resolvers Matthäus Wander 29

Analysis of Public DNSSEC Keys Research Project 4 Matthäus Wander 30

Analysis of Public DNSSEC Keys Objective: analysis of DNSSEC key material Algorithms? Key lengths? (cf. SSL Observatory by EFF) Easily factorable RSA keys? (cf. factorable.net) How to gather large amount of public keys? Crawl DNSSEC zones by breaking NSEC3 hashes There is no name C with 3RL20V < h (C) < 6D6ESU www.foo? Not found 3RL20V NSEC3 6D6ESU Matthäus Wander 31

Effectiveness of DNS Caches Research Project 5 Matthäus Wander 32

Effectiveness of DNS Caches Network carrier provides DNS resolver + cache Less latency for client name resolution? Less load on authorative name server? DNS Client Recursive Resolver Recursive Resolver Authoritative Name Server How? Packet capture at NOC campus resolvers Privacy! IP address resolved domain names Matthäus Wander 33

Anonymization of Network Traces Script rewrites IP addresses from pcap file tcpdump -w - python anonymize-pcap.py - anon-file.pcap Set IP addresses to zero? Need to distinguish clients uni-due.de google.de nrw.de Save hashed addresses? Brute-force address space anonymize-pcap.py Keyed-hashing h K (ip) Correlation attacks <img src= http://uniq28384 > Matthäus Wander 34

Analysis of Darknet Traffic Research Project 6 Matthäus Wander 35

Analysis of Darknet Traffic Internet traffic arrives for unused IP addresses Objective: analysis of unsolicited Internet traffic Assign addresses to host with packet capture Don t respond to incoming data, except for TCP: Respond with SYN/ACK or ACK to get TCP payload Anonymization of unwanted traffic required? Matthäus Wander 36

Research Projects 1. Determine behavior of NAT routers 2. Count DNSSEC validating clients 3. Global impact of DNS censorship 4. Analysis of public DNSSEC keys 5. Effectiveness of DNS caches 6. Analysis of darknet traffic active active active active passive passive Matthäus Wander 37