HONE: Correlating Host activities to Network communications to produce insight

Similar documents
Network Defense Tools

FortKnox Personal Firewall

Intro to Linux Kernel Firewall

Network Agent Quick Start

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FIREWALLS & CBAC. philip.heimer@hh.se

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

ΕΠΛ 674: Εργαστήριο 5 Firewalls

TECHNICAL NOTE. Technical Note P/N REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Firewalls. Chien-Chung Shen

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

LAB THREE STATIC ROUTING

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Chapter 11 Cloud Application Development

Firewall Design Principles

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

GlobalSCAPE DMZ Gateway, v1. User Guide

Linux Firewall Wizardry. By Nemus

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

NETWORK SECURITY (W/LAB) Course Syllabus

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

FIREWALL AND NAT Lecture 7a

Worksheet 9. Linux as a router, packet filtering, traffic shaping

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

COMP416 Lab (1) Wireshark I. 23 September 2013

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

NetFlow Analytics for Splunk

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Introduction of Intrusion Detection Systems

Introduction to Passive Network Traffic Monitoring

CIT 480: Securing Computer Systems. Firewalls

Intrusion Detection in AlienVault

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Solution of Exercise Sheet 5

co Characterizing and Tracing Packet Floods Using Cisco R

CSE543 - Computer and Network Security Module: Firewalls

Linux MDS Firewall Supplement

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

CIT 480: Securing Computer Systems. Firewalls

Chapter 7. Firewalls

Are Second Generation Firewalls Good for Industrial Control Systems?

DMZ Network Visibility with Wireshark June 15, 2010

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 9 Firewalls and Intrusion Prevention Systems

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewall Stateful Inspection of ICMP

CSC574 - Computer and Network Security Module: Firewalls

Firewall Firewall August, 2003

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Attack Lab: Attacks on TCP/IP Protocols

Internet Security Firewalls

Flow Analysis Versus Packet Analysis. What Should You Choose?

Installing and Configuring Websense Content Gateway

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

WHITE PAPER. Extending Network Monitoring Tool Performance

NAT TCP SIP ALG Support

Introduction to Wireshark Network Analysis

Internet Security Firewalls

Network Based Intrusion Detection Using Honey pot Deception

Netfilter s connection tracking system

Course Title: Penetration Testing: Security Analysis

Linux MPS Firewall Supplement

TECHNICAL NOTES. Security Firewall IP Tables

Stateful Firewalls. Hank and Foo

Firewalls Overview and Best Practices. White Paper

XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin

Linux LKM Firewall v 0.95 (2/5/2010)

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Configuring a Load-Balancing Scheme

Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Overview. Firewall Security. Perimeter Security Devices. Routers

Security Technology: Firewalls and VPNs

Virtual Fragmentation Reassembly

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

+ iptables. packet filtering && firewall

Implementing Network Monitoring Tools

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Second-generation (GenII) honeypots

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Computer Security: Principles and Practice

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

GoToMyPC Corporate Advanced Firewall Support Features

10 Configuring Packet Filtering and Routing Rules

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Network Traffic Analysis

Transcription:

HONE: Correlating Host activities to Network communications to produce insight GLENN A. FINK, PH.D. Senior Scientist, Secure Cyber Systems SEAN STORY, PMP Project Manager, Software Engineering & Architectures

What is the problem? We collect too much extraneous cyber data and then put in too much work to process it all We collect both network and machine data But we only need the correlated intersection Why? The design of Internet protocols makes correlation and isolating root causes of break-ins difficult August 22, 2013 Hone TTP: PNNL-SA-97856 2

How will we fix the problem? We correlate communications and processing activities in the kernel of the operating system This lets us find out what programs are responsible for malicious network activity Requires a kernel module on each monitored machine August 22, 2013 Hone TTP: PNNL-SA-97856 3

What are the benefits? Fewer analyst hours are needed to correlate cyber data savings Analysts can characterize communications with 100% accuracy Hone provides a key to understand the computer from the network Hone keeps a persistent file of correlated machine and network activities August 22, 2013 Hone TTP: PNNL-SA-97856 4

What alternatives are there? TCPView, NetStat, and other host-based tools: Can see the connections but not the actual activity Use a polling approach that misses short events Deep-packet inspection or Dynamic Analysis Expensive and potentially inaccurate Connection-filtering host-based firewalls Only operate on the connection level, not per packet Once you grant blanket permission to an application, you have no further control Multi-host-based security and analysis Requires elaborate infrastructure August 22, 2013 Hone TTP: PNNL-SA-97856 5

Hone Demonstration August 22, 2013 Hone TTP: PNNL-SA-97856 6

Conclusion All Internet devices use common protocols, so Hone s simple correlation will enable a revolution in defense Hone provides the precision to control communications at the packet level Hone gives trustworthy process attribution We are seeking partners to: Sponsor follow-on work Test deploy operational prototypes License for use in new and existing products August 22, 2013 Hone TTP: PNNL-SA-97856 7

Correlating machine and network activities to produce insight Glenn Fink, PhD Cyber Security Scientist Glenn.Fink@pnnl.gov (509) 375-3994 Sean Story, PMP Project Manager story@pnnl.gov (509) 375-3612 Pacific Northwest National Laboratory Richland, Washington Hone TTP: PNNL-SA-97856 August 22, 2013 8

Common Questions: How does Hone trace packets all the way to processes? How is Hone s correlation different from TCP View or the Windows firewall? What can Hone tell me about svchost processes? What is the performance impact of running Hone? Can Hone be used for more than just computer security? Do other vendors have plans to become Hone compatible? What platforms do you support? What future platforms do you anticipate? August 22, 2013 Hone TTP: PNNL-SA-97856 9

Process 1 Process 2 Technical Approach for Outgoing Connections A process creates a socket to communicate with a particular destination Socket() When the socket is created, Hone logs the process and destination associated with the socket When a packet is sent, Hone logs the process, packet, and destination information Network

Process 1 Process 2 Technical Approach for Incoming Connections Socket() And the packet continues to be routed to the process At this point, Hone logs the socket and process associated with the packet The transport layer decides which socket the packet belongs to The network layer decides whether a packet is for this machine Network

How is Hone different from TCPView, etc.? TCPView, Windows Firewall, netstat, and others also track connections from processes to the network But Hone tracks at the packet level This means greater potential control of the streams With Windows Firewall and others, you make decisions based on the whole connection, and you make permanent rules With Hone, you could intercept, redirect, or change selected packets in the stream Hone also works via callbacks, not polling TCPView, netstat, and others constantly ask the operating system to tell what connections are open This misses very short connections, cannot track packets, and is resource intensive Hone gets notified every time a socket or process is created and every time a packet traverses the machine

What can Hone tell me about svchost? SVCHost is Microsoft s method of combining several system service libraries into a single executable This makes resource usage slightly more efficient, but causes many unrelated functions to grouped together in a confusing way Hone will tell which of the SVCHost processes are responsible for each packet Packets destined for SVCHost instances will always be services, ostensibly of the system, and possibly with system privileges It is possible to trace which SVCHost process contains a particular service through the Windows service manager In the future, we would like to enhance Hone to trace to individual DLLs that represent services, but currently, we do not

Preliminary performance testing 70 Base System Hone without logging Hone logging 60 50 40 30 20 10 0 WE19387 WIN7-32 WIN7-64 WIN8-32 WIN8-64 Initial performance testing of the GUA-2 Windows sensor on five different systems showed that any additional delay caused by Hone is lost in the noise. We downloaded full web pages for 20 different sites with a one second pause between page fetches. The results shown are the averages of 10 runs on each system. August 22, 2013 Hone TTP: PNNL-SA-97856 14

Other uses of Hone Hone can be used to troubleshoot: Networked application failures Firewall rule changes on the host and network Host communication policies Hone could be used to: Find out what applications are running in an enterprise Make quality of service decisions on an application basis Restrict certain applications from communicating in an enterprise Further research could meld Hone with firewalls, intrusion detection systems, host-based service logs, and much more August 22, 2013 Hone TTP: PNNL-SA-97856 15

Vendor compatibility Hone generates PCAP-NG format files that can be read by a special version of Wireshark We are working with the Wireshark development team to integrate our special additions into the main trunk of their development effort We would like to collaborate with other products such as the SiLK tools and firewalls We seek partnership with vendors to improve their products by integration with Hone August 22, 2013 Hone TTP: PNNL-SA-97856 16

Hone Platforms Currently, Hone runs on Windows 7 & 8 and Linux (kernels 2.32 and newer) We have a partial Mac OS X version for Snow Leopard and beyond We also have an experimental version for an Android device We plan to complete Mac OS X and Android versions if we can obtain development partners Other platforms (ios, Symbian, etc.) are possible with partnership August 22, 2013 Hone TTP: PNNL-SA-97856 17

Backup materials August 22, 2013 Hone TTP: PNNL-SA-97856 18

Hone Linux Sensor Hook exec(), fork(), and exit() Process ownership, pedigree, and lifespan Requires kprobes Hook IP (v4 and v6) socket creation and release Owning process and connection lifespan Includes listening sockets Includes sockets with no packet transfers Hook iptables filter table INPUT and OUTPUT chains Packet capture after firewall filtering Not promiscuous Double lookup in TCP to find socket Logged with timestamp /dev/hone PCAP-NG format /dev/honet plain text Available at http://github.com/honeproject August 22, 2013 Hone TTP: PNNL-SA-97856 19

Hone Windows Sensor Register process creation and deletion notification routine Process ID Process pedigree Process lifespan Register image load notification routine Path to process executable Process arguments Process ownership August 22, 2013 Hone TTP: PNNL-SA-97856 20

Hone Windows Sensor Cont. Register Windows Filtering Platform callouts Connection open and close events Owning process ID Connection ID Connection lifespan Inbound and outbound packet events Connection ID for mapping to process ID Contents of all inbound and outbound packets Support for common protocols, such as IPv4, IPv6, TCP, UDP, ICMP, etc. Logged with timestamp \\.\HoneOut PCAP-NG format August 22, 2013 Hone TTP: PNNL-SA-97856 21

PCAP-NG PCAP Next Generation: http://www.winpcap.org/ntar/draft/pcap- DumpFileFormat.html Extensible packet capture format, allows for addition of custom fields and block types 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Block Type Block Total Length / Block Body / / /* variable length, aligned to 32 bits */ / Block Total Length August 22, 2013 22 Hone TTP: PNNL-SA-97856

Block Types Specification Section Header: defines capture file characteristics Interface Description: interface information Enhanced Packet: single captured packet Hone adds connection id (code 257) and process id (code 258) information to each enhanced packet block Simple Packet: minimal information about a single captured packet Name Resolution: numeric to canonical name mapping Interface Statistics: statistical data Hone Process Event: process event information Connection Event: connection event information August 22, 2013 23 Hone TTP: PNNL-SA-97856

Process Event 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------------------------------------------------------+ 0 Block Type = 0x00000101 +---------------------------------------------------------------+ 4 Block Total Length 8 Process ID 12 Timestamp (High) 16 Timestamp (Low) / / / Options (variable) / / / Block Total Length +---------------------------------------------------------------+ August 22, 2013 24 Hone TTP: PNNL-SA-97856

Connection Event 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +---------------------------------------------------------------+ 0 Block Type = 0x00000102 +---------------------------------------------------------------+ 4 Block Total Length 8 Connection ID 12 Process ID 16 Timestamp (High) 20 Timestamp (Low) / / / Options (variable) / / / Block Total Length +---------------------------------------------------------------+ August 22, 2013 25 Hone TTP: PNNL-SA-97856