Bro at 10 Gps: Current Testing and Plans



Similar documents
An Overview of the Bro Intrusion Detection System

How to (passively) understand the application layer? Packet Monitoring

The Bro Network Intrusion Detection System

Intrusion Detection System

Monitoring Network Security with the Open-Source Bro NIDS

High-Performance Network Security Monitoring at the Lawrence Berkeley National Lab

The Open Source Bro IDS Overview and Recent Developments

A Bro Walk-Through. Robin Sommer International Computer Science Institute & Lawrence Berkeley National Laboratory

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Intrusion Detection Systems

Introduction of Intrusion Detection Systems

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Stateful Inspection Technology

Security threats and network. Software firewall. Hardware firewall. Firewalls

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Firewall Firewall August, 2003

Cisco Intrusion Prevention System Advanced Integration Module for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Chapter 11 Cloud Application Development

Cisco ASA, PIX, and FWSM Firewall Handbook

Basic Network Configuration

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

FIREWALLS & CBAC. philip.heimer@hh.se

Flow-level analysis: wireshark and Bro. Prof. Anja Feldmann, Ph.D. Dr. Nikolaos Chatzis

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Network Forensics: Log Analysis

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Linux Network Security

Multi-Homing Dual WAN Firewall Router

Flow Analysis Versus Packet Analysis. What Should You Choose?

CSCE 465 Computer & Network Security

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Cisco PIX vs. Checkpoint Firewall

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Cisco Secure PIX Firewall with Two Routers Configuration Example

Firewalls. Pehr Söderman KTH-CSC

Classification of Firewalls and Proxies

Network Security. Network Packet Analysis

Firewalls, IDS and IPS

Dynamic Rule Based Traffic Analysis in NIDS

Ignify ecommerce. Item Requirements Notes

Firewalls. Network Security. Firewalls Defined. Firewalls

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Firewalls. Chapter 3

CSCE 465 Computer & Network Security

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Network Configuration Settings

General Network Security

Chapter 15. Firewalls, IDS and IPS

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Configuring Security for FTP Traffic

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Application Firewalls

A Guide to New Features in Propalms OneGate 4.0

Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January Cristian Velciov. (+40)

A Critical Investigation of Botnet

Cisco IPS AIM and IPS NME for Cisco 1841 and Cisco 2800, 2900, 3800 and 3900 Series Integrated Services Routers

Introduction to Network Address Translation

CTS2134 Introduction to Networking. Module Network Security

- Basic Router Security -

Intrusion Detection Systems (IDS)

Firewalls (IPTABLES)

Colasoft Capsa Technical White Paper. Maximize Network Value

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Proxy Server, Network Address Translator, Firewall. Proxy Server

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Cisco Configuring Commonly Used IP ACLs

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Intrusion Detection Systems

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection

Bypassing PISA AGM Theme Seminar Presented by Ricky Lou Zecure Lab Limited

Guideline on Firewall

Network Security Monitoring

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

12. Firewalls Content

Firewalls and System Protection

Network Security Management

Intrusion Detection in AlienVault

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

IDS / IPS. James E. Thiel S.W.A.T.

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Security Technology: Firewalls and VPNs

8 steps to protect your Cisco router

Transcription:

U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory

Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic for suspicious behavior or policy violations: incoming/outgoing/internal In conjunction with blocking routers, Bro acts as a dynamic and intelligent firewall Blocks access from offending IP addresses Blocks known hostile activity Terminates connections and/or sends alarms Locates site policy violations (e.g.: Kazaa and gnutella)

How Bro Works Network Taps GigEther fiber link passively, sends up a copy of all network traffic.

How Bro Works Tcpdump Filter libpcap Filtered Packet Stream Kernel filters down high-volume stream via standard libpcap packet capture library. Network Packet Stream

How Bro Works Event Control Event Engine Tcpdump Filter libpcap Event Stream Network Filtered Packet Stream Packet Stream Event engine distills filtered stream into high-level, policy-neutral events reflecting underlying network activity E.g. Connection-level: connection attempt connection finished E.g. Application-level: ftp request http_reply E.g. Activity-level: login success

How Bro Works Policy Script Policy Script Interpreter Event Control Event Engine Real-time Notification Record To Disk Event Stream Policy script processes event stream, incorporates: Context from past events Site s particular policies Tcpdump Filter Filtered Packet Stream libpcap Network Packet Stream

How Bro Works Policy Script Policy Script Interpreter Event Control Event Engine Tcpdump Filter libpcap Real-time Notification Record To Disk Event Stream Filtered Packet Stream Policy script processes event stream, incorporates: Context from past events Site s particular policies and takes action: Records to disk Generates alerts via syslog, paging, etc. Executes programs as a form of response Network Packet Stream

Bro Protocol Analyzers Bro includes the following protocol analyzers full analysis: HTTP, FTP, telnet, rlogin, rsh, RPC, DCE/RPC, DNS, Windows Domain Service, SMTP, IRC, POP3, NTP, ARP, ICMP, Finger, Ident partial analysis: NFS, SMB, NCP, SSH, SSL, TFTP, Gnutella in progress: AIM, BGP, DHCP, Windows RPC, SMB, NetBIOS, NCP

Sample Bro Policy Using the Bro language, sites can write custom policy scripts to generate alarms on any policy violation. For example, if a site only allows external http and mail to a small, controlled lists of hosts, they could do this: const web_servers = { www.lbl.gov, www.bro-ids.org, }; const mail_servers = { smtp.lbl.gov, smtp2.lbl.gov, }; redef allow_services_to: set[addr, port] += { [mail_servers, smtp], [web_servers, http], }; Bro can then generate an Alarm or even terminate the connection for policy violations: if ( service!in allow_services_to) NOTICE([$note=SensitiveConnection, $conn=c,]); if ( inbound && service in terminate_successful_inbound_service ) terminate_connection(c);

Recent Advances in Bro

Dynamic Application Detection Current NIDS system require you to specify which protocol analyzer to use for a given port. I.e: port 25 = SMTP; port 80 = HTTP, port 6666 = IRC, etc. NIDS s only look at traffic on ports they know how to analyze New version of Bro supports dynamic port selection Uses simple protocol-specific signatures to try to guess what protocol is being seen Enhanced version of Layer 7 packet classifier http://l7-filter.sourceforge.net Sample use at LBL: Look for http proxies Look for FTP and SMTP on non-standard ports Looks for IRC botnets payload inspection of FTP data transfers Note: dynamic application detection takes more CPU and IO because it looks at all traffic,

Dynamic HTTP Analyzer HTTP analyzer can distinguish the various protocols that use HTTP as their transport protocol by looking for their characteristics Includes patterns for detecting Kazaa, Gnutella, BitTorrent, Squid, and SOAP applications running over HTTP The HTTP analyzer extracts the Server header from the HTTP responses Examples: ProtocolFound 66.249.65.49/62669 > 131.243.224.47/1400 FileMakerPro (via HTTP) on port 1400/tcp ProtocolFound 66.249.66.177/47957 > 131.243.2.93/8881 Apache (via HTTP) on port 8881/tcp ProtocolFound 198.129.90.45/1160 > 128.3.72.29/7777 Oracle (via HTTP) on port 7777/tcp ProtocolFound 211.37.103.215/1278 > 131.243.129.75/554 RealServer (via HTTP) on port 554/tcp

Botnet Detector The IRC protocol is popular for bot communication, but It is difficult for a traditional NIDS to reliably detect members of IRCbased botnets. Often the bots don t use standard IRC server ports. The Botnet detector sits on top of the Bro IRC analyzer and is therefore able to perform protocol-aware analysis of all detected IRC sessions. To identify a bot connection, it uses three heuristics: First, it checks if the client s nickname matches a (customizable) set of patterns known to be used by botnets Second, it examines the channel topics if it includes a known typical botnet commands Third, clients that establish an IRC connection to an already identified bot-server are also considered to be bots. Successfully located several botnets at Technical University Munich and UC Berkeley

Payload inspection of FTP Data Transfers Attackers often install FTP-servers on non-standard ports on compromised machines Analysis of FTP data connections is impossible with traditional NIDSs FTP uses arbitrary port combinations for data connections. The Bro file analyzer receives the file s full content and can utilize any file-based intrusion detection scheme. includes file-type identification to Bro using libmagic can identify a large number of file-types E.g.: Bro is now able to categorize a data file as being of MIME type video/x-msvideo (an AVI movie)

Bro at 10GBPS

Bro at 10Gbps There are a number of approaches to Bro at 10 GigE Use a 10 Gig NIC Pros: will just work; no special configuration needed Cons: cost, even with very high end host may run out of CPU cycles for analysis Performance: Current testing shows that 10 Gig Nics can only capture about 1 Gbps of traffic (more testing in progress now) Use Filter Based Port Mirroring or VACLs. Forward only interesting traffic to a Bro host Pros: works well with standard Bro configuration Cons: requires Juniper routers or CISCO 65xx router and spare 1 Gig port in the router Use Custom Hardware ICIR shunting project: see next slide Other custom hardware Force10 (former Metanetworks) 10G nic provides on NIC BPF filtering

Shunting Project Based on the following concept: For large flows, the beginning of the connection contains nearly all the information of interest from a security analysis perspective Shunting uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields Based on table value, every packet is either: forwarded, dropped, or diverted through the IPS Low cost FPGA-based Xilinx Virtex 2 Pro FPGA coupled to 2 independent 2MB SRAM banks and a control FPGA

Shunting Approach External Network Control & Analysis Traffic Filter Router / FPGA GigE Interface Bro Internal Network

Force10 P10 Box: Early Results Configured a Force10 P10 to capture only the 1st 10 packets of a flow (each direction) Results: reduced the number of packets passed to the OS by around 95% Reduced the number of interrupts tremendously Reduced the CPU needed by Bro by 4x

Future Plans: Bro Cluster Front end node uses Force10 hardware to rewrite packets, forwarding them to cluster nodes for analysis Classify packets and forward to specific ethernet address Could use multicast address to allow for transparent node redundancy Scalable in several ways: As traffic increases, just add more nodes For more detailed Bro analysis, just add more nodes Should scale to 100 Gbps networks and beyond Could run Bro, Snort, and other future tools all on the same cluster New version of Bro has support for synchronized state across multiple Bro systems Have been testing this using packet traces Will soon start testing at 1 Gbps using live traffic

For more Information Bro is Open Source (FreeBSD-style license) Download from: http://www.bro-ids.org/ Dynamic Application Detection will be in the next release of Bro (September?) Questions: email bro@bro-ids.org