Network Security Demonstration - Snort based IDS Integration -



Similar documents
Designing Virtual Network Security Architectures Dave Shackleford

Lecture 02b Cloud Computing II

Chapter 9 Firewalls and Intrusion Prevention Systems

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

IDS / IPS. James E. Thiel S.W.A.T.

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

SDN and NFV in the WAN

Securing Virtual Applications and Servers

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

Network Virtualization and Software-defined Networking. Chris Wright and Thomas Graf Red Hat June 14, 2013

BEHAVIORAL SECURITY THREAT DETECTION STRATEGIES FOR DATA CENTER SWITCHES AND ROUTERS

Leveraging SDN and NFV in the WAN

Secure Cloud-Ready Data Centers Juniper Networks

Software Defined Network (SDN)

Performance of Network Virtualization in Cloud Computing Infrastructures: The OpenStack Case.

PROFESSIONAL SECURITY SYSTEMS

OpenDaylight Project Proposal Dynamic Flow Management

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Firewalls and Intrusion Detection

Monitoring for network security and management. Cyber Solutions Inc.

White Paper. SDN 101: An Introduction to Software Defined Networking. citrix.com

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Secure Software Programming and Vulnerability Analysis

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Huawei Network Edge Security Solution

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Denial of Service Attacks, What They are and How to Combat Them

Network Immunity Solution. Technical White paper. ProCurve Networking

SECURING APACHE : DOS & DDOS ATTACKS - II

OpenStack/Quantum SDNbased network virtulization with Ryu

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Overview. Firewall Security. Perimeter Security Devices. Routers

Complete Protection against Evolving DDoS Threats

QRadar Security Intelligence Platform Appliances

The Reverse Firewall: Defeating DDOS Attacks Emanating from a Local Area Network

Restorable Logical Topology using Cross-Layer Optimization

INTRUSION DETECTION SYSTEMS and Network Security

Intelligent. Data Sheet

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Underneath OpenStack Quantum: Software Defined Networking with Open vswitch

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

The Cisco ASA 5500 as a Superior Firewall Solution

Mock RFI for Enterprise SDN Solutions

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

IBM QRadar Security Intelligence Platform appliances

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Policy Management: The Avenda Approach To An Essential Network Service

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

2013 ONS Tutorial 2: SDN Market Opportunities

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

Survey on DDoS Attack Detection and Prevention in Cloud

Future of DDoS Attacks Mitigation in Software Defined Networks

Intrusion Detections Systems

Data Center Virtualization and Cloud QA Expertise

Question: 3 When using Application Intelligence, Server Time may be defined as.

Programmable Networking with Open vswitch

Flow Based Traffic Analysis

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka.

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

A Look at the New Converged Data Center

DDoS-blocker: Detection and Blocking of Distributed Denial of Service Attack

Ten Things to Look for in an SDN Controller

Outline. Why Neutron? What is Neutron? API Abstractions Plugin Architecture

New Security Perspective for Virtualized Platforms

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Keyword: Cloud computing, service model, deployment model, network layer security.

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

IDS : Intrusion Detection System the Survey of Information Security

Automated Overlay Virtual Networking Manager for OpenFlow-based International SDN-Cloud Testbed

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Security Toolsets for ISP Defense

What is SDN? And Why Should I Care? Jim Metzler Vice President Ashton Metzler & Associates

Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Introduction of Intrusion Detection Systems

Cisco Application Networking for IBM WebSphere

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity

Network Virtualization: Delivering on the Promises of SDN. Bruce Davie, Principal Engineer

Securing Local Area Network with OpenFlow

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Software-Defined Networking Architecture Framework for Multi-Tenant Enterprise Cloud Environments

The HoneyNet Project Scan Of The Month Scan 27

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Transcription:

Network Security Demonstration - Snort based IDS Integration - Hyuk Lim (hlim@gist.ac.kr) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and Communications Gwangju Institute of Science and Technology (GIST) http://wits.gist.ac.kr

Contents Introduction Network security with SDN, Snort, and sflow Scalable network security Experiments 2

Network Attacks Denial of Service (DoS) attack An attempt to make a resource unavailable to legitimate users A malicious user floods excessive traffic to make network servers incapable of servicing legitimate users Distributed denial of service (DDoS) attack launched by leveraging a large number of machine attacker victim Malicious data propagation zombie clients Any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system Attack scripts, viruses, worms, Trojan horses, malicious active content 3

Intrusion Detection with SDN Network traffic has increased explosively, and the detection of malicious traffic is getting much harder. Traditional IDS Placed at several choke points in the network Monitor as many packets as possible Scalable IDS with SDN Exploit the topology and flow information of the network Decide where to monitor and adjust the inspection level for traffic monitoring Efficiently utilize the distributed resources for network security such as firewall, IDS/IPS and so on. Wireless Communications and Networking Lab (WCNL) 4

SDN for Network Security The flow paradigm is ideal for security processing because it offers an end-to-end, service-oriented connectivity model. Logically centralized control for effective performance and threat monitoring across the entire network. Granular policy management can be based on application, service, organization, and geographical criteria rather than physical configuration. Resource-based security policies enable consolidated management of diverse devices with various threat risks, from highly secure firewalls and security appliances to access devices. Dynamic and flexible adjustment of security policy is provided under programmatic control. Flexible path management achieves rapid containment and isolation of intrusions without impacting other network users. Mike McBride et al., SDN Security Considerations in the Data Center, ONF Solution Brief, October 8, 2013 5

Network Security Architecture 6

SDN Controller OpenFlow: a communications protocol that gives access to the forwarding plane of a network switch or router over the network. SDN Controller: a platform for network programmability to enable software-defined networking with OpenFlow. Floodlight (BigSwitch): the world's leading open source SDN controller OpenDaylight (Cisco, IBM): the SDN controller under The Linux Foundation 7

sflow sflow protocol samples traffic flows and forwards to sflow collector. sflow can summarize the information of traffic flows. sflow agent can be installed in PC s, switches, routers, etc. 8

Snort Snort is an open source networkbased intrusion detection system (NIDS) It has the ability to perform realtime traffic analysis and packet logging on Internet protocol (IP) networks It performs protocol analysis, content searching, and content matching Snort can be configured in three main modes: Sniffer mode Packet logger mode Network intrusion detection system (NIDS) Sample Snort Network Topology 9

sflow + Snort sflowtoolkit Installed in the sflow Collector machine Listens sflow packets from sflow agent Converts standard sflow data to snort-readable format Send them to the Snort for detailed packet tracing and analysis sflow Toolkit sflowtool Snort 10

Barnyard vs. Prelude Barnyard is an add-on tool for Snort (unified log reader) Snort creates a special binary output format Barnyard reads this file, and then sends the data to a database Allowing Snort to write to disk in an efficient manner Prelude is distributed hybrid IDS framework Collects and aggregates event reports from available security systems (IDS-snort) Analyses them on a central system 11

Security Loop Flow & topology information Observe Sample Traffic Detect Analyze Traffic React Update Strategy Defense Control Traffic 12

Router/Flow Grouping Since DDoS attack uses a large number of flows, it can be detected more easily by grouping closely related flows and forwarding to the same IDS IDS with limited inspection capacity 13

Sampling Strategy Sampling strategy affects the false negative performance of IDS. IDS How much sampling? Host Host Host Host Host Host Host Sampling 14

Be Smarter How to exploit the flow and topology information from SDN and prior observation of attack traffic. 15

EXPERIMENTS

Experiment Environment VM VM VM VM VM VM SW Switc SW Switc SW Switc SW Switch OF@TEIN Experiment Environment Network Nodes (Virtual machine) OVS-based Virtual SDN Network SDN based experiment environment with virtualization tools VMs on KVM hypervisor, virtual network with Open vswitches Provide more realistic network compared with network simulators Open vswitch supports core SDN and superior functionalities KVM (Kernel-based Virtual Machine) generates VMs highly similar to real machine 17

Topology Manager Topology Generators Topology Manager Experiment Configuration (e.g., SmartXBox) OVS OVS OVS OVS OVS OVS OVS OVS OVS OVS OVS OVS SDN Network with OVS bridges Topology manager Parses topology output file generated by Brite topology generator Saves the created topologies in the topology DB Provides web based GUI showing network topologies using D3 (data virtualization library) 18

OVS-based SDN Network Topologies 10 routers 20 routers 50 routers 5 AS (5*10 routers) 4 AS (4*20 routers) 10 AS(10*10 routers) 19

Traffic Manager Traffic Manager Normal traffic Traffic control message Malicious traffic DDos traffic Traffic 제어 (종류/양/비율) Traffic Manager Attracter Node OVS-based Virtual SDN Network Target Node Creates traffic attack using Hping3 with various configurations such as malicious traffic ratio, traffic bandwidth, attack type Controls attack node to generate large scale network attack 20

Attack Traffic Generation Hping3: Traffic generator One of the de-facto tools for security auditing and testing networks Customized ICMP/UDP/TCP packets can be used Fully scriptable using the TCL language Example) DDOS attack generated by Hping3 21

sflow Manager sflow Manager sflow control message IDS sflow collector IDS System IDS sflow collector IDS System Sampled Traffic IDS Sampled Traffic sflow collector IDS System sflow Manager: Centralized sflow agent control Remotely configures the sampling rate, sampling period, header byte, collector IP 22

sflow Control Examples No sflow Static configuration 1 색상 : Sampling Group Sampling Rate Static configuration 2 Random sampling 23

Scenario Attack Node 3 attack VM nodes generate DDos attack DDoS control with the traffic manager (malicious traffic ratio 0~100%) Attack Node 3 Snort IDS nodes detect security attack Attack Node Victim Node Victim Node sflow control with sflow manager 50 OVS switches Static sampling rate VM resources IDS (CPU 1 core, RAM 1024) Attack node (CPU 1 core, RAM 512) Victim node (CPU 1 core, RAM 512) 24