Real-Time Collaborative Network Monitoring and Control Using the Open Source L3DGE system



Similar documents
LCMON Network Traffic Analysis

PROFESSIONAL SECURITY SYSTEMS

Secure Networks for Process Control

The SIEM Evaluator s Guide

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

CTS2134 Introduction to Networking. Module Network Security

Intrusion Detection Systems (IDS)

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

INTRODUCTION TO FIREWALL SECURITY

Introduction of Intrusion Detection Systems

Monitoring VMware ESX Virtual Switches

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

A LITERATURE REVIEW OF NETWORK MONITORING THROUGH VISUALISATION AND THE INETVIS TOOL

6.0. Getting Started Guide

Network Virtualization Network Admission Control Deployment Guide

Study of Network Performance Monitoring Tools-SNMP

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Network Management Deployment Guide

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Lab Objectives & Turn In

nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Instructions for Access to Summary Traffic Data by GÉANT Partners and other Organisations

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Recommended IP Telephony Architecture

CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

COUNTERSNIPE

Second-generation (GenII) honeypots

Chapter 11 Cloud Application Development

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

RAVEN, Network Security and Health for the Enterprise

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

D. Grzetich 6/26/2013. The Problem We Face Today

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Traffic Monitoring : Experience

Maximize Network Visibility with NetFlow Technology. Andy Wilson Senior Systems Engineer Lancope

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Richard Bejtlich / taosecurity.blogspot.com BSDCan 14 May 04

Securing end devices

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Detecting Botnets with NetFlow

How To Learn Cisco Cisco Ios And Cisco Vlan

Network Monitoring Comparison

When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING.

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Cisco IPS 4200 Series Sensors

Cisco Certified Security Professional (CCSP)

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Unified network traffic monitoring for physical and VMware environments

SANS Top 20 Critical Controls for Effective Cyber Defense

Technical Note. ForeScout CounterACT: Virtual Firewall

AlienVault. Unified Security Management (USM) 5.1 Running the Getting Started Wizard

Securing Networks with PIX and ASA

The ntop Project: Open Source Network Monitoring

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Cisco IPS Tuning Overview

DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

The Purview Solution Integration With Splunk

Strategies to Protect Against Distributed Denial of Service (DD

IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for

OpenWIPS-ng A modular and Open source WIPS. Thomas d Otreppe, Author of Aircrack-ng

The Basics. Configuring Campus Switches to Support Voice

Flow Analysis Versus Packet Analysis. What Should You Choose?

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Cisco NetFlow Generation Appliance (NGA) 3140

Critical Security Controls

By Jascha Wanger

Netflow Collection with AlienVault Alienvault 2013

CCT vs. CCENT Skill Set Comparison

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Implementing Cisco IOS Network Security

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Network Defense Tools

"Charting the Course...

Interconnecting Cisco Network Devices 1 Course, Class Outline

Service Description DDoS Mitigation Service

How Cisco IT Protects Against Distributed Denial of Service Attacks

How To Extend Security Policies To Public Clouds

with NetFlow Technology Adam Powers Chief Technology Officer

Tue Apr 19 11:03:19 PDT 2005 by Andrew Gristina thanks to Luca Deri and the ntop team

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

How To Manage Sourcefire From A Command Console

WhatsUpGold. v3.0. WhatsConnected User Guide

Transcription:

Real-Time Collaborative Network Monitoring and Control Using the Open Source L3DGE system Warren Harrop wazz@swin.edu.au

FAQ : Who are you? How did you get into my house? PhD candidate at the Centre for Advanced Internet Architectures, Swinburne University Completed an internship with Cisco in 2007 Some financial assistance for this research from Cisco http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 2

Outline Network monitoring (Re)Introduce a greynet What does it do? How can it help? Introducing greynetd Network visualisation and control L3DGE project Quick demos Future work http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 3

Greynet Greynet term coined in [1] Part of an IDS (Intrusion Detection System) Not a user installed, unauthorised application on a network host We mean Distributed edge network darknet Ok... What's a darknet? [1] W.Harrop, G.Armitage "Defining and Evaluating Greynets (Sparse Darknets)," IEEE 30th Conference on Local Computer Networks (LCN 2005) Sydney, Australia, 15-17 November, 2005. http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 4

Darknet (Network Telescope or Internet Motion Sensor) Not a private clandestine content distribution network Large contiguous chunk of (spare) IP address space At least a /24... but a /8 is better... Routed but otherwise unused - Dark No legitimate packets should be seen Automated malware (and the people who act like malware) will still send packets into this space in the search for hosts to defile http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 5

Darknet (2) Passively watch for these incoming packets Monitor the wider Internet for - Network scans (Malware activity) Internet backscatter (who's being DoSed?) SYNs (forged src address) SYN/ACKs Attacker(s) Victim Darknet http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 6

Greynet Distributed edge network darknet Make the darknet look 'inwards' Place the darknet inside your network Not many can afford an entire /24 for a darknet so... Put darknet hosts among 'regular' 'lit' network hosts Network scans find a greynet hard to avoid Normal Host Greynet Network Greynet Listener Host Spare IP address http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 7

Greynet (2) From the packets that come to the greynet you now know: Who's doing scanning inside my network? Who's infected with malware? What type of malware might be inferred from ports used and the scanning pattern http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 8

Implementation Greynet monitoring host VLAN 10 VLAN 11 VLAN x Logical network layer view http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 9

Implementation For the service provider : Make the greynet hosts only sensitive to locally sourced traffic Track break-in attempts by customers Inform users of their infections Use on your own enterprise network Automatically send alerts Or you could visualise the data coming out... hmmm... http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 10

greynetd Coming soon... FreeBSD package Ease greynet implementation & deployment Stir together a FreeBSD machine & VLAN trunk DHCP integration SNMP monitoring interface Web interface for setup and control Demo... http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 11

Visualisation and Control PhD work Made possible in part by a grant from Cisco Cisco University Research Program Fund (URP) http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 12

The problem Monitoring of the many distinct, black boxes that make up a modern IP network Hard to do. The interpretation of the raw data gathered in the previous step Hard to do. Implementing a solution back onto the multiple, distinct boxes that make up the network Hard to do. Trained professionals required to perform this work http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 13

Can we? Lower the skills required to make a positive contribution to the monitoring, diagnosing and controlling of an IP network Let junior admins lend a helping hand Train them quicker Help you see the thing you didn't know you didn't know by... Creating suitably high-level, interactive and realtime abstractions and visualisations http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 14

L3DGE project L3DGE Leveraging 3D Game Engines http://caia.swin.edu.au/urp/l3dge Not a product active research (Not to say we wont take your money) http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 15

L3DGE 3D world, data visualisation and control tool Based on 'OpenArena' Based on Quake III Arena Modular design Developed to monitor data networks (in real-time) But not limited to this Lucas Parry 12 months of development http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 16

L3DGE Monitored systems are represented by in-world entities Entity attributes (spin rate, colour... etc. ) are tied to monitored real-world metrics Viewer sees multiple metrics concurrently Multiple viewers in-world In-world interactions translated into external actions Basic permissions system implemented http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 17

L3DGE Released - GPL Input, output abstractions layers Binary versions for Windows, FreeBSD, Linux and Mac OS X http://caia.swin.edu.au/urp/l3dge/ http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 18

How does it work? 3D Game Clients System collaborators as players Network 3D Game Engine Server (Keeps 'world' state) Monitored systems (packets, netflow, SNMP, etc) Input Abstraction Layer Output Abstraction Layer External control commands (ACLs, etc) http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 19

Why use a game engine? Advanced graphics ability and 3D rendering Collaboration Interaction Real-time optimised code Proven (defacto) world navigation system Human spatial senses leveraged Detection of anomalies with human pattern recognition Allowing for simplified presentation of complicated ( non-physical ) systems http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 20

L3DGE software Precursor LTMON L3DGE Traffic Monitor by Alex Shoolman (Released January 2007) L3DGEWorld 2.3 by Lucas Parry (Released December 2007) Using the L3DGE engine: LupsMON 0.2 by Michael Allen (Released May 2008) (L3DGEWorld Uninterruptible Power Supply Monitoring) LCMON 1.1 by Carl Javier and Adam Black (Released December 2007) (L3DGEWorld Cluster-node Monitoring) http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 21

LTMON http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 22

http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 23

LCMON Demo http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 24

LupsMON http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 25

L3DGE in the 'media' http://caia.swin.edu.au/urp/l3dge/media.html The Age Physical Online http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 26

L3DGE in the 'media' (2) http://www.newscientist.com/blog/technology/2008/01/computer-security-with-quake-based.html http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 27

L3DGE in the 'media' (3) http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 28

L3DGE in the 'media' (4) and blogging leads to... http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 29

Future work Speculative research years of life span Community contributions...? Long term Change of game engine Some advanced features to negate having to leave the world Eg. ssh in-world And...and...and... http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 30

Conclusion Reintroduced a greynet Introduced greynetd L3DGE Leveraging 3D Game Engines L3DGEWorld LCMON Super cluster monitoring LUPSMON UPS monitoring Future work Thank you http://caia.swin.edu.au wazz@swin.edu.au August 22th, 2008 Page 31