Active Mapping: Resisting NIDS Evasion Without Altering Traffic Authors: Umesh Shankar (UC – Berkeley) & Vern Paxson (ICSI) Network Intrusion Detection:

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
Firewalls and Intrusion Detection Systems
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Examining IP Header Fields
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Gursharan Singh Tatla Transport Layer 16-May
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Chapter 6: Packet Filtering
Distance Vector Routing Protocols W.lilakiatsakun.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Network Security: Intrusion Detection and Protection Photiou Savvas University of Cyprus.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FIREWALKING. KNOW YOUR ENEMY: FIREWALLS What is a firewall? A device or set of devices designed to permit or deny network transmissions based upon a set.
Firewall and its working By Mithila Palamakula. Firewall  Sits between two networks  Used to protect one from the other  Places a bottleneck between.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Intrusion Detection Issues Presented by Deepa Srinivasan CSE581, Winter 2002, OGI.
Breno de MedeirosFlorida State University Fall 2005 Network Intrusion Detection Systems Beyond packet filtering.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Active Mapping: Resisting NIDS Evasion Without Altering Traffic writen by Umesh Shankar University of California at Berkeley presented.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Improving TCP Performance over Wireless Networks
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
K. Salah1 Security Protocols in the Internet IPSec.
Routing Semester 2, Chapter 11. Routing Routing Basics Distance Vector Routing Link-State Routing Comparisons of Routing Protocols.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
CompTIA Security+ Study Guide (SY0-401)
Port Scanning James Tate II
The Devil and Packet Trace Anonymization
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Transport Layer Unit 5.
Firewalls Purpose of a Firewall Characteristic of a firewall
دیواره ی آتش.
Lecture 2: Overview of TCP/IP protocol
Net 323 D: Networks Protocols
Get rid of the ambiguities in the traffic stream
Detecting Evasion Attack at High Speed without Reassembly
Session 20 INST 346 Technologies, Infrastructure and Architecture
Transport Layer 9/22/2019.
Presentation transcript:

Active Mapping: Resisting NIDS Evasion Without Altering Traffic Authors: Umesh Shankar (UC – Berkeley) & Vern Paxson (ICSI) Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics Authors: Mark Handley and Vern Paxson (International Computer Science Institute) & Christian Kreibich (Technische Universitat Munchen) Presented by: Jamie Margaret Huenefeld

Introduction An Ambiguous Problem An Ambiguous Problem –NIDS Passively monitors network traffic to detect suspicious activity Requires knowledge of receiving host traffic and correct interpretation Result = Host vs. NIDS interpretation Limited to Network and Transport layer interpretation

Presentation Outline Normalization Normalization Active Mapping Active Mapping Comparision of Normalization and Active Mapping Comparision of Normalization and Active Mapping Experimental Results using Active Mapping Experimental Results using Active Mapping Conclusions Conclusions

Normalization Tool that directly filters network traffic to eliminate ambiguities before reaching NIDS Tool that directly filters network traffic to eliminate ambiguities before reaching NIDS –Removes some evasive opportunities (bump in the wire) –Authors attempt to identify all potential normalizations –Example, w/ Picture(page 3)

Why Normalization? The alternatives are not comprehensive enough The alternatives are not comprehensive enough –Host Based IDS Difficult deployment, Counter-NIDS solution –Understanding details of intranet Large networks will be cumbersome –Bifurcating Analysis Can result in exponential analysis

Normalization Tradeoffs As the degree of Normalization increases, performances decreases & has greater impacts on semantics As the degree of Normalization increases, performances decreases & has greater impacts on semantics –Normalization vs. Protection –End-to-End Semantics –Stateholding –Inbound vs. Outbound traffic

Two major Considerations.... “Cold Start” “Cold Start” –Analyzer lacks knowledge of previously- established connections Attacking the Normalizer Attacking the Normalizer –Stateholding Attacks Incorrect Headers Normalizer required to hold state CPU Overload

Header Walking – A Systematic Approach Consider value ranges, semantics and methods of exploitation within header elements Consider value ranges, semantics and methods of exploitation within header elements –Uses IP v.4 –Image from paper –We can just drop these packets w/o semantic consequences: Header Length > packet length or < 20 byte Length > Link-Layer Clear bit between IP Ident & DF DF set, Non-Zero fragmentation offset

Header Walking w/ Semantic Consequences Image from paper Image from paper Manipulation of TTL Manipulation of TTL –Establish minimum TTL in Normalizer, and propagate to packets w/ lower values –Effect on Semantics: Infinite Loop Break Traceroute Expanding Search Ring performance impaired

Header Walking w/ Semantic Consequences Image from paper Image from paper Invalid Source IP address, e.g , Invalid Source IP address, e.g , –Drop it! –Effect on Semantics: Can cause packet drops for internal machines –Source routing

Incompleteness of Normalization Restricted to internetwork and transport layers Restricted to internetwork and transport layers Difficult to remove all ambiguities Difficult to remove all ambiguities Similar to a firewall, but does more work Similar to a firewall, but does more work Must be extremely reliable, even during attacks Must be extremely reliable, even during attacks Changes semantics Changes semantics Can Active Mapping replace some Normalizations? Can Active Mapping replace some Normalizations?

Active Mapping Acquiring network knowledge to determine: Acquiring network knowledge to determine: –Packet Arrival –Interpretation Maintained in profile database Maintained in profile database Combined with some techniques used in NormalizationActive Mapping Combined with some techniques used in NormalizationActive Mapping

NIDS + Active Mapping = Disambiguation Resolves without intercepting or modifying stream Resolves without intercepting or modifying stream Opperational and Semantic Advantages Opperational and Semantic Advantages –Eliminates Confusion

Base Network Assumptions Stable Network Topology Stable Network Topology Attacker is outside network Attacker is outside network Firewall used for simple packet filtering Firewall used for simple packet filtering Consistent behavior in Host TCP/IP Stacks Consistent behavior in Host TCP/IP Stacks

Design Goals Comparable runtime performance Comparable runtime performance Mapping should be lightweight Mapping should be lightweight Avoid harming the hosts Avoid harming the hosts

Architecture Mapping Tool runs on topologically equivalent network to monitored network Mapping Tool runs on topologically equivalent network to monitored network

Protocol Details and Limitations Use of header-walking is a good place to start. Use of header-walking is a good place to start. Firewall Filters Firewall Filters Selected Mappings Selected Mappings Difficult/Intractable Cases Difficult/Intractable Cases Practical Considerations Practical Considerations

Firewall Filters Firewall should reject packets that could not be part of legitimate traffic Firewall should reject packets that could not be part of legitimate traffic –Handled by Stateless Packet Filtering –Example: Verifying IP Header

Selected Mappings Hop Count - # of hops to an end host Hop Count - # of hops to an end host PMTU - Packets discarded when > PMTU && DF set PMTU - Packets discarded when > PMTU && DF set TCP RST Acceptance – Noncompliant TCP can create connection discrepencies TCP RST Acceptance – Noncompliant TCP can create connection discrepencies Overlapping/Inconsistent IP Segments – Resolves segments to contain “new” data Overlapping/Inconsistent IP Segments – Resolves segments to contain “new” data –First policy

Difficult/Intractible Cases Application Level Parameters Application Level Parameters New Semantics New Semantics Nondeterministic Packet Drops Nondeterministic Packet Drops

Dealing with Timeouts and Packet Drops Can't notify about every router or host packet drop Can't notify about every router or host packet drop Send packets to receive packets Send packets to receive packets

Practical Considerations Active Mapping does not require a complete profile to be useful Active Mapping does not require a complete profile to be useful Can incrementally deploy while handling hurdles Can incrementally deploy while handling hurdles –NAT –DHCP –TCP Wrappers –Attacks on the active mapper

Prototype Implementation Implemented in Perl and ported to Linux and FreeBSD Implemented in Perl and ported to Linux and FreeBSD ICMP and TCP ICMP and TCP –Sent directly with raw sockets –User-level similar to Tbit Tests conducted in parallel with respect to Machine and Task Tests conducted in parallel with respect to Machine and Task

Mapping Tools Nmap/Queso – Determine O/S of host Nmap/Queso – Determine O/S of host –Neither utility is precise –O/S knowledge = reduces false positives Can serve as a proxy for mapping characteristics Ntop NIDS Ntop NIDS Tbit – Learns TCP (congestion control) behavior of web servers Tbit – Learns TCP (congestion control) behavior of web servers

Experiments and Results Observed Active Mapping Profiles Observed Active Mapping Profiles –Obtained signifigant data for over 4,800 hosts –Diversity –Few inconsistent results

Stability of Results Tests to determine the number of IP addresses and for profile consistency. Tests to determine the number of IP addresses and for profile consistency.

Mapping Time Test results depend on Host and Host's policies Test results depend on Host and Host's policies Inefficiencies and Limited Parallelism Inefficiencies and Limited Parallelism

Mapping Traffic Bidirectional Network Traffic Bidirectional Network Traffic

NIDS Integration Tests Correct data interpretation Correct data interpretation –Synthetic test w/ ambiguous traffic using fragroute –Reasonably Correct No additional runtime costs No additional runtime costs –Comparision on real-world traffic revealed accurate results

Conclusions and Recommendations Mapping can be performed frequently Mapping can be performed frequently –Remap large sites weekly (off-peak hours) Inconsistencies between Stored and Observed policies can trigger Remap Inconsistencies between Stored and Observed policies can trigger Remap On-the-fly Mapping is improbable On-the-fly Mapping is improbable Runtime performance not affected by Active Mapping Runtime performance not affected by Active Mapping –Success depends on correct host/policy!

Summary Ambiguity is a difficult problem to solve Ambiguity is a difficult problem to solve Elimination of Network and Transport Layer ambiguities is proposed in this paper Elimination of Network and Transport Layer ambiguities is proposed in this paper –Active Mapping infers by sending/receiving packets –Efficient in terms of time, speed, bandwidth & output

Summary Future Directions? Future Directions? –Passive monitoring to determine appropriate remapping –More mapping implementations –Application Layer implementations

Works Cited [0] Mark Handley, Christian Kreibich and Vern Paxson, “Network Intrusion Detection: Evasion, Traffic Normaliation, and End-to-End Protocol Semantics,” Proc. 10 th USENIX Security Symposium, [0] Mark Handley, Christian Kreibich and Vern Paxson, “Network Intrusion Detection: Evasion, Traffic Normaliation, and End-to-End Protocol Semantics,” Proc. 10 th USENIX Security Symposium, [1] Umesh Shankar and Vern Paxson, “Active Mapping: Resisting NIDS Evasion Without Altering Traffic” [1] Umesh Shankar and Vern Paxson, “Active Mapping: Resisting NIDS Evasion Without Altering Traffic”