1 Visualizing Network Attacks Eric Conrad April 2009.

Slides:



Advertisements
Similar presentations
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Advertisements

Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 7 “Denial-of-Service-Attacks”.
Network Attacks Mark Shtern.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Modes of Operation CS 795. Electronic Code Book (ECB) Each block of the message is encrypted with the same secret key Problems: If two identical blocks.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Debugging Organizational Communications and Technologies Prithvi Rao H. John Heinz III School of Public Policy and Management Carnegie Mellon University.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Computer Security and Penetration Testing
Lecture 15 Denial of Service Attacks
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Block Cipher Transmission Modes CSCI 5857: Encoding and Encryption.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Introduction to Honeypot, Botnet, and Security Measurement
Forensic and Investigative Accounting
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Modes of Operation. Topics  Overview of Modes of Operation  EBC, CBC, CFB, OFB, CTR  Notes and Remarks on each modes.
Step-by-Step Intrusion Detection using TCPdump SHADOW.
Honeypot and Intrusion Detection System
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Final Introduction ---- Web Security, DDoS, others
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Scapy. Introduction  It’s a packet manipulation tool.  It can forge or decode packets of a wide number of protocols, send them on the wire, capture.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
FORESEC Academy FORESEC Academy Security Essentials (III)
Linux Networking and Security
More About DES Cryptography and Network Security Reference: Sec 3.1 of Stallings Text.
1.1 Chapter 8 Encipherment Using Modern Symmetric-Key Ciphers Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Dr. Reuven Aviv, Nov 2008 Conventional Encryption 1 Conventional Encryption & Message Confidentiality Acknowledgements for slides Henric Johnson Blekinge.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Session 2.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Chapter 2 Symmetric Encryption.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
M ITNICK A TTACK. WHO IS THIS GUY?
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
LSNDI RMRA 1 Design and troubleshooting M Clements.
Network Devices and Firewalls Lesson 14. It applies to our class…
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Domain 4 – Communication and Network Security
Lec 5 Layers Computer Networks Al-Mustansiryah University
Cryptography This week we are going to use OpenSSL
ARP Spoofing.
Mitnick Attack.
Presentation transcript:

1 Visualizing Network Attacks Eric Conrad April 2009

2 A picture is worth 1,000 words Many network, security and system engineers have trained themselves to correlate complex information from text-based representation of events –Like Cypher in The Matrix However, many concepts lend themselves to visual interpretation

3 One example: visual cryptanalysis of DES ECB mode The Data Encryption Standard (DES) is a block cipher with a number of modes The ‘native mode,’ Electronic Code Book, does not ‘chain’ the ciphertext –Identical 64-bit blocks of plaintext become identical blocks of ciphertext As a result, patterns may propagate The other modes of DES destroy patterns by chaining the previous block of ciphertext with the next

4 Showing weaknesses of DES ECB mode Left image is BMP, right image is same BMP encrypted in ECB mode

5 Showing the effects of chaining Same logo, Cipher Block Chaining (CBC) mode ciphertext on right

6 DAVIX DAVIX is a live CD for data analysis and visualization Available at Burn ISO to CD, and boot your laptop into a rich visualization environment

7 The DAVIX Live CD The DAVIX start menu links to all major tools Visualization work is broken down into 3 processes: Capture, Process, Visualize

8 The DAVIX process Capture includes tools that capture network data, like wireshark, tcpdump, etc. Process includes tools that manipulate data, such as afterglow.pl, as well as the classic Unix shell tools such as sed, awk, perl and grep Visualize includes tools to display the data

9 A word on tools All tools mentioned in this paper are on the DAVIX distribution All graphics used in this paper were generated directly from the DAVIX live CD You may download all scripts in this paper at All example commands in this paper will work directly on the DAVIX live CD

10 Dot Dot is a language used to describe graphs Example digraph (directed graph) in dot language, and resulting image: digraph directed{ A -> B -> C; B -> D; }

11 Turning Dot into graphics Graphviz (Graph Visualization Software) includes a number of programs to manipulate Dot programs – Includes tools that take a Dot file as input, and create a graphics file as output This paper uses the Graphviz tools ‘twopi’ and ‘neato’ –twopi uses a ‘radial model’ to lay out nodes –neato uses a ‘spring model’ to lay out nodes

12 Afterglow Afterglow takes CSV files as input and creates a Dot language file as output Makes creating directed graphs very easy The graph on the right was created with echo “1,2,3” | afterglow.pl | neato – Tpng –o example.png

13 Two-column mode Two-column mode has 2 types of nodes: source and target This graph shows 2 source nodes connecting to three targets

14 Afterglow two-column example: normal arp requests

15 ‘Arp bomb’: scan of unused IP addresses

16 Three-column mode Three-column mode adds an ‘event’ node Source nodes connect to targets via ‘events’ Example event: protocol type

17 Visualizing honeypot attacks Let’s use the Dot language to visualize attacks vs. a honeypot Data is from the Honeynet Project® Scan of the Month 27: –During its first week of operation, the honeypot was repeatedly compromised by attackers and worms exploiting several distinct vulnerabilities. Subsequent to a successful attack, the honeypot was joined to a large botnet. Source: What do the attacks look like visually?

18 The attacks, visually

19 Visual traceroute with Dot Generate a route graph with Dot: –traceroute to the top 100 internet sites –Compute average time to each hop –Draw directed graph showing all connections within 6 hops –Display nodes with colors showing RTT First node is blue (and larger) Nodes < 15 ms are palegreen Nodes < 30 ms are green Nodes < 45 ms are yellow Rest are red

20

21 Visualizing Mitnick vs. Shimomura One of the most famous network attacks occurred on Christmas Day, 1994, when Kevin Mitnick allegedly attacked Tsutomu Shimomura’s systems The attack exploited a trust relationship between Shimomura’s ‘x-terminal’ and ‘server’ Shimomura analyzed the attack, and was kind enough to post a detailed post mortem of the attack to the comp.security.misc Usenet group –Including tcpdump output

22 The players 4 systems were involved in the attack: –apollo.it.luc.edu: the source of the attack –server: a host trusted by xterminal –x-terminal: trusted by server – : used as spoofed source for DOS attack There was no live system at this IP address at time of attack

23 The attack Goal was to forge a packet ‘from’ server to xterminal –DOSed server from –Harvested TCP sequence numbers from xterminal –Spoofed connection ‘from’ server to xterminal Attacker did not see the SYN/ACK, and had to guess the sequence number used, and increment by 1 for the reply Let’s use Shimomura’s analysis to see the attack visually

24 Mitnick vs. Shimomura

25 rumint: ‘rumors in the network’ Another useful DAVIX tool is rumint, a ‘PVR for Network Traffic and Security Visualization’ –‘rumint’ is short for ‘rumor intelligence’ –Site: Much of what IDS analysts must do is separating useful signals from noise rumint is useful for ‘spotting the outlier’

26 Analyzing honeypot with rumint

27 rumint ‘text rainfall’ mode Matrix-style falling text from live network capture or pcap file This shows botnet IRC command and control traffic

28 Any questions?