Billy Goat 2.0 Technical Overview

17
IBM Zürich Research Laboratory © 2006 IBM Corporation Billy Goat Overview James Riordan Diego Zamboni Yann Duponchel IBM Research Zurich Switzerland

Transcript of Billy Goat 2.0 Technical Overview

Page 1: Billy Goat 2.0 Technical Overview

IBM Zürich Research Laboratory

© 2006 IBM Corporation

Billy GoatOverviewJames RiordanDiego Zamboni Yann DuponchelIBM Research Zurich Switzerland

Page 2: Billy Goat 2.0 Technical Overview

IBM Zürich Research

2 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Short Worm Summary

Resulting in

Direct damange

Poor user experience

Wasted bandwidth

Dis-infection costs

DDOS Zombies

Firewall tunnels

Potential liability

....

Attackers, attacks, worms,...● Faster propagation with faster networks

● Ever greater numbers

● Increasingly sophisticated● Optimized propagation● Modular with respect to exploits● Multi-vectored● Stealth and explosive (hot lists)● Parasitic worms● Worm authors learning from virus

techniques

Page 3: Billy Goat 2.0 Technical Overview

IBM Zürich Research

3 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Precision versus focus

GeneralityCoverage

FocusPrecision

Fals

e Po

siti

ves

Billy Goat

Typical general-purpose IDS

Page 4: Billy Goat 2.0 Technical Overview

IBM Zürich Research

4 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Billy Goat overview: the basic ideaBilly Goat is an intrusion detection sensor

● Virtualization of unbound address subnets● Catches only traffic that should not

exist● First person participant in protocols● Try to download actual worm code

● Very low false positive rate

● Modular alarm and reporting infrastructure● Policy based● syslog, TEC, e-mail, database,...

● Well suited toward automated attack

● Example: Zurich Research Lab BG spoofs existence of ~49,000 different hosts

Network

Page 5: Billy Goat 2.0 Technical Overview

IBM Zürich Research

5 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

EngineeringRecovering rather than resistant

Cryptographic checksums for database keys

SMB/Lure idea

One way database synchronization

Very low deployment effort (encourage grass roots)

Boot a live Linux distribution...

wget -O- -q https://billygoat/myconfig.xml|/bin/sh

Inter-operating components vs. übersystem

e.g. created an isolation system based on VLAN tags, plug the two together

and we have automated intrusion response

Using IBM's BEEPLite implementation of BEEP

http://www.beepcore.org

Page 6: Billy Goat 2.0 Technical Overview

IBM Zürich Research

6 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Billy Goat overview: individual sensorsMany application-layer sensors

HTTP, HTTPS, DCOM, MS/SQL, Kerberos,... SMB/Lure (based on Samba)e-mail worm backdoors (MyDoom, beagle.b, beagle.e,... )General purpose TCP/UDPOpen ended and easily expandable

Traffic anomaly (IP profiling)On-box correlationRelationship to honey pots

Not advertised (hence all traffic suspicious)Hardened machine (difficult to crack)No real services offered

Analysis

ModularAlarming +Reporting

DataRepository

VirtualizationHTTP

SMB/LureMS/SQLMS/RPC

Backdoors

…(open ended)

IP Profile

Page 7: Billy Goat 2.0 Technical Overview

IBM Zürich Research

7 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Distributed Billy Goat Architecture

AlarmsRaw dataAnalysis

Local Billy Goat

LocalAdministrator

Web InterfaceBilly GoatUpdate ServerNew SignaturesNew Functions

Central Billy Goat

Alarming

Centralized BillyGoat Data

Reporting

Web Interface

LocalAdministrator

Existing customer processes and tools

Policy based subscription

AlarmsRaw dataAnalysis

Local Billy Goat

LocalAdministrator

Web Interface

AlarmsRaw dataAnalysis

Local Billy Goat

LocalAdministrator

Web Interface

Page 8: Billy Goat 2.0 Technical Overview

IBM Zürich Research

8 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Integration into security system as a wholeOriginally alarms

Simple web page for dig down

Information integration platform

Data presented as “semantic” XML at various URLs

http://billygoat/topattacks.xml?n=10

http://billygoat/topattackers?n=10&network=9.4.0.0/16

Presentation via XSLT stylesheets

Service descriptions via RDF and web ontologies

Enables automatic integration of other data source (local and otherwise)

Vulnerability information, NIDS output,....

Page 9: Billy Goat 2.0 Technical Overview

IBM Zürich Research

9 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Modes of deploymentStatic route

Safe but need to talk with networking people

ARP spoofing

Don’t need to talk with networking people

Very dangerous

BGP

Automatically adapts to network

Potentially dangerous

Lessons for intrusion response

ICMP based

Huge address space, locally relevant information

Potentially dangerous

Page 10: Billy Goat 2.0 Technical Overview

IBM Zürich Research

10 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Router Based Billy Goat

Network

1. Worm tries to contact remote host2. Remote router ARPs for host3. Remote router returns ICMP (net or host) message4. Local router intercepts ICMP and sets local route5. Worm retransmits to Billy Goat

Page 11: Billy Goat 2.0 Technical Overview

IBM Zürich Research

11 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Router Based Billy Goat

Network

1. Worm tries to contact remote host2. Remote router ARPs for host3. Remote router returns ICMP (net or host) message4. Local router intercepts ICMP and sets local route5. Worm retransmits to Billy Goat

Page 12: Billy Goat 2.0 Technical Overview

IBM Zürich Research

12 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Router Based Billy Goat

Network

1. Worm tries to contact remote host2. Remote router ARPs for host3. Remote router returns ICMP (net or host) message4. Local router intercepts ICMP and sets local route5. Worm retransmits to Billy Goat

Page 13: Billy Goat 2.0 Technical Overview

IBM Zürich Research

13 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Router Based Billy Goat

Network

1. Worm tries to contact remote host2. Remote router ARPs for host3. Remote router returns ICMP (net or host) message4. Local router intercepts ICMP and sets local route5. Worm retransmits to Billy Goat

Page 14: Billy Goat 2.0 Technical Overview

IBM Zürich Research

14 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Router Based Billy Goat

Network

1. Worm tries to contact remote host2. Remote router ARPs for host3. Remote router returns ICMP (net or host) message4. Local router intercepts ICMP and sets local route5. Worm retransmits to Billy Goat

Page 15: Billy Goat 2.0 Technical Overview

15

IBM Zurich Research Laboratory

All about Billy Goat © 2004 IBM Corporation

Effect on network sensorsNIDS 1

NIDS 3

NIDS 2

Networkreal machines

Page 16: Billy Goat 2.0 Technical Overview

16

IBM Zurich Research Laboratory

All about Billy Goat © 2004 IBM Corporation

Double routing and ghosts

Internet NAT

Real LAN

?

Page 17: Billy Goat 2.0 Technical Overview

IBM Zürich Research

17 Billy Goat Technical Overview 29 June 2006 © 2006 IBM Corporation

Summary

Billy Goat is an very accurate intrusion detection sensor

focused rather than general

Value is in integration

detects and identifies network worms

Several existing and planned deployments

IBM intranet

Several customers

Internet (early warning system)