Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

19
Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Transcript of Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Page 1: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Stego Intrusion Detection System(SIDS)

Michael Sieffert

Assured Information Security, Inc.

Page 2: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Topics Covered

• Steganography

• Steganalysis

• Misuse / Motivation

• SIDS structure

• Screenshots

• Demo?

• Future of SIDS

• Conclusion

Page 3: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Steganography

• “Art of covered writing”• Concealing the existence of communication

between two parties• Hiding data in common, unstructured areas of

media files– Transmitted via computer networks

• Many tools available freely that work with:– Image, music files– Text– TCP/IP header fields

Page 4: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Stego (continued)

(original) (carrier)

Page 5: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Steganalysis

• Detecting the presence of steganographic data

• Does a given file contain stego?– How sure can we be?

• Not always a certainty

– If so, is it possible to extract its contents?

• Many products / algorithms available that attempt to discover stego– Some algorithms are closed source or proprietary– Not organized into any consistent API

Page 6: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Potential for Misuse?

• Of course!

• Transmission/storage of illegal or proprietary data– Child pornography– Company secrets

• Terrorist message passing?

• Adversaries

• Intruders– Data exfiltration/infiltration

• Insider threat

Page 7: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Motivation

• Adversaries can use stego to communicate undetected– Even through our own networks– Manual attacks– Programmatic attacks

• A stealthy piece of malicious software is aware of network defenses, and will circumvent them

• An intelligent virus/trojan program could be using HTTP to transmit and receive data– Current network defense mechanisms will not stop this

• Firewall• Intrusion detection systems

• Corporate espionage gets easier!

Your network is at risk!

Page 8: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

HTTP Image Transfer

• How many images are pulled into/out of your network daily?– Makes an attractive channel for stego’ed data transfer

• An attacker / virus could create (seemingly normal) HTTP traffic that contains important* data– Instructions for the program– Proprietary / sensitive information (secrets, credit card

numbers, etc)

Page 9: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

SIDS

• Stego intrusion detection system– Aims to flag all HTTP traffic containing imagery that

tests positive for stego content (more protocols later)

• Gateway defense mechanism– Placed at a network border– In promiscuous mode, sniffs all HTTP traffic and

reconstructs (if necessary) any images transmitted– Tests each image against all known steganalysis

algorithms– Alerts user/administrator to presence of stego on their

networkNot a firewall!

Page 10: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

High Level View

Algorithm 4Algorithm 3Algorithm 2Algorithm 1

Algorithm n

MasterDatabase

SIDS

FW

image1image2image3image4image5

Scanner

Internet

Page 11: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

SIDS Highlights

• Plug-in interface for steganalysis algorithms– Allows SIDS to increase its effectiveness as new

methods are developed– Proprietary or sensitive algorithms can be used in

house

• Interface written in Java, making the GUI section of SIDS easily portable to a separate platform in the future

• SIDS machine does not even need an IP address, making it undetectable to an attacker

Page 12: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

SIDS Screen Shots

- Statistics -

Shows last image testing positive for

stego

Graphs detailing the number of images captured / flagged

Page 13: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Screen Shots (continued)

- Recent Finds -

Details of individual images captured from

the wire

Summary of steganalysis information

Allows for manual inspection of images

Page 14: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Screen Shots (continued)

- Histograms -

Provide a breakdown of the most frequent

offender's IP addresses

Page 15: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Limitations

• Extremely high traffic can cause packet loss

• Only a handful of algorithms ship with SIDS currently– Working to add more algorithms– User can add their own– Attempting to establish a community standard

• User interface can be improved, made more lean

• Only HTTP, currently– Unable to examine encrypted data

Page 16: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Future of SIDS

• Always more protocols/places to check for stego– FTP, P2P, NNTP, IRC, ICMP, TCP/IP headers, Timing– Email (attachments), etc.

• Host based version of SIDS likely on the way– Continually checking all images found on a system for stego– Help catch use of stego storage (stuff that’s not sent across the

wire)

• Enterprise Edition• Hardware assisted steganalysis• Neural nets

Page 17: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Future of SIDS (continued)

• Best detection with newest steganalysis algorithms

• Moving towards the anti-virus model– Database of detection ‘signatures’ must be up to date

• Development of public database of detection algorithms– Developed as plug-ins for all versions of SIDS– Freely downloadable

Page 18: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Conclusion

• Stego is being used... and will continue to gain acceptance as a method of hiding in plain sight

• Defense is a hard problem

• Efficiency issues with loads of scanning / analysis

• Steganalysis is improving– Still behind the state of the art in steganography

• This trend will likely to continue as new forms of stego emerge

Page 19: Stego Intrusion Detection System (SIDS) Michael Sieffert Assured Information Security, Inc.

Questions..

• SIDS– Created by Dr. Leonard Popyack and Charles Green

(Assured Information Security, Inc.)– Code Authors:

• Rodney Forbes (daemons, plug-in interface)

• Mike Sieffert (Java GUI)

– Sponsored by Air Force Research Laboratory (AFRL), Air Force Information Warfare Battlelab (AFIWB)

• POC: Thomas Blake, AFRL/IFGB ([email protected])