The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*,...

41
The Internet Motion Sensor: A Distributed Blackhole Mon itoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian*†, Jose Nazario†, David Watson* Presenter: Anup Goyal

Transcript of The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*,...

Page 1: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

The Internet Motion Sensor:A Distributed Blackhole Monitoring System

Michael Bailey*, Evan Cooke*, Farnam Jahanian*†,Jose Nazario†, David Watson*

Presenter: Anup Goyal

Page 2: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

What is a Blackhole?

Page 3: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Telescope/ Blackhole/ DarkNet/ Sink Monitoring of unused Address space is very use

ful CAIDA-Network Telescope Internet Motion Sensor – blackhole Team Cymru – DarkNets IUCC/IDC Internet Telescope Isink

Investigating DDOS Tracking Worms Characterizing emerging Internet Thread

Page 4: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

MotivationPassive Monitoring has been around for a while, why build anot

her one? Need broader coverage Need to be able to differentiate threats

Our Solutions: Distributed Monitoring Infrastructure

Increas coverage of threat activity Lightweight Active Responder

Capture payloads to differentiate threats Payload signature and caching

Improve performance and scalability

Page 5: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Why do you need to be distributed?

Page 6: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Local Preference across sensors

Page 7: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Distributed Monitoring Infrastructure

Page 8: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Differentiate Threats?

Page 9: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Why not Build Service Modules?

Page 10: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:
Page 11: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Lightweight Active Responder

Goal: obtain enough fidelity to differentiate threats with the minimum resource cost

TCP needs to establish a connection before data is sent

Use Lightweight SYN-ACK active Responder

Page 12: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Blaster Worm – Live Host

Page 13: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Blaster Worm – Passive Monitor

Page 14: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Blaster Worm - IMS

Page 15: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Active Responder Limitations Application-level responder may be required to

differentiate threats (e.g. Agobot)- Threats like Agobot can be differentiated using scann

ing behaviour

Sensors can be fingerprinted and avoided• IMS focused on globally scoped threats (threat model does not i

nclude targated manual attacks)• Many sensors of different sizes in many networks near live hosts

makes avoidance very hard• Rotate active responders within address block

Page 16: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Payload Signature and Caching

Page 17: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

IMS Deployment

Initial /8 deployment in 2001. Currently 60 address blocks at 18 networks on 3 continent

Tier 1 ISPs, Large Enterprise, Broadband, Academic, National ISPs, Regional ISPs

Page 18: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Deployment Statistics 17,094,016 IPs monitored 27 /8 block with an IMS sensor 1.25% of routed IPv4 space 21% of all routable /8 blocks have at least one s

ensor

IMS Has provided insight into:1. Internet Worms2. Reconnaissance/Scanning3. DDos

Page 19: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Internet Worms

Page 20: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Scanning

Page 21: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

SCO DDoS

Page 22: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Summary & OutreachSummary:

IMS provides a lightweight but effective platform for tracking, and characterizing Internet threats

Successful deployment on 60 address blocks at 18 organization

Outreach: IMS currently used daily by operator community

to investigate new threats We provide reports and forensics to NSP-SEC We are now focusing academic networks Data traces will be available through DHS

PREDICT project

Page 23: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Scalability, Fidelity, and Containment in the

Potemkin Virtual Honeyfarm

Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren,

Geoffrey M. Voelker,Stefan Savage

Presenter: Anup Goyal

Page 24: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Background Large-scale host exploitation a serious problem

Worms, viruses, bots, spyware… Supports an emerging economic criminal enterprise

SPAM, DDoS, phishing, piracy, ID theft… Quality and sophistication of malware increasing rapidly

Page 25: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Motivation Intelligence about new threats is critical for defenders

Principal tool is the network honeypot• Monitored system deployed for the purpose of being attacked

Honeyfarm: Collection of honeypots• Provide early warning, accurate inference of global activity,cover wi

de range of software

Design issues• Scalability: How many honeypots can be deployed• Fidelity: How accurately systems are emulated• Containment: How well innocent third parties are protected

Challenge: tension between scalability and fidelity

Page 26: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Honeyfarm Scalability/Fidelity Tradeoff

Page 27: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Approach

Dedicated honeypot systems are overkill Can provide the illusion of dedicated syst

ems via aggressive resource multiplexing at network and host levels

Page 28: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Network-level Multiplexing Most addresses don’t receive traffic most of the time

- Apply late binding of IP addresses to honeypots

Most traffic that is received causes no interesting effects- Allocate honeypots only long enough to identify interesting

behavior- Recycle honeypots as soon as possible

How many honeypots are required?- For a given request rate, depends upon recycling rate

Page 29: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Effectiveness of Network-Level Multiplexing

Page 30: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Host-Level Multiplexing CPU utilization in each honeypot quite low (mill

iseconds to process traffic)- Use VMM to multiplex honeypots on a single physical

machine

Few memory pages actually modified when handling network data- Share unmodified pages among honeypots within a

machine

How many virtual machines can we support?- Limited by unique memory required per VM

Page 31: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Effectiveness of Host-Level Multiplexing

Further 2-3 order of magnitude improvement

Page 32: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

The Potemkin Honeyfarm Architecture Two components:

- Gateway- VMM

Basic operation:- Packet received by

gateway- Dispatched to hone

yfarm server- VM instantiated

- Adopts IP address

Page 33: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Potemkin VMM Requirements VMs created on dem

and- VM creation must be f

ast enough to maintain illusion

Many VMs created- Must be resource-efficie

nt

Page 34: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Potemkin VMM Overview Modified version of Xen 3.0 (pre-release)

Flash cloning- Fork copies from a reference honeypot VM- Reduces VM creation time—no need to boot- Applications all ready to run

Delta virtualization- Copy-on-write sharing (between VMs)- Reduces per-VM state—only stores unique data- Further reduces VM creation time

Page 35: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Flash Cloning Performance Time required to clone a 128 MB honeypot:

Control tools overhead 124 msLow-level clone 11 msDevice setup 149 msOther management overhead 79 msNetworking setup & overhead 158 msTotal 521 ms

0.5 s already imperceptible to external observers unless looking for delay, but we can do even better

Page 36: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Delta Virtualization Performance Deployed using 128 MB Linux honeypots

Using servers with 2 GB RAM, have memory available to support ~ 1000 VMs per physical host

Currently tested with 100 VMs per host Hits artificial resource limit in Xen, but this can be fix

ed

Page 37: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Containment Policies Must also care about traffic going out We deliberately run unpatched, insecure softw

are in honeypots Containment: Should not permit attacks on thir

d parties As with scalability, there is a tension between c

ontainment and fidelity Various containment policies we support:

Allow no traffic out Allow traffic over established connections Allow traffic back to original host

Page 38: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Containment Implementation in Gateway Containment policies implemented in ne

twork gateway Tracks mappings between IP addresses,

honeypots, connections Modular implementation in Click Gateway adds insignificant overhead ( 1

ms)

Page 39: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Traffic ReflectionExample gateway policy:Redirect traffic back toHoneyfarm

Packets sent out to third parties. . .

. . .may be redirected back into honeyfarm

Reuses honeypot creation functionality

Page 40: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Challenges Honeypot detection

If malware detects it is in a honeypot, may act differently How easy it is to detect virtualization? VMware detection code used in the wild

Open arms race between honeypot detection and camouflage

Resource exhaustion Under high load, difficult to maintain accurate illusion

Large-scale outbreak Honeypot denial-of-service

Challenge is intelligently shedding load

Page 41: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:

Summary Can achieve both high fidelity and scalability

Sufficient to provide the illusion of scale

Potemkin prototype: 65k addresses -> 10 physical hosts Largest high-fidelity honeypot that we are aware of

Provides important tool for study of and defenses against malware