The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun...

31
The Internet Motion Sensor: The Internet Motion Sensor: A Distributed Blackhole A Distributed Blackhole Monitoring System Monitoring System Presented By: Presented By: Arun Krishnamurthy Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, David Watson. 12th Annual Network and Distributed System Security Symposium (NDSS'05)

Transcript of The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun...

Page 1: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion Sensor:The Internet Motion Sensor:A Distributed Blackhole A Distributed Blackhole

Monitoring SystemMonitoring System

Presented By:Presented By:Arun KrishnamurthyArun Krishnamurthy

Authors: Michael Bailey, Evan Cooke, Farnam

Jahanian, Jose Nazario, David Watson.

12th Annual Network and Distributed System Security Symposium

(NDSS'05)

Page 2: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

Presentation OutlinePresentation Outline The Threat ProblemThe Threat Problem

Why the Internet Motion Sensor (IMS) was Why the Internet Motion Sensor (IMS) was created?created?

Introduction to IMSIntroduction to IMS What is it?What is it? What is it supposed to do?What is it supposed to do? What are the components?What are the components?

ObservationsObservations What nasty stuff did IMS find?What nasty stuff did IMS find?

My comments and ConclusionMy comments and Conclusion What rocked? What sucked?What rocked? What sucked? Suggestions for improvement?Suggestions for improvement?

Page 3: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Threat ProblemThe Threat Problem

A network that is always connected A network that is always connected is highly vulnerable to threats.is highly vulnerable to threats.

Threats Properties:Threats Properties: Globally Scoped.Globally Scoped. Can have no patches or fixes.Can have no patches or fixes. Evolutionary.Evolutionary. Can spread through the entire network Can spread through the entire network

within minutes.within minutes.

Page 4: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Threat ProblemThe Threat Problem

Promising Method to Investigate Promising Method to Investigate Threats:Threats: Monitor unused or dark address space.Monitor unused or dark address space.

Issues:Issues: Sensor Coverage.Sensor Coverage.

Visibility of the system into Internet threats.Visibility of the system into Internet threats. Service EmulationService Emulation

What services to emulate and at what level to What services to emulate and at what level to emulate them?emulate them?

Page 5: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(What is it?)(What is it?)

Definition:Definition: A globally scoped Internet monitoring system whose A globally scoped Internet monitoring system whose

objective is to measure, characterize, and track objective is to measure, characterize, and track threats.threats.

Goals:Goals: Maintain a level of interactivity that can differentiate Maintain a level of interactivity that can differentiate

traffic on the same service.traffic on the same service.

Provide visibility into Internet threats beyond Provide visibility into Internet threats beyond address, geographical, and operational boundaries.address, geographical, and operational boundaries.

Enable characterization of emerging threats while Enable characterization of emerging threats while minimizing incremental effort.minimizing incremental effort.

Page 6: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Architecture – Basic Idea)(Architecture – Basic Idea)

Consist of a set of distributed blackhole Consist of a set of distributed blackhole sensors, each monitoring a dedicated range of sensors, each monitoring a dedicated range of unused IP address space. Blackhole sensors unused IP address space. Blackhole sensors contain contain passivepassive and and active componentactive component..

Passive Component:Passive Component: Records packets sent to sensor’s address space.Records packets sent to sensor’s address space. Responds to specific packets to elicit more data Responds to specific packets to elicit more data

from source.from source.

Active Component:Active Component: Designed to extract the first payload of data across Designed to extract the first payload of data across

the major protocols.the major protocols.

Page 7: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Architecture – Diagram)(Architecture – Diagram)

Page 8: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Architecture - Main (Architecture - Main

Components)Components) Distributed Blackhole NetworkDistributed Blackhole Network

Used to increase visibility into global threats.Used to increase visibility into global threats.

Lightweight Active ResponderLightweight Active Responder Provides enough interactivity that traffic on Provides enough interactivity that traffic on

the same service can be differentiated the same service can be differentiated independent of application semantics.independent of application semantics.

Payload Signatures & CachingPayload Signatures & Caching Used to avoid recording duplicate payloads.Used to avoid recording duplicate payloads.

Page 9: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Distributed Blackhole (Distributed Blackhole

NetworkNetwork)) A large distributed sensor network built from A large distributed sensor network built from

address blocks of many sizes that are scattered address blocks of many sizes that are scattered throughout the network.throughout the network.

Using Moore’s Telescopes Analogy, blocks of Using Moore’s Telescopes Analogy, blocks of larger sizes have a broader detection coverage.larger sizes have a broader detection coverage.

Different sensors observe different magnitudes Different sensors observe different magnitudes and types of traffic.and types of traffic.

/16 Address Sensor

/8 Address Sensor

Page 10: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Lightweight Responder(Lightweight Responder))

Main responsibility is to elicit Main responsibility is to elicit payloads for TCP connections.payloads for TCP connections.

Two key contributions:Two key contributions: Ability to elicit payloads to differentiate Ability to elicit payloads to differentiate

traffic.traffic. Ability to get responses across ports Ability to get responses across ports

without application semantic without application semantic information.information.

Page 11: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Lightweight Responder – Other (Lightweight Responder – Other

CharacteristicsCharacteristics)) Differentiate Services:Differentiate Services:

By using payload signatures, IMS can identify the By using payload signatures, IMS can identify the presence of new worms even in extremely noisy presence of new worms even in extremely noisy conditions.conditions.

Service Agnostic:Service Agnostic: Enables insight into less popular services.Enables insight into less popular services.

Example: Backdoor ports on existing wormsExample: Backdoor ports on existing worms

One Limitation:One Limitation: IMS provides little or no information on threats IMS provides little or no information on threats

that depend on application level responses.that depend on application level responses.

Page 12: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Payload Signatures and (Payload Signatures and

CachingCaching)) Basic idea:Basic idea:

Check the MD5 checksum of the payload.Check the MD5 checksum of the payload. If the checksum is found in cache, thenIf the checksum is found in cache, then

Only log the signature. (DO NOT store the payload.)Only log the signature. (DO NOT store the payload.) ElseElse

Store both payload and signature.Store both payload and signature.

With a 96% cache hit rate, this method With a 96% cache hit rate, this method saves over 100 GB/day per address saves over 100 GB/day per address sensor!!!sensor!!!

Page 13: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Payload Signatures and Caching (Payload Signatures and Caching

ExampleExample))WormWorm SignaturSignatur

eePayloadPayload HitsHits

MyWorMyWormm

9e107d9d372bb6826bd81d3542bt569g

11

9e107d9d372bb6826bd81d3542bt569g

MD5 Signature + PayloadBlackhole

Sensor

Page 14: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Payload Signatures and Caching (Payload Signatures and Caching

ExampleExample))WormWorm SignaturSignatur

eePayloadPayload HitsHits

MyWorMyWormm

9e107d9d372bb6826bd81d3542bt569g

11

AnotherWorAnotherWormm

e56d4cd98f00b204e9800998ecf8427e

11

e56d4cd98f00b204e9800998ecf8427e

MD5 Signature + PayloadBlackhole

Sensor

Page 15: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Payload Signatures and Caching (Payload Signatures and Caching

ExampleExample))WormWorm SignaturSignatur

eePayloadPayload HitsHits

MyWorMyWormm

9e107d9d372bb6826bd81d3542bt569g

22

AnotherWorAnotherWormm

e56d4cd98f00b204e9800998ecf8427e

11

9e107d9d372bb6826bd81d3542bt569g

MD5 Signature + PayloadBlackhole

Sensor

Page 16: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Observations(Observations))

An IMS prototype developed at An IMS prototype developed at University of Michigan consisted of 28 University of Michigan consisted of 28 address sensors at 18 physical locations.address sensors at 18 physical locations.

3 events captured:3 events captured: Internet WormsInternet Worms ScanningScanning Distributed Denial of Service (DDoS) AttacksDistributed Denial of Service (DDoS) Attacks

Page 17: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Internet Worms(Internet Worms))

IMS detection of various behaviors from IMS detection of various behaviors from worms:worms: Worm VirulenceWorm Virulence

How much traffic resulted from worm?How much traffic resulted from worm? What routers/paths got congested?What routers/paths got congested?

Worm DemographicsWorm Demographics Number of hosts infected?Number of hosts infected? Operating System and other information of host?Operating System and other information of host?

Worm PropagationWorm Propagation How does the worm select next target?How does the worm select next target?

Community ResponseCommunity Response What organizations reacted the fastest? What organizations reacted the fastest? Who is still infected?Who is still infected?

Page 18: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(The Blaster Worm(The Blaster Worm))

Description:Description: Affected Windows 2000/XP systems running Affected Windows 2000/XP systems running

DCOM RPC services and used a buffer DCOM RPC services and used a buffer overflow attack to run code on target overflow attack to run code on target machine.machine.

In a 7 day period, IMS detected 3 In a 7 day period, IMS detected 3 Phases:Phases: 11stst Phase – Growth Phase – Growth 22ndnd Phase – Decay Phase – Decay 33rdrd Phase – Persistence Phase – Persistence

Page 19: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(The Blaster Worm – Phases (The Blaster Worm – Phases

DiagramDiagram))

Page 20: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(The Blaster Worm(The Blaster Worm))

Other observation:Other observation: The Blaster Worm sends an exploit on The Blaster Worm sends an exploit on

TCP port 135, then follows with some TCP port 135, then follows with some commands on TCP port 4444.commands on TCP port 4444.

Conclusion from Blaster Worm Conclusion from Blaster Worm observations:observations: IMS provides data that can differentiate IMS provides data that can differentiate

between different variants of worms.between different variants of worms. Passive blackhole sensors can not do that!Passive blackhole sensors can not do that!

Page 21: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Blaster Worm Captured(Blaster Worm Captured))

Page 22: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Blaster Worm Captured(Blaster Worm Captured))

Page 23: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Blaster Worm Captured(Blaster Worm Captured))

Page 24: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Scanning(Scanning))

Attackers scan for vulnerable services to exploit Attackers scan for vulnerable services to exploit them.them.

Beagle and MyDoom Worm:Beagle and MyDoom Worm: SMTP worms that began spreading in 2004.SMTP worms that began spreading in 2004. Listens to port 2745 (Beagle) and port 3127 Listens to port 2745 (Beagle) and port 3127

(MyDoom) for backdoors to load malicious software.(MyDoom) for backdoors to load malicious software. Conclusion from observations:Conclusion from observations:

Lightweight Responder allowed IMS to detect the Lightweight Responder allowed IMS to detect the backdoor ports.backdoor ports.

Since both worms have variants, having the Since both worms have variants, having the responder made it less time consuming than creating responder made it less time consuming than creating handcrafted service modules for each variant. handcrafted service modules for each variant.

Page 25: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Beagle and MyDoom Scanning Activity (Beagle and MyDoom Scanning Activity

ChartChart))

Page 26: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Distributed Denial of Service(Distributed Denial of Service))

These attacks rely on many end hosts to These attacks rely on many end hosts to consume network resources.consume network resources.

The SCO Group Attack:The SCO Group Attack: Attacked www.sco.com on December 10, 2003Attacked www.sco.com on December 10, 2003 Attacked 3 web servers, an FTP server, and a SMTP Attacked 3 web servers, an FTP server, and a SMTP

server.server. Since the attackers used spoofed IP addresses, IMS Since the attackers used spoofed IP addresses, IMS

was able to observe some backscatter from these was able to observe some backscatter from these attacks.attacks.

Conclusion from observation:Conclusion from observation: Showed the need for address diversity (having Showed the need for address diversity (having

different blocks of many sizes).different blocks of many sizes).

Page 27: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Backscatter Diagram from (Backscatter Diagram from

SCO AttackSCO Attack))

Page 28: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Strengths(Strengths))

IMS’ variety of address blocks IMS’ variety of address blocks allows it to find various worms allows it to find various worms that passive sensors can not that passive sensors can not detect.detect.

Payload Signature and Caching Payload Signature and Caching System can save over 100GB of System can save over 100GB of memory per sensor per day!memory per sensor per day!

Page 29: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Weaknesses(Weaknesses))

Provides little or no information on Provides little or no information on threats that depend on application level threats that depend on application level responses.responses. NetBIOS services requires RPC NetBIOS services requires RPC bind() bind()

before being able to do RPC before being able to do RPC request()request(). IMS . IMS can detect RPC can detect RPC bind(),bind(), but not RPC but not RPC request()request() since no application level response was sent.since no application level response was sent.

Requires a relatively powerful machine.Requires a relatively powerful machine. x86 machine with at least 1GB RAM.x86 machine with at least 1GB RAM.11

1 From Internet Motion Sensor FAQ Site. http://ims.eecs.umich.edu/faq/index.html

Page 30: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Suggestions for (Suggestions for ImprovementImprovement))

Find a way to get information on Find a way to get information on threats that depend of threats that depend of application level responses.application level responses.

Get IMS to fully learn the Get IMS to fully learn the behavior of worms so it can behavior of worms so it can automatically develop patches.automatically develop patches.

Page 31: The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,

The Internet Motion SensorThe Internet Motion Sensor(Conclusion(Conclusion))

The IMS uses a variety of blackhole The IMS uses a variety of blackhole sensors of various sizes to track, sensors of various sizes to track, characterize, and measure threats.characterize, and measure threats.

It can detect various types of threats It can detect various types of threats that passive sensors can’t detect!that passive sensors can’t detect!

It would be great to run if you have a It would be great to run if you have a relatively powerful computer!relatively powerful computer!