Automated Signature Generation: Overview and the NoAH Approach. Bernhard Tellenbach

Similar documents
A Novel Approach to Detect and Prevent Known and Unknown Attacks in Local Area Network

Argos Emulator. Georgios Portokalidis Asia Slowinska Herbert Bos Vrije Universiteit Amsterdam

SSL Automated Signatures

Polygraph: Automatically Generating Signatures for Polymorphic Worms

WormTerminator: : An Effective Containment of Unknown and Polymorphic Fast Spreading Worms

Network Intrusion Detection with Semantics-Aware Capability

Collaborative Intrusion Prevention

A Modular Approach for Implementation of Honeypots in Cyber Security

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Network Intrusion Detection with Semantics-Aware Capability W. Scheirer, M. Chuah {wjs3, Department of Computer Science and

NoAH Honeynet Project. 17 th TF-CSIRT Event 23/24 January 2006 DFN-CERT Services GmbH

Online Network Forensics for Automatic Repair Validation

Hitlist Worm Detection using Source IP Address History

Tales from the Crypt: fingerprinting attacks on encrypted channels by way of retainting

Efficient Content-Based Detection of Zero-Day Worms

Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models

2. INTRUDER DETECTION SYSTEMS

IDS: Signature Detection

intelop Stealth IPS false Positive

Computer Security: Principles and Practice

CSE 565 Computer Security Fall 2018

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 12

Can the Best Defense be to Attack?

PalProtect: A Collaborative Security Approach to Comment Spam

Polymorphic Blending Attacks. Slides by Jelena Mirkovic

Beyond a sensor. Towards the Globalization of SURFids. FIRST 20 th Annual Conference Vancouver, Canada

Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems

Binary Protector: Intrusion Detection in Multitier Web Applications

Detecting Manipulated Remote Call Streams

UMSSIA INTRUSION DETECTION

Building a Reactive Immune System for Software Services

Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection

Self-Learning Systems for Network Intrusion Detection

Survey of Polymorphic Worm Signatures. Mesra, Ranchi, India. Mesra, Ranchi, India. Abstract

PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422

CE Advanced Network Security Honeypots

Practical Techniques for Regeneration and Immunization of COTS Applications

0x1A Great Papers in Computer Security

Hardware Supports for Network Traffic Anomaly Detection

Basic Concepts in Intrusion Detection

Syntax vs. Semantics: Competing Approaches to Dynamic Network Intrusion Detection

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 22

An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks

An Anomaly-driven Reverse Proxy for Web Applications

Overview Intrusion Detection Systems and Practices

Network Monitoring for Performance and Security: the LOBSTER Project

Generating Simplified Regular Expression Signatures for Polymorphic Worms

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

Gladiator Incident Alert

Intrusion Detection Systems

(WHASG) Automatic SNORT Signatures Generation by using Honeypot

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Honey Pot Be afraid Be very afraid

Vigilante: End-to-End Containment of Internet Worms

Baggy bounds with LLVM

Deliverable 4.1: Experimental Evaluation and Real-world Deployment

CIH

End-Point Counter-Worm Mechanism Using Automated Software Patching. Angelos Keromytis Columbia University

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

Enhancing Byte-Level Network Intrusion Detection Signatures with Context

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

An Architecture for Generating Semantic-Aware Signatures

Buffer Overflow attack avoiding Signature free technique

소프트웨어기반고성능침입탐지시스템설계및구현

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis

Detecting Suspicious Behavior of SDN Switches by Statistics Gathering with Time

ARAKIS An Early Warning and Attack Identification System

Self-defending software: Automatically patching errors in deployed software

Defending Against Next Generation through Network/Endpoint Collaboration and Interaction

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Blocker: A Blocker Of Signature Free Buffer Overflow Attack

Firewalls, Tunnels, and Network Intrusion Detection

The Age of Data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack

Prospector: accurate analysis of heap and stack overflows by means of age stamps

FLIPS: Hybrid Adaptive Intrusion Prevention

e e Prof. Lingyu Wang

Buffer Overflow Defenses

OSSIM Fast Guide

Casting out Demons: Sanitizing Training Data for Anomaly Sensors Angelos Stavrou,

Environment-Sensitive Intrusion Detection

Intrusion Detection. October 19, 2018

Chapter 9. Firewalls

"GET /cgi-bin/purchase?itemid=109agfe111;ypcat%20passwd mail 200

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

The Protocols that run the Internet

Identification of Malicious Web Pages with Static Heuristics

Defending against Polymorphic Attacks: Recent Results and Open Questions

D1.2: Attack Detection and Signature Generation

Endpoint-driven Intrusion Detection and Containment of Fast Spreading Worms in Enterprise Networks

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Emerging Threat Intelligence using IDS/IPS. Chris Arman Kiloyan

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

An Architecture for Inline Anomaly Detection

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

Activating Intrusion Prevention Service

HYBRID HONEYPOT -SYSTEM FOR PRESERVING PRIVACY IN NETWORKS

Web Application & Web Server Vulnerabilities Assessment Pankaj Sharma

Intrusion Detection. What is Intrusion Detection

Transcription:

Automated Signature Generation: Overview and the NoAH Approach

Structure Motivation: The speed of insecurity Overview Building Blocks and Techniques The NoAH approach 2

The speed of insecurity Source: The Dynamics of (In)Security, Stefan Frei, ETH Zurich, BlackHat 2006 3

Motivation Disclosure and Exploit are (sometimes) too close > Zero-Day exploits are a fact > Manual SG is too slow Automated Signature Generation (ASG) could make security products cheaper render remote updates of signature databases obsolete 4

Overview: Building Blocks of an ASG System raw data attack vector information Site 1 Attack Detector Analysis Engine refined attack vector information Correlator Signature Generator Site N Attack Detector Analysis Engine transformed attack vector information 5

Techniques for Detecting Unknown Attacks Anomaly based Compromise based Standalone Host-Based Execution path profiling [1] Traffic to honeypot [2] -Based Profiling of benign traffic [3] Host-Based Address Space Randomization [6] Memory tainting [7] -Based Honeypot [4] (Protocol violations) Distributed -Based Scanning/Spreading [5] 6

Compromise Based Detection Techniques Memory Tainting: Honeypot: A.B.C.D Guest OS Emulator CPU Exec: 0xAAA Attacker RAM TAINTED! 0xAAA Host OS NIC W.X.Y.Z W.X.Y.Z Double Honeypot Approach 7

Techniques for Detecting Unknown Attacks Limitations: Anomaly based techniques: Are prone to false positives and false negatives Compromise based techniques: Mainly for buffer overflow and/or code injection attacks Ready for use in production infrastructures? All techniques can be found in the wild (in software and/or hardware) 8

Techniques for Traffic based Analysis Engines Group traffic (e.g. according to service) and: [3] search for longest common substring (LCS) (> only for non-polymorphic attack payload) [8] search for characteristic n-grams (> can handle attack payload with block reordering) [4] extract significant regions using position aware byte frequency analysis (> can handle attack payload with limited polymorphism) Output: Byte sequence(s) or byte frequency distribution 9

Techniques for Traffic based Analysis Engines Limitations: Requires MULTIPLE SAMPLES of the same attack Are prone to false positives and evasion: - Systematic manipulation of byte distributions - Injection of fake characteristic byte sequences Only for unencrypted traffic Ready for use in production infrastructures? No. At least not for use in IPS Could be used as add-on to manual analysis 10

Techniques for Host Information Based Analysis Engines Memory analysis: Identify relevant content Log memory content injected by the attacker Log its use (data, code, jump address, ) How? Instrumentation of applications [9] E.g. source code or binary rewriting Application independent [10] OS independent (e.g. x86 emulator based) [11] OS dependent (e.g. using memory debuggers like Valgrind) Output: Memory addresses and content relevant for the attack 11

Techniques for Host Information Based Analysis Engines Execution path analysis: Identify path characteristics toward the vulnerability Identify modifications required to exploit vulnerable code How? Instrumentation of applications [1] E.g. source code or binary rewriting Use tools based on debugging techniques Output: Charact. exec. flow and data required to control it 12

Techniques for Analysis Engines Limitations: Performance: 2 to 100 times slower Online analysis: Fingerprinting of sensors is easy - Mitigation: Offline analysis > Requires reliable REPLAY techniques! Limited to buffer-overflow/code-injection attacks Ready for use in production infrastructures? Yes, especially as add-on to conventional IDS Use honeypot based systems with almost no maintenance overhead (e.g. [4]) 13

Techniques for Analysis Engines Hybrid analysis engine: Host information and network traffic based > The NoAH approach Techniques for other components: (Correlation) Signature Generator: Translate information from analysis engine into a signature 14

The NoAH Approach EU project NoAH ( of Affined Honeypots) 15

Goals NoAH aims at automated detection of unknown attacks Generation of signatures to counter 0-day attacks Generate signatures for common IDS Install full-scale infrastructure across Europe Target audience: ISP's, NREN's, researchers

Goal: Generate signatures for common IDS Most IDS use network traffic based signatures We chose SNORT signatures because SNORT is Open source and well-known Implications: False positives are likely to be a problem No useful signatures for encrypted traffic 17

Attack Detection 18

NoAH Architecture: Attack Detection Overview Traffic to unused Internet addresses is redirected Low-interaction honeypots filter unwanted traffic High-interaction honeypots form the attack detectors (Argos) ASG is (partially) integrated with Argos

NoAH Architecture: Attack Detector Argos Detection technique (Argos): OS independent memory tainting (x86 emulator) Mark all data from the network interface as tainted Attack is reported if: - tainted memory regions are used as jump address - virtual CPU executes code from memory location that is tainted Detects code injection attacks with almost 100% accuracy by design > Scope of NoAH: Remote attacks that do not require a human in the loop 20

Attack Analysis 21

Hybrid Analysis Engine: Idea Identify memory content relevant for the attack Identify network traffic bytes involved Log all memory operations to keep track of the origin Only bytes relevant for the attack are used for SG Extract meta information: Protocol field(s) containing the relevant bytes - Make use of the NetBee Library (support for 64 protocols) [12] Communication/Protocol state history - Extensible tracker framework - Proof-of-concept implementation to track (IP,TCP/UDP,FTP) 22

Basic Architecture of the entire ASG System Honeypot Argos Control Socket Snitch Perl Script Argos.netlog Argos.csi.x Interface NetBee Library Application State Tracker TrackerOutput.dat TrackerDump.dat

Example: Information extracted by the Analysis Engine Tracker Information Protocol Connection State: TCP: Connection established FTP: Login, User identification Argos II Snitch perl script -Operating system: Win2000 -Attacked service / program: WAR-FTPD Packet Src Port IP Src Address Dest Address TCP FTP Dest Port Position in network packet Argos I Memory Dump 04 F2 A6 00 Tainted data which is about to be used in instruction execution Interface (NetBee) 04 F2 A6 00 Information Packet Field Decoding: FTP: bytes in USER field

Proof of Concept for Attacks on FTP Services Honeypot Argos Control Socket Snitch Perl Script Argos.netlog Argos.csi.x MySQL Database Interface Connection State Tracker TrackerOutput.dat TrackerDump.dat

Proof of Concept for Attacks on FTP Services Honeypot Argos Control Socket Snitch Perl Script Argos.netlog Argos.csi.x MySQL Database Interface Application State Tracker TrackerOutput.dat TrackerDump.dat

Proof of Concept for Attacks on FTP Services Honeypot Argos Control Socket Snitch Perl Script Argos.netlog Argos.csi.x MySQL Database Interface Application State Tracker TrackerOutput.dat TrackerDump.dat

Proof of Concept for Attacks on FTP Services Honeypot Argos Control Socket Snitch Perl Script Argos.netlog Argos.csi.x MySQL Database Interface Application State Tracker TrackerOutput.dat TrackerDump.dat

Signature Generation 29

Generated Signature (WAR-FTPD example): Tracker Argos Tracker alert tcp any any -> any 21 (msg: (NoAH) RET via FTP protocol, USER command in war-ftpd.exe (win2k) ; Tracker/Interface Snitch (Argos II) Tracker flow: established, from_client; content:"user"; content:!" 0D 0A "; offset: 5; depth: 465;) Tracker/Interface Interface (NetBee Library)

Results & Conclusion Our ASG system generated signatures that have zero false positives Signature describes the vulnerability of the application Signature can be used with SNORT, a well-known IDS Protect server applications from buffer overflows in arbitrary protocols and fields Generated signatures can compete with other approaches including manually created reference signatures (for attacks within the scope of NoAH)

Questions? 32

References [1] Lam, L. & Chiueh, T. Automatic Extraction of Accurate Application-Specific Sandboxing Policy Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004 [2] Yegneswaran, Vinod; Giffin, Jonathon T.; Paul Barford & Jha, Somesh An Architecture for Generating Semantic-Aware Signatures Proceedings of the 14th USENIX Security Symposium, 2005 [3] Wang, K. & Stolfo, S. Anomalous Payload-based Intrusion Detection 7th International Symposium on Recent Advances in Intrusion Detection, 2004 [4] Tang, Y. & Chen, S. Defending against internet worms: A signature-based approach Proceedings of IEEE INFOCOM, 2005 [5] Singh, S.; Estan, C.; Varghese, G. & Savage, S. Automated Worm Fingerprinting OSDI, 2004 [6] Liang, Z. & Sekar, R. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers 12th ACM Conference on Computer and Communications Security (CCS), 2005 [7] Costa, M.; Crowcroft, J.; Castro, M.; Rowstron, A.; Zhou, L.; Zhang, L. & Barham, P. Vigilante: end-to-end containment of internet worms Proceedings of the twentieth ACM symposium on Operating systems principles, 2005 [8] Kim, H. & Karp, B. Autograph: Toward Automated, Distributed Worm Signature Detection USENIX Security Symposium, 2004 [9] Anagnostakis, K. G.; Sidiroglou, S.; Akritidis, P.; Xinidis, K.; Markatos, E. & Keromytis, A. D. Detecting Targeted Attacks Using Shadow Honeypots Proceedings of the 14th USENIX Security Symposium, 2005 [10] Portokalidis, G.; Slowinska, A. & Bos, H. Argos: An Emulator for Fingerprinting Zero-Day Attacks Proc. ACM SIGOPS EUROSYS'2006, 2006 [11] Newsome, J. & Song, D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software Proceedings of the 12th Annual and Distributed System Security Symposium (NDSS), 2005 [12] http://www.nbee.org/ 33