Jaal: Towards Network Intrusion Detection at ISP Scale

Similar documents
IoT - Next Wave of DDoS? IoT Sourced DDoS Attacks A Focus on Mirai Botnet and Best Practices in DDoS Defense

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Check Point DDoS Protector Introduction

Check Point DDoS Protector Simple and Easy Mitigation

SENSS Against Volumetric DDoS Attacks

DDoS Protector. Simon Yu Senior Security Consultant. Block Denial of Service attacks within seconds CISSP-ISSAP, MBCS, CEH

IDS: Signature Detection

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Analyzing Flow-based Anomaly Intrusion Detection using Replicator Neural Networks. Carlos García Cordero Sascha Hauke Max Mühlhäuser Mathias Fischer

Basic Concepts in Intrusion Detection

Developing the Sensor Capability in Cyber Security

Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. ECE Department and CyLab, Carnegie Mellon University

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Network Wide Policy Enforcement. Michael K. Reiter (joint work with V. Sekar, R. Krishnaswamy, A. Gupta)

It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security

Distributed Denial of Service

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

haltdos - Web Application Firewall

Network Security. Chapter 0. Attacks and Attack Detection

( ) 2016 NSFOCUS

AKAMAI THREAT ADVISORY. Satori Mirai Variant Alert

Data Sheet. DPtech Anti-DDoS Series. Overview. Series

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

Intrusion Detection by Combining and Clustering Diverse Monitor Data

Chapter 10: Denial-of-Services

Lecture 12. Application Layer. Application Layer 1

Cisco Firepower with Radware DDoS Mitigation

Cyber Attacks: Evolving Network Architectures to Meet the Challenge

Chapter 7. Denial of Service Attacks

CSE 565 Computer Security Fall 2018

Network Intrusion Analysis (Hands on)

Herding Cats. Carl Brothers, F5 Field Systems Engineer

Dynamic Datacenter Security Solidex, November 2009

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

On the Difficulty of Scalably Detecting Network Attacks

Incorporating Network Flows in Intrusion Incident Handling and Analysis

Denial of Service. Denial of Service. A metaphor: Denial-of-Dinner Attack. DDoS over the years. Ozalp Babaoglu

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection - Snort. Network Security Workshop April 2017 Bali Indonesia

Outline. Motivation. Our System. Conclusion

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

A proactive and collaborative DDoS mitigation strategy for the Dutch critical infrastructure

Intelligent and Secure Network

ADVANCED, UNKNOWN MALWARE IN THE HEART OF EUROPE

Interdomain Routing Design for MobilityFirst

Securing Your Microsoft Azure Virtual Networks

Detecting Malicious Hosts Using Traffic Flows

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Computer Network Vulnerabilities

Intrusion Detection System (IDS) IT443 Network Security Administration Slides courtesy of Bo Sheng

Securing Your Amazon Web Services Virtual Networks

Figure 1: Attempts for /ws/v1/cluster/apps/new-application

The Evolving Threat of Internet Worms

Introduction to Security. Computer Networks Term A15

Network Anomaly Detection Using Autonomous System Flow Aggregates

Allot IoT Defense Solutions for Enterprises to Ensure IoT Service Continuity. Solution Brief

DDoS and Traceback 1

Mitigating Outgoing Spam, DoS/DDoS Attacks and Other Security Threats

Automating Security Response based on Internet Reputation

Denial of Service (DoS)

The Bro Network Intrusion Detection System

IJSER. Virtualization Intrusion Detection System in Cloud Environment Ku.Rupali D. Wankhade. Department of Computer Science and Technology

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

LEoNIDS: a Low-latency and Energyefficient Intrusion Detection System

Network Intrusion Goals and Methods

소프트웨어기반고성능침입탐지시스템설계및구현

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

The UCSD Network Telescope

Arbor Solution Brief Arbor Cloud for Enterprises

Different attack manifestations Network packets OS calls Audit records Application logs Different types of intrusion detection Host vs network IT

Monitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks

Advanced Network Troubleshooting Using Wireshark (Hands-on)

IQ for DNA. Interactive Query for Dynamic Network Analytics. Haoyu Song. HUAWEI TECHNOLOGIES Co., Ltd.

Secure your Web Applications with AWS WAF & AWS Shield. James Chiang ( 蔣宗恩 ) AWS Solution Architect

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Corrigendum 3. Tender Number: 10/ dated

Distributed Denial of Service (DDoS)

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

UTM 5000 WannaCry Technote

Impact of Sampling on Anomaly Detection

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Cisco Security Monitoring, Analysis and Response System 4.2

Spring 2010 CS419. Computer Security. Vinod Ganapathy Lecture 14. Chapters 6 and 9 Intrusion Detection and Prevention

The Protocols that run the Internet

Chapter 9. Firewalls

MAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation. Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

Huawei NIP2000/5000 Intrusion Prevention System

What is Distributed Denial of Service (DDoS)?

COSC 301 Network Management

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Denial of Service, Traceback and Anonymity

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

CS419 Spring Computer Security. Vinod Ganapathy Lecture 13. Chapter 6: Intrusion Detection

Enterprise D/DoS Mitigation Solution offering

Random Neural Networks for the Adaptive Control of Packet Networks

Computer Security: Principles and Practice

Authors: Mark Handley, Vern Paxson, Christian Kreibich

Transcription:

Jaal: Towards Network Intrusion Detection at ISP Scale A. Aqil, K. Khalil, A. Atya, E. Paplexakis, S. Krishnamurthy, KK. Ramakrishnan University of California Riverside T. Jaeger Penn State University P. Yu, A. Swami US Army Research Lab 1

Is IDS Needed at ISP Scale? Increasing number of network attacks Distributed, span entire WANs Unnoticed until too late Mirai botnet Mirai exploits vulnerable devices spread across the internet to launch DDoS Sep 2016: Krebs on Security (620 Gbit/s), OVH (1Tbit/s) Oct 2016: multiple attacks on Dyn, affected Twitter, Github, Airbnb, Netflix, others Nov 2016: Liberia s internet infrastructure 2

Is IDS Needed at ISP Scale? Simple two step attack: scan then flood Hardcoded default passwords control vulnerable devices (scanning a large set of IP addresses) Compromised devices also repeat the scan Launch coordinated attack on targets at the bot master signal Inherently difficult to detect Scanning activity observable only at ISP level DDoS prevention works best deep in the network, where the pipes are the largest and the capability to identify and block the attacks is the most evident Bruce Schneier, security expert 3

ISP Scale IDS is Challenging State of the art NIDS (e.g., Snort, Bro) are effective But expect to inspect all packets Works only at enterprise scale Problematic at ISP scale: Multiple ingress/egress points To create global view required for analysis, information collected from multiple vantage points needs to be aggregated Challenge: how to aggregate? 4

Aggregation Approach I Copy and forward to central engine Simple, but lead to performance degradation Percentage decrease 100 50 Performance degradation as traffic replication increases Avg decrease in throughput Worst decrease in throughput Drop in accuracy 70% Tput loss 0 0 10 20 30 40 50 60 70 80 90 100 Percentage of traffic replicated 5

Aggregation Approach II Sample and forward to central engine Already used by ISPs for heavy-hitter detection Efficient but achieves poor detection accuracy for general attacks Attack Reservoir Sampling Distributed SYN Flood 54% Sock Stress 60% SSH Brute Force 42% 6

Aggregation Approach III Create sketches and forward to central engine Targeted measurement approach Strong resource/accuracy guarantees Lacks generality: need one sketch for every measurement task For TCP/IP header, need 2 18 different sketches to capture all possible measurements 7

Jaal Design Goals Design an ISP-scale NIDS that: Can detect wide array of attacks requiring global view, using signatures similar to Snort s Focus on TCP/IP header-based attacks Does not require copying and forwarding raw packets (minimizes bandwidth overhead) 8

Jaal Overview III- Flow assignment: Assigns flows to monitors Load balancing I- Monitors: Filter target flows Process packet batches, create summaries Packet Filtering Summatization Monitor Load Info. Summaries Assignments Flow Assign. Inference Assignments Load Info. Summaries Packet Filtering Summatization Monitor II- Inference engine: Collects summaries Performs pattern matching NIDS Rules Decision 9

Summarization Goal: produce a representative summary of packets Enables high accuracy detection of attacks using general signature Light weight, low BW overhead all flows all flows assigned flows packets batch batch summary packets mode fields mode 10

Summarization (cont.) Two step summarization SVD to reduce fields mode Clustering to reduce packets are mode the left sin batch X = U V T eliminate small singular values packets mode n SVD k-means summary k centroids counts fields mode p r 11

Inference Summary Individual S m 1 or Sm 2 Aggregator S a Config. summaries d, c question vectors NIDS q Translator Similarity Rules Estimator Q Config. h, v Postprocessor Inference Engine Alert, Q Feedback Alert Collect individual summaries (push or pull) Transform NIDS rules (normalization, marking irrelevant fields) Estimate similarity Feedback: request finer grained summary to improve performance Estimate variance (e.g. port scans, DDoS) 12

Flow Assignment Requirements: Cover all flows Each flow is processed by exactly one monitor (for correct operation) Balance load to the extent possible Simple/Fast algorithm Challenge: Flows can start/terminate at any time, vary in packet rate Packet rates unknown a priori Solution: Model as constrained online load balancing problem Simple greedy algorithm, (empirically) close to optimal 13

Evaluation Implemented on in-house high performance SDN-testbed Two Realistic RocketFuel topologies (~350 routers) Complex topologies created by instantiating Open vswitches instances connected via virtual links Two ISP backbone traces from MAWI group as background traffic + inject malicious traffic Five different attacks: DoS: SYN flood DDoS: distributed SYN flood Port scans: distributed port scans Brute forcing: distributed SSH brute forcing Sockstress most common attack classes 14

Evaluation (cont.) 98% average TPR @ 9% FPR and only 35% BW overhead (with feedback) Summarization parameters n, k, r set by studying ROC curves Each point has a different n: batch size, r: rank, k: centroids r = 14 retains most information in fields mode n 600, k 0.2n, r 12 enables high detection accuracy 15

Evaluation (cont.) Simulating Mirai progression Scanning on ports 23, 2323 Randomly select a source node + 150 vulnerable nodes Jaal detects the scan with 95% accuracy Number of Infected devices vs time Number of infected devices 150 100 50 Unchecked infections Remaining infected devices after Jaal 0 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 Time (s) 16

Conclusion ISP scale NIDS is needed in the face of large scale attacks State of the art NIDS inadequate at ISP scale Jaal presents a major step forward in developing ISP scale NIDS Uses dimensionality reduction and clustering Centralized pattern matching on packet summaries Achieves high detection accuracy at low bandwidth overhead 17

Thanks! 18