1
Generating Snort Signatures based on Honeypots for Industrial Control Systems Abstract—In this research, we propose a method to automatically generate alert signatures based on honeypots deployed in ICS network. ICS protocols based on TCP such as Modbus are supported in this method and the output of the system would be the signatures in Snort rule format. Keywords—Automatic Signature Generation, Snort Rule, Modbus, Industrial Control System, Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao Department of Computer Science and Engineering, Taiwan Informaon Security Center at NCHU, Naonal Chung Hsing University, Taichung, Taiwan Figure 1. Applicaon Scenario Introducon Stuxnet, a famous worm targeng ICS that is originally used to stop Iran from developing nuclear weapon, is typically introduced to the target network via USB infecon. Thus, even there are firewalls deployed to thwart unauthorized access from remote, an aack iniated from internal device would be difficult to prevent. Honeypots are systems applied to lure aacks and reduce aack surface in the end. In our applicaon scenario as shown in Figure 1, honeypots are deployed to mimic real devices in control system network. If any malicious packet is received by one of the honeypots, this honeypot (or traffic monitoring system) would generate corresponding signature for that packet. Methodology The proposed system architecture consists of a three-stage procedure as shown in Figure 2. The control (system) network may consist of several controllers e.g. programmable logic controller (PLC) and workstaons. We define target as a device to be protected. There would be at least one peer-honeypot used to mimic the target. Under this deployment, any aack found by peer-honeypot is regarded an aack to the target. Figure 2. System Architecture This system collects flows to target and flows to peer-honeypot separately for the first two stages. Flows coming in target are normal traffic, and flows going to peer- honeypot would be suspicious traffic. Protocol-Port Grouper is a module that helps divide normal traffic into packet clusters according to desnaon protocol-port combinaon. Our analysis focuses on the payloads of these collected packets. Normal Model Creaon A normal model represents normal behaviors of a flow coming in target. Frequent Paern Extracon We feed a certain duraon of normal traffic under stable ICS configuraon to an automac applicaon signature generaon method called SigBox, which is proposed by Shim et al. to extract fine-grained traffic idenficaon of network service. We take the output Snort rules as the frequent paerns of normal behaviors. SigBox is a modified frequent paern mining algorithm based on Apriori. Its outputs are Snort rules which represent signatures of a specific internet service. The rule would be a form like this: <acon> <protocol> <ip> <port> -> <ip> <port> (sid: 1000000; content:"|00 00 00|"; offset:0; depth:3; ) Content specifies the frequent paern of byte sequence in payload, offset indicates the locaon where content should be. And depth tells the range of locaon content would fit in. * Since our frequent paerns are recorded in Snort rule form, these paerns will be designated specific locaon in payload. Non-Frequent Paern Clustering We chop off the frequent paern from original payload to get the non-frequent paern. For example, a payload 0x000000010203 and a frequent paern as (1) are given, the non-frequent paern would be 0x010203. The more normal traffic we collect, the more non-frequent paerns we will get. We apply hierarchical clustering algorithm to those paerns having the same length. If there are N different lengths of paerns, there would be N different clustering results. Anomaly Detecon and Signature Generaon While honeypot receives a packet, it is assumed to be suspicious. Checks are required to clarify whether a packet contains malicious payload. From the previous two modules we gets a set of frequent paerns and many sets of paern clusters, they are used to do anomaly detecon and signature generaon as shown in Figure 3. (1) Suspicious Packet Malicious Suspicious FP check Fail Pass Non-FP check Malicious Normal Pass Fail Figure 3. Decision Tree for Anomaly Detecon and Signature Generaon (0x) 5678CDCD1234CDCD Full-Content Signature Sliced-Content Signature (0x) 5678CDCD1234CDCD

Generating Snort Signatures based on Honeypots for ... · Generating Snort Signatures based on Honeypots for Industrial Control Systems Abstract—In this research, we propose a method

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Generating Snort Signatures based on Honeypots for Industrial Control Systems

Abstract—In this research, we propose a method to automatically generate alert signatures based on honeypots deployed in ICS network. ICS protocols based on TCP such as Modbus are supported in this method and the output of the system would be the signatures in Snort rule format.

Keywords—Automatic Signature Generation, Snort Rule, Modbus, Industrial Control System,

Tsung-Chiao Yu, Jyun-Yao Huang, I-En Liao

Department of Computer Science and Engineering, Taiwan Information Security Center at NCHU, National Chung Hsing University, Taichung, Taiwan

Figure 1. Application Scenario

Introduction Stuxnet, a famous worm targeting ICS that is originally used to stop Iran from

developing nuclear weapon, is typically introduced to the target network via USB

infection. Thus, even there are firewalls deployed to thwart unauthorized access

from remote, an attack initiated from internal device would be difficult to prevent.

Honeypots are systems applied to lure attacks and reduce attack surface in the end.

In our application scenario as shown in Figure 1, honeypots are deployed to mimic

real devices in control system network. If any malicious packet is received by one of

the honeypots, this honeypot (or traffic monitoring system) would generate

corresponding signature for that packet.

Methodology The proposed system architecture consists of a three-stage procedure as shown in

Figure 2. The control (system) network may consist of several controllers e.g.

programmable logic controller (PLC) and workstations. We define target as a device to

be protected. There would be at least one peer-honeypot used to mimic the target.

Under this deployment, any attack found by peer-honeypot is regarded an attack to the

target.

Figure 2. System Architecture

This system collects flows to target and flows to peer-honeypot separately for the

first two stages. Flows coming in target are normal traffic, and flows going to peer-

honeypot would be suspicious traffic. Protocol-Port Grouper is a module that helps

divide normal traffic into packet clusters according to destination protocol-port

combination. Our analysis focuses on the payloads of these collected packets.

Normal Model Creation

A normal model represents normal behaviors of a flow coming in target.

● Frequent Pattern Extraction

We feed a certain duration of normal traffic under stable ICS configuration to an

automatic application signature generation method called SigBox, which is proposed

by Shim et al. to extract fine-grained traffic identification of network service. We

take the output Snort rules as the frequent patterns of normal behaviors.

SigBox is a modified frequent pattern mining algorithm based on Apriori. Its

outputs are Snort rules which represent signatures of a specific internet service.

The rule would be a form like this:

<action> <protocol> <ip> <port> -> <ip> <port> (sid: 1000000;

content:"|00 00 00|"; offset:0; depth:3; )

Content specifies the frequent pattern of byte sequence in payload, offset

indicates the location where content should be. And depth tells the range of

location content would fit in.

* Since our frequent patterns are recorded in Snort rule form, these patterns

will be designated specific location in payload.

● Non-Frequent Pattern Clustering

We chop off the frequent pattern from original payload to get the non-frequent

pattern. For example, a payload 0x000000010203 and a frequent pattern as (1)

are given, the non-frequent pattern would be 0x010203. The more normal traffic

we collect, the more non-frequent patterns we will get. We apply hierarchical

clustering algorithm to those patterns having the same length. If there are N

different lengths of patterns, there would be N different clustering results.

Anomaly Detection and Signature Generation

While honeypot receives a packet, it is assumed to be suspicious. Checks are

required to clarify whether a packet contains malicious payload. From the

previous two modules we gets a set of frequent patterns and many sets of

pattern clusters, they are used to do anomaly detection and signature generation

as shown in Figure 3.

(1)

Suspicious

Packet

Malicious

Suspicious

FP

check

Fail

Pass

Non-FP

check

Malicious

Normal Pass

Fail

Figure 3. Decision Tree for Anomaly Detection and Signature Generation

(0x) 5678CDCD1234CDCD

Full-Content

Signature Sliced-Content

Signature

(0x) 5678CDCD1234CDCD