66
Magnus Almgren Göteborg, 2010-11-17 Mitigating Cyber Attacks Postdoc, finansierad av MSB

Mitigating Cyber Attacks

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Mitigating Cyber Attacks

Magnus Almgren

Göteborg, 2010-11-17

Mitigating Cyber Attacks

Postdoc, finansierad av MSB

Page 2: Mitigating Cyber Attacks

15—20 years ago …

• Internet starting to reach a wider audience

– most people did not have emails

– computer security – an afterthought

• The typical hacker, often portrayed as

– teenager,

– attack a ”chess game”

– goal: some esoteric fame …

• And today ?

SVT Documentary oct-10, 2010: Att hacka en stormakt (http://goo.gl/1Zrd)

Page 3: Mitigating Cyber Attacks

Outline

• Status today

– News clips (if you do not believe in me …)

• Monitoring traffic

– Intrusion Detection Systems

• Research Activities

– Reasoning with alerts from several sensors

– Monitoring backbone traffic

• European network: SysSec

Page 4: Mitigating Cyber Attacks
Page 5: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 6: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 7: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 8: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 9: Mitigating Cyber Attacks

Malicious Code

• Many users say: I would never download unsecure content!

• But what type of content is safe?

Page 10: Mitigating Cyber Attacks

Targeted attacks•••

Targeted attacks• 48% of exploits target Adobe Acrobat / Adobe Reader• Adobe begins a quarterly patch cycle• Health Check statistics show that Adobe Reader is among

the top unsecured applications

Page 11: Mitigating Cyber Attacks

http://home.mcafee.com/AdviceCenter/most-dangerous-celebrities

Cameron Diaz Searches Yield Ten Percent Chance of Landing on a Malicious SiteCameron Diaz Searches Yield Ten Percent Chance of Landing on a Malicious Site

Dangerous People (!!!)

Page 12: Mitigating Cyber Attacks
Page 13: Mitigating Cyber Attacks

http://doi.ieeecomputersociety.org/10.1109/MC.2010.237

Page 15: Mitigating Cyber Attacks
Page 16: Mitigating Cyber Attacks
Page 17: Mitigating Cyber Attacks
Page 18: Mitigating Cyber Attacks

New Era 2010: Stuxnet

• Advanced Malware

– target specifically Programmable Logic Controllers: Siemens SIMATIC Step 7 software

– Lots of rumors of goal and who creators

• designed and released by a government– the U.S. or Israel ???

• Target: Bushehr nuclear power plant in Iran(60% of infected hosts in Iran)

Symantec oct-2010: W32.Stuxnet Dossier (http://goo.gl/pP7S)

Page 19: Mitigating Cyber Attacks

Stuxnet: Pandora’s box ?

– Stuxnet is advanced and one of the first wild malware’s targeting PLCs.

• 6—8 people about 6 months to create.

– PLCs exists in many industries

• factory assembly lines, amusement rides, or lighting fixtures.

• Compare this with the Loveletter virus (2000)

– 2003/11 there existed 82 different variants of Loveletter.

– It is claimed that more than 5,000 attacks are carried out every day.

now blueprint to create malware targeting PLCsnow blueprint to create malware targeting PLCs

Page 20: Mitigating Cyber Attacks

Financial

Health care

Transportation

Status todayMonitoring traffic: Intrusion Detection SystemsResearch Activities

Status todayMonitoring traffic: Intrusion Detection SystemsResearch Activities

Page 21: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 22: Mitigating Cyber Attacks

Financial

Health care

Transportation

Page 23: Mitigating Cyber Attacks

Financial

Health care

TransportationNormal behavior

Num

ber

Page 24: Mitigating Cyber Attacks

Financial

Health care

TransportationNormal behavior

Num

ber

Page 25: Mitigating Cyber Attacks

Financial

Health care

TransportationNormal behavior

Num

ber

Page 26: Mitigating Cyber Attacks

AAAѦ

fl

“A”

BBBℬβʙ

“B”

This is an ”Attack.”????????

Financial

Health care

Transportation

Page 27: Mitigating Cyber Attacks
Page 28: Mitigating Cyber Attacks
Page 29: Mitigating Cyber Attacks

Financial

Health care

TransportationNormal behavior

Num

ber

Status todayMonitoring trafficResearch Activities:

Status todayMonitoring trafficResearch Activities:

1. Reasoning with alerts from several sensors2. Monitoring backbone traffic

Page 30: Mitigating Cyber Attacks

Financial

Health care

TransportationNormal behavior

Num

ber

Attack AttackNo Attack

?

Page 31: Mitigating Cyber Attacks

Scenario multiple sensors (1)

• Normal phf access (no attack)

– P(inv-A | …) = 0.20 = don’t investigate

Snort

webIDS

A2

A1

r01

webIDS

inv-Aw1

a11

Snort

w2

a21

Page 32: Mitigating Cyber Attacks

Scenario multiple sensors (2)

• Normal phf access (no attack)

– P(inv-A | …) = 0.20 = don’t investigate

Snort

webIDS

A2

A1

encrypted request

valid?

Page 33: Mitigating Cyber Attacks

Scenario multiple sensors (3)

• Normal phf access (no attack)– P(inv-A | …) = 0.20 = don’t investigate

• Snort sensor defunct, this may be an attack!– P(inv-A | …) = 0.54 = investigate

– P(w1 | …) = 0.01 = sensor broken

Snort

webIDS

A2

A1

r01

webIDS

inv-Aw1

a11

Snort

w2

a21

encrypted

Page 34: Mitigating Cyber Attacks

Analysis of malicious backbone traffic

• Looking for attacks ona backbone network

– 10 Gbps (=fast!)

– Problems:

• speed of network link

• amount of data

• routing

• user privacy – anonymize data(!)

Page 35: Mitigating Cyber Attacks

Measurement Setup (simplified)

SUNET

Nordunetand the rest of the world

RouterMeasure

Page 36: Mitigating Cyber Attacks

Measurement Setup (simplified)

SUNET

Nordunetand the rest of the world

Router RouterMeasure

Page 37: Mitigating Cyber Attacks

Measurement Setup (simplified)

SUNET

Nordunetand the rest of the world

Router RouterMeasure

Page 38: Mitigating Cyber Attacks

Measurement Setup (simplified)

SUNET

Nordunetand the rest of the world

Router RouterMeasure

Page 39: Mitigating Cyber Attacks

Measurement Setup (simplified)

SUNET

Nordunetand the rest of the world

Router RouterMeasure

Page 40: Mitigating Cyber Attacks

Statistics

• 23,600 inside hosts initiatingcommunication with 18,780,894 on the outside.

• 24,587,096 outside hosts tryingto reach (scan) 970,149 inside hosts.

Page 41: Mitigating Cyber Attacks

Flow Output from CoralReef• Unidirectional flows: 5-tuple

• Data collected over a 6-week period (spring)

• IP addresses anonymized

srcIP destIP proto ok sport dport pkts bytes flows firstTS lastTS

src1 dst1 6 1 445 3995 3 120 1 t01 tn

1

src2 dst2 1 1 3 1 1 56 1 t02 tn

2

Page 42: Mitigating Cyber Attacks

Analysis of backbone data

Page 43: Mitigating Cyber Attacks

Analysis of backbone data

Page 44: Mitigating Cyber Attacks

Analysis of backbone data

Page 45: Mitigating Cyber Attacks

Analysis of backbone data

Page 46: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 1: 2967 probed

Page 47: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 1: 2967 probed

April 8: 2967 probed

Page 48: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

Page 49: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

April 22: 2967 (21%), 135 (79%)

Page 50: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

April 29: 2967 (single conn.)

April 22: 2967 (21%), 135 (79%)

Page 51: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

April 29: 2967 (single conn.)

April 22: 2967 (21%), 135 (79%)

May 5: 2967 (single), 135 (99%)

Page 52: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

April 29: 2967 (single conn.)

April 22: 2967 (21%), 135 (79%)

May 5: 2967 (single), 135 (99%)

Page 53: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 3230

port 2967

port 1617

port 135

April 1: 2967 probed

April 15: 2967 (51%), 135 (39%), 1617, 3230

April 8: 2967 probed

April 29: 2967 (single conn.)

April 22: 2967 (21%), 135 (79%)

May 5: 2967 (single), 135 (99%)

Page 54: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 22:

Page 55: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 22:

host-A:6000 victim: 2967 host-A:6000 victim: 2967 (1pkt, 60 bytes)

Page 56: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 22:

host-A:6000 victim: 2967 host-A:6000 victim: 2967 (1pkt, 60 bytes)

Page 57: Mitigating Cyber Attacks

Host-A: The Scanner

host-A:6000 victim:2967 (1 pkt, 40 bytes)

host-A

RST pkt

port 2967

April 22:

host-A:6000 victim: 2967 host-A:6000 victim: 2967 (1pkt, 60 bytes)

host- 1143 victim: 2967 host-A:1143 victim: 2967 (927pkts, 48,212 bytes)

Page 58: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

host-B

Page 59: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

t0 t1 t2 t3 t4

Page 60: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

t0 t1 t2 t3 t4

x0 = t1 - t0x1 = t2 – t1x2 = t3 – t2x3 = t4 – t3

x0 x1 x2 x3

Page 61: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

t0 t1 t2 t3 t4

x0 = t1 - t0x1 = t2 – t1x2 = t3 – t2x3 = t4 – t3

time difference between two consequtive flows

ind

ex

x0 x1 x2 x3

Page 62: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

Simple refresh: once every 43min (once every 30 min)

Page 63: Mitigating Cyber Attacks

Timing Behavior of Malicious Hosts

Exponential backoff: 111s, 222s, 333s, 666s, 1332s, 2664s

Page 64: Mitigating Cyber Attacks

Identifying SPAM from data traffic

100

101

102

103

104

105

10-6

10-5

10-4

10-3

10-2

10-1

100

Degree

Fre

quency

Node in- and out-degree distribution

In-degree

Out-degree

100

101

102

103

104

105

10-6

10-5

10-4

10-3

10-2

10-1

100

Degree

Fre

quency

Node in- and out-degree distribution

In-degree

Out-degree

100

101

102

103

104

10-7

10-6

10-5

10-4

10-3

10-2

10-1

100

Degree

Fre

quency

Node in- and out-degree distribution

In-degree

Out-degree

100

101

102

103

104

10-7

10-6

10-5

10-4

10-3

10-2

10-1

100

Degree

Fre

quency

Node in- and out-degree distribution

In-degree

Out-degree

Legitimate email (Ham) Unsolicited email (Spam)

Page 65: Mitigating Cyber Attacks

• a Network of Excellence (2010-2014)

• To work towards solutions and collaborate– At a European level

– and with international colleagues around the world

Poli. di Milano (IT)

Vrije Uniivesriteit (NL)

Institute Eurecom (FR)

IPP (Bulgaria)

TU Vienna (Austria)

Chalmers U (Sweden)

UEKAE (Turkey)

FORTH – ICS (Greece)

A European Network of Excellence inManaging Threats and Vulnerabilities in the Future Internet

http://www.syssec-project.eu/

Page 66: Mitigating Cyber Attacks

Links

• SVT Documentary oct-2010:

– Att hacka en stormakt (http://goo.gl/1Zrd)

• Symantec oct-2010:

– W32.Stuxnet Dossier (http://goo.gl/pP7S)

• Uppdrag granskning oct-2010:

– Kapade nätverk (http://svt.se/granskning)

– SysSec: http://www.syssec-project.eu/