a semantic framework for data analysis in networked
play

A Semantic Framework for Data Analysis in Networked Systems Arun - PowerPoint PPT Presentation

A Semantic Framework for Data Analysis in Networked Systems Arun Viswanathan , Alefiya Hussain, Jelena Mirkovic, Stephen Schwab, John Wroclawski USC/Information Sciences Institute 1 Data Analysis in Networked Systems Audit Logs Alerts Did


  1. A Semantic Framework for Data Analysis in Networked Systems Arun Viswanathan , Alefiya Hussain, Jelena Mirkovic, Stephen Schwab, John Wroclawski USC/Information Sciences Institute 1

  2. Data Analysis in Networked Systems Audit Logs Alerts Did my experiment Is my run as hypothesis validated? expected? Is there Why did any evidence failure X of a known happen? attack? Application Logs Packet Dumps 2

  3. Our Semantic Approach MODELS MODEL Packet Capture dumps high-level Captures user's Auth logs understanding high-level EXPERT Data collected of system understanding Webserver from an execution of system logs of a system expectations Semantic hypothesis? Pose met? Analysis Questions evidence Framework failure X of known ? why? attacks? Answers to Questions Models drive analysis over data! 3

  4. Approximate Lay of the Land High Patterns Queries Language- Ex. wireshark, based Ex. SQL, tcpdump, Ex. Bro, Splunk snort Logic-based SEC Ex. temporal-logic Performance specification for IDS, CTPL-logic Custom for malware Hackery Ex. scripts, tools Low Level of Analysis Abstraction Higher Low 4

  5. Approximate Lay of the Land Low-level data details (low expressiveness, high performance, low reusability) High Patterns Queries Language- Ex. wireshark, based Ex. SQL, tcpdump, Ex. Bro, Splunk snort Logic-based SEC Ex. temporal-logic Performance specification for IDS, CTPL-logic Trade performance Custom for malware Hackery for expressiveness Semantic Ex. scripts, Analysis tools Models Framework (high expressiveness, Low usable performance, reusable) Levels of Analysis Abstractions Higher Low Key differences with other logic-based approaches ● Composable abstractions to capture semantics 5 ● Expressive relationships for networked systems

  6. Basics of our Modeling Approach DATA Multitype, multi- FACTS ...... variate, timestamped (ex: FILE_OPEN, FILE_CLOSE, TCP_PACKET, .... Behavior (fundamental abstraction) Sequence or group of one or more related facts Complex Behaviors Related behaviors Relationships are key Model Top-level behavior Models encode higher-level system semantics! 6

  7. Relationships in the Modeling Language Temporal Relationships Temporal Operators Causality/Ordering A file open eventually Eventuality FILE_OPEN ~> FILE_CLOSE leads to a file close Invariance Synchrony/Timing Interval Temporal Operators Concurrent Relationships Parallelism HTTP_FLOW olap FTP_FLOW HTTP and FTP flows are Overlaps concurrent . Logical Operators Logical Relationships Experiment either succeeds EXPT_SUCCESS xor Combinations or fails EXPT_FAIL Exclusions Dependency File open and file close are FILE_CLOSE.name = behaviors related by their relationships b/w data FILE_OPEN.name filename . attributes 7

  8. Cache Poisoning Behavior Cache Poisioning Behavior Objective: Attacker poisons the victim's (DNS Kaminsky) DNS cache. Real Nameserver Steps 1-4 keep running in a loop. (R) 2. Forward 4. Correct KEY ISSUES Query response Attacker fails to poison cache due to Victim (1) Race conditions with real nameserver. Nameserver (V) (2) Incorrectly GUESSED responses. 1. Send 3. Flood of Query GUESSED responses Attacker (A) 8

  9. Analysis using typical approach Tricky to analyze ● Requires Expertise. ● Too many random values in the data to extract using simple patterns. ● Race conditions (timing issues) are hard to debug over 10's of thousands of packets. ● Many ways to fail. 9

  10. Model of Behavior Nodes: Simple behavior EXPERT Arrows : Causal relationships Path (from root to leaf) : Complex Behaviors SUCCESS = A guesses right and 10 wins race with R

  11. Model of Behavior Nodes: Simple behavior EXPERT Arrows : Causal relationships Path (from root to leaf) : Complex Behaviors TIMING_FAIL = SUCCESS = A guesses right but A guesses right and 11 loses race to R. wins race with R

  12. Model of Behavior EXPERT Node: Simple behavior Arrows : Causal relationships Behavior Model = 1 SUCCESS + Path (from root to leaf) : Complex Behaviors 3 FAILURES TIMING_FAIL = SUCCESS = BADGUESS_1 = A guesses right but A guesses right and A guesses wrong 12 loses race to R. wins race with R response

  13. Encoding the Model #1. Capture simple behaviors (to capture facts for each distinct attack step ) VtoR_query = DNSREQRES.dns_req(sip=$AtoV_query.dip, dnsquesname=$AtoV_query.dnsquesname) #2. Relate simple behaviors to form complex behaviors (to capture the causal relationships between steps) 4 behaviors = 1 SUCCESS + 3 FAILURES TIMING_FAIL = (AtoV_query ~> VtoR_query ~> RtoV_resp ~>AtoV_resp) #3. Define Behavior Model (assertion to capture users understanding of system operation) DNSKAMINSKY = SUCCESS xor TIMING_FAIL xor BADGUESS_1 xor BADGUESS_2 13

  14. Analysis Using the Model Behavior captured in 20 lines of model DNS Data [states] [states] EXPERT sB = {sip=$sA.dip,dip=$sA.sip} sB = {sip=$sA.dip,dip=$sA.sip} DNS Kaminsky [behavior] [behavior] Behavior model b = sA ~> sB b = sA ~> sB [model] [model] SUCCESS = b_1 SUCCESS = b_1 Semantic Analysis Semantic Analysis Did the poisoning Framework Framework succed or fail? Answers in the form of facts Summary : DNSCACHEPOISON_TIMING_FAIL satisfying the model. ======================== Total Matching Instances: 622 etype | timestamp | sip | dip | sport | dport | dnsid | dnsauth ----------------------------------------------------------------------------------------- TIMING_FAIL PKT_DNS | 1275515486 | 10.1.11.2 | 10.1.4.2 | 6916 | 53 | 47217 | PKT_DNS | 1275515486 | 10.1.4.2 | 10.1.6.3 | 32778 | 53 | 15578 | (A loses the race PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 15578 |realns.eby.com PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com against R) PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com 14 PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com PKT_DNS | 1275515486 | 10.1.6.3 | 10.1.4.2 | 53 | 32778 | 47217 |fakens.fakeeby.com

  15. Current Implementation and Performance ● Prototype algorithm for applying models over data. ● Algorithm performance ● O(N 2 ) worst-case performance ● Straight-forward ● Analysis Framework ● Written in Python ● SQLite-based storage backend ● Scalability and performance issues are under active investigation. 15

  16. Applicability ● Broad range of event-based modeling in networked systems ● More examples in paper ● Modeling hypotheses – Ex. Validating DoS detection heuristics over traces ● Modeling a security threat – Ex. Model of a simple worm spread over IDS logs ● Modeling dynamic change – Ex. Model of changes in traffic rate due to attack. 16

  17. Future Work ● Extend Modeling Capabities ● Modeling probabilistic behavior ● Modeling packet distributions ● Analysis Framework ● Scalability and performance ● Reducing the computational complexity of correlations using dependent attributes. 17

  18. Composing, Sharing and Reusing Semantic Analysis Framework enables data analysis at higher-levels of abstraction. Composing models to create higher-level meaning IP TCP PORTSCAN DNSWORM DNSKAMINSKY DNS Sharing and reusing expertise REUSE Exploratory data Public [states] [states] analysis sA = {sip=$1, dip=$2} sA = {sip=$1, dip=$2} Abstract sB = {sip=$sA.dip,dip=$sA.sip} sB = {sip=$sA.dip,dip=$sA.sip} SHARE Knowledge Behavior Models [behavior] [behavior] Enable sharing b = sA ~> sB Base of b = sA ~> sB and reuse of Models [model] [model] experiments SUCCESS = b_1 SUCCESS = b_1 Repository of 18 expertise

  19. Thank You! Our framework will soon be publicly available at http://thirdeye.isi.deterlab.net Please register on our mailing-list to stay in tune with release and updates 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend