A visual analytic approach for analyzing SSH honeypots Jop van der - - PowerPoint PPT Presentation

a visual analytic approach for analyzing ssh honeypots
SMART_READER_LITE
LIVE PREVIEW

A visual analytic approach for analyzing SSH honeypots Jop van der - - PowerPoint PPT Presentation

A visual analytic approach for analyzing SSH honeypots Jop van der Lelie Rory Breuk National Cyber Security Centre (NCSC-NL) Center for expertise on cyber security and incident response of the Dutch government Preventing ICT and


slide-1
SLIDE 1

A visual analytic approach for analyzing SSH honeypots

Jop van der Lelie Rory Breuk

slide-2
SLIDE 2

National Cyber Security Centre (NCSC-NL)

  • Center for expertise on cyber security and incident

response of the Dutch government

  • Preventing ICT and internet related incidents and

coordinates response of these incidents

slide-3
SLIDE 3

Introduction

  • Network monitoring
  • Intrusion Detection System (IDS)
  • NetFlow
  • Honeypot
slide-4
SLIDE 4

Honeypot

A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource

Spitzner 2003

slide-5
SLIDE 5

Honeypot

  • Low-interaction

○ Dionaea ○ Amun

  • High-interaction

○ (virtual) server with sebek

slide-6
SLIDE 6

Honeypot

  • Gather malware
  • Study worm activity
  • Study attacks/attackers
slide-7
SLIDE 7

In practice

Both SURFnet and the Dutch NCSC use honeypots to monitor their networks but... What can we do with it?!

slide-8
SLIDE 8

Research question

Which visualizations can be used to give more insight into attacks performed on SSH honeypots?

slide-9
SLIDE 9

Kippo: A SSH honeypot

  • Emulates an OpenSSH server
  • Written in Python
  • Possible to implement new commands
  • Full interaction with virtual filesystem

○ Medium-interaction honeypot

slide-10
SLIDE 10

Related research

  • Tools to visualize attacks on your network

○ (but most often IDS logs and NetFlow data)

slide-11
SLIDE 11

Related research

  • NFlowVis

Fischer et al., 2008

slide-12
SLIDE 12

Related research

  • Malware collected with Nepenthes

Blasco et al., 2005

slide-13
SLIDE 13

Related research

  • IDS logs with NetFlow
  • No SSH visualizations
  • No in-depth analysis of attacks
  • No relations between attacks
slide-14
SLIDE 14

Analysis of attacks on Kippo

  • SURFcert IDS reporting
  • Kippo-graph
slide-15
SLIDE 15

SURFcert IDS Reporting

slide-16
SLIDE 16

SURFcert IDS Reporting

slide-17
SLIDE 17

Kippo-graph

slide-18
SLIDE 18

Kippo-graph

slide-19
SLIDE 19

Existing reporting limitations

  • Attack source IP != attacker IP

○ Geolocation can be misleading

  • Unable to view actual session
  • No relations between attacks
  • Unable to identify attackers
  • No interaction with the visualizations
slide-20
SLIDE 20

Dataset

  • SURFcert IDS database

○ Distributed Intrusion Detection System ○ Passive sensors running multiple honeypots ○ Central logging database

  • 6,5 million attacks in the last 20 months

○ 6.273 SSH sessions ○ 56.607 commands

slide-21
SLIDE 21

Attack information

  • Source IP address
  • IP of the honeypot
  • Timestamp of the attack
  • All commands sent to the honeypot
slide-22
SLIDE 22

Visual analytics

Visual analytics is an iterative process that involves information gathering, data preprocessing, knowledge representation, interaction and decision making

Keim, 2008

slide-23
SLIDE 23

Visual analytics

Keim, 2008

slide-24
SLIDE 24

Visual analytics

  • Computationally Enhanced Visualization (V++)

○ Main focus on visualization ○ Supported by automatic computations

slide-25
SLIDE 25

Visual analytics mantra

Analyse first Show the important Zoom, filter and analyse further Details on demand

Keim, 2008

slide-26
SLIDE 26

Our approach

Analyse first Show the important Details on demand Zoom, filter and analyse further

Lelie & Breuk, 2012

slide-27
SLIDE 27

Analyse first

slide-28
SLIDE 28

Show the important

slide-29
SLIDE 29

Details on demand

slide-30
SLIDE 30

Details on demand

slide-31
SLIDE 31

Zoom, filter and analyse further

slide-32
SLIDE 32

Zoom, filter and analyse further

slide-33
SLIDE 33

Dashboard

slide-34
SLIDE 34

Demo

slide-35
SLIDE 35

Conclusion

  • Assist the expert in exploring the dataset
  • Can find related sessions independent of the IP

address

  • Browse data without reading all sessions
  • Identify servers that host malware
  • Identify attackers and groups
slide-36
SLIDE 36

Further research

  • Integration in SURFcert IDS
  • Direct use of Kippo data
  • Additions to Kippo

○ Relate brute force login attempts to a session

slide-37
SLIDE 37

Questions?

{jop.vanderlelie|rory.breuk}@os3.nl