behavioral analysis
play

Behavioral Analysis Using Network traffic, DNS and logs JOSH PYORRE - PowerPoint PPT Presentation

Behavioral Analysis Using Network traffic, DNS and logs JOSH PYORRE Security Researcher Previously: Threat Analyst at NASA Threat Analyst at Mandiant @joshpyorre rootaccesspodcast.com Behavioral Analysis VIDEO analyzing website visitors


  1. masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  2. This one is ok… masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  3. masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  4. masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  5. masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  6. masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  7. Found a bad one! masterbrand.com mathads.com mdswanson.com medicaresupplement.com metanetwork.net mfg.com mhthemes.com military.com ministerial5.com mixpanel.com mobileapptracking.com mom.me monarchads.com mrsteam.com msftncsi.com mshcdn.com myfonts.net myvzw.com newsinc.com nexage.com nextadvisor.com norcraftcompanies.com notanpest.net obtrk.xyz office.net

  8. That process is really tedious

  9. Tedious • Mostly Manual Process • Searching and Personal Expertise

  10. Automate Things • Auto-process Logs / Streams • Save it so it’s Workable

  11. Getting data • Log files • DNS, AD, System, Web, etc • Network Capture

  12. Have to Write Parsers • We all have custom data • Use whatever is easiest for you • Python h g U • Excel • R

  13. Creating a baseline • Counting Total Number of Domains • Getting “Scores” • Categorization

  14. DNS • Starting with data from OpenDNS • Over a billion queries per day - approximately 3% of the internet • How do you baseline that? (You need a LOT of that data - as in TB) • Can you baseline that?

  15. DNS looks like this

  16. Let’s try anyway • Count how many times a domain is seen • Over 10 times: Write to normal_traffic.txt • Under 3 times: Write to suspicious_traffic.txt

  17. 08/25/2016 17:20:00,s1.mohito.com,A,360,78.24.161.76 08/25/2016 17:29:00,hotspotcostablanca.ath.cx,A,60,81.36.140.179 9 Minutes of DNS

  18. 664,938 domains looked up wc -l 2016-08-25-17-20.myzPMsaJ 664,938 2016-08-25-17-20.myzPMsaJ

  19. File size of original logs, the normal_traffic and the suspicious_traffic output files

  20. Normal Traffic

  21. Suspicious Traffic

  22. Picking one ‘suspicious’ site Suspicious Traffic

  23. Looking at DNS requests for that ‘suspicious’ site

  24. It’s probably fine…

  25. Picking another ‘suspicious’ site More Suspicious Traffic

  26. Looking at DNS requests:

  27. Looking at the site (no longer available)

  28. Looking at categorization: Categorization

  29. We still have a lot that is uncategorized Categorization

  30. Look at the Bandwidth

  31. Total traffic by Minute

  32. Doesn’t mean much It’s random data from unrelated sources

  33. We must Narrow the Focus

  34. DNS One Organization

  35. 19,801,469 DNS Requests: For a 17 hour period:

  36. Looks like this. Lots of visits to directv.com

  37. Remove unneeded data, still a large file:

  38. Get rid of the obviously normal: Down to 493,351 DNS Requests:

  39. Get rid of additional normal domains Down to 1,320 DNS Requests:

  40. Graphing on a timeline, but it’s not too clean

  41. Graph by domain and visit count (with some mistakes)

  42. Auto processing through past data can take a toll 2 GB File: Taking forever

  43. DNS • Looking at DNS traffic on the wire • Processing with various tools • Python • Pandas, etc…

  44. DNS • Ran this on a system at home: tcpdump -i eth1 -j host port 53 -tttt >> tcpdump.log eth1 is hooked up to a network tap watching traffic between the routers internet port and the cable modem

  45. It looks like this: 12:56:37.854306 IP 73.202.157.15.53018 > 208.67.222.222.53: 46044+ A? apple.com. (27) E..7..@.@...I....C..... 5.#.w.............apple.com..... 12:56:37.854517 IP 73.202.157.15.2461 > 208.67.222.222.53: 18586+ A? calendar.google.com. (37) E..A..@.@...I....C.. .. 5.-.xH............calendar.google.com..... 12:56:37.854681 IP 73.202.157.15.25959 > 208.67.222.222.53: 17850+ A? 1-courier.push.apple.com. (42) E..F..@.@...I....C..eg.5.2V.E........... 1- courier.push.apple.com..... 12:56:37.854906 IP 73.202.157.15.15125 > 208.67.222.222.53: 63415+ A? 14-lvl3-pdl.vimeocdn.com. (42)

  46. Just the time, domain and visit count

  47. Graph by domain and visit count

  48. This is anomalous:

  49. See if we can get an idea of network behavior from patterns Compare Traffic

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend