Computer Science 161 Fall 2016 Popa and Weaver
Monitoring For Attacks (Slides mostly stolen from Dave Wagner)
1
Monitoring For Attacks (Slides mostly stolen from Dave Wagner) 1 - - PowerPoint PPT Presentation
Computer Science 161 Fall 2016 Popa and Weaver Monitoring For Attacks (Slides mostly stolen from Dave Wagner) 1 The Security Triad... Computer Science 161 Fall 2016 Popa and Weaver Stolen from: Daniel Schatz @virturity 2 The Next
Computer Science 161 Fall 2016 Popa and Weaver
1
Computer Science 161 Fall 2016 Popa and Weaver
2
Stolen from: Daniel Schatz @virturity
Computer Science 161 Fall 2016 Popa and Weaver
3
Remote client FooCorp’s border router FooCorp Servers Front-end web server
bin/amazeme -p xxx
Output of bin/amazeme
Computer Science 161 Fall 2016 Popa and Weaver
5
Remote client FooCorp’s border router FooCorp Servers Front-end web server
bin/amazeme -p xxx
NIDS
Monitor sees a copy
HTTP traffic
Output of bin/amazeme
Computer Science 161 Fall 2016 Popa and Weaver
7
Computer Science 161 Fall 2016 Popa and Weaver
8
Tap High Volume Filter NIDS Node NIDS Node NIDS Node Load Balancer Is Not BitTorrent? H(SIP, DIP) Do this in OpenFlow: 100 Gbps install at LBNL Linear Scaling: 10x the money... 10x the bandwidth! 1u gives 1-5 Gbps
Computer Science 161 Fall 2016 Popa and Weaver
9
220 GET GET HT TP /fu bar/ 1.1.. HTTP /b az/?id= 1f413 1.1... mail.domain.target ESMTP Sendmail...
HTTP Request URL = /fubar/ Host = .... HTTP Request URL = /baz/?id=... ID = 1f413 Sendmail From = someguy@... To = otherguy@...
Computer Science 161 Fall 2016 Popa and Weaver
connections might be existing
10
Computer Science 161 Fall 2016 Popa and Weaver
11
NIDS /etc/p RST
Computer Science 161 Fall 2016 Popa and Weaver
12
NIDS /%65%74%63/%70%61%73%73%77%64
Computer Science 161 Fall 2016 Popa and Weaver
13
Computer Science 161 Fall 2016 Popa and Weaver
understand the spec)
destination
14
Computer Science 161 Fall 2016 Popa and Weaver
15
Computer Science 161 Fall 2016 Popa and Weaver
16
Remote client FooCorp’s border router FooCorp Servers Front-end web server
profile=xxx bin/amazeme -p xxx
HIDS instrumentation added inside here
Computer Science 161 Fall 2016 Popa and Weaver
18
Computer Science 161 Fall 2016 Popa and Weaver
19
Remote client FooCorp’s border router FooCorp Servers Front-end web server
bin/amazeme -p xxx
Run Nightly Analysis Of Logs Here
Computer Science 161 Fall 2016 Popa and Weaver
servers
21
Computer Science 161 Fall 2016 Popa and Weaver
22
Remote client FooCorp’s border router FooCorp Servers Front-end web server
Real-time monitoring of system calls accessing files
Computer Science 161 Fall 2016 Popa and Weaver
24
Computer Science 161 Fall 2016 Popa and Weaver
want to detect)
25
Computer Science 161 Fall 2016 Popa and Weaver
void my_detector_that_never_misses(char *URL) { printf("yep, it's an attack!\n"); }
26
Computer Science 161 Fall 2016 Popa and Weaver
might lead to $10K cleaning up compromised system that was missed
your environment
27
Computer Science 161 Fall 2016 Popa and Weaver
and a FN rate of 2% (not bad!)
attacks
28
Computer Science 161 Fall 2016 Popa and Weaver
29
Computer Science 161 Fall 2016 Popa and Weaver
alert tcp $EXTERNAL_NET any -> $HOME_NET 139 flow:to_server,established content:"|eb2f 5feb 4a5e 89fb 893e 89f2|" msg:"EXPLOIT x86 linux samba overflow" reference:bugtraq,1816 reference:cve,CVE-1999-0811 classtype:attempted-admin
30
Computer Science 161 Fall 2016 Popa and Weaver
31
Computer Science 161 Fall 2016 Popa and Weaver
alert tcp $EXTERNAL_NET any -> $HTTP_SERVERS 80 uricontent: ".ida?"; nocase; dsize: > 239; flags:A+ msg:"Web-IIS ISAPI .ida attempt" reference:bugtraq,1816 reference:cve,CAN-2000-0071 classtype:attempted-admin
have ACK set (maybe others too)
servers
32
Computer Science 161 Fall 2016 Popa and Weaver
without knowing it exists
33
Computer Science 161 Fall 2016 Popa and Weaver
rate)
34
Computer Science 161 Fall 2016 Popa and Weaver
foocorp.com servers must have at most one ‘/’ in them
35
Computer Science 161 Fall 2016 Popa and Weaver
36
Computer Science 161 Fall 2016 Popa and Weaver
37
Computer Science 161 Fall 2016 Popa and Weaver
infer behavior/processing it can’t directly observe
38
Computer Science 161 Fall 2016 Popa and Weaver
39
Computer Science 161 Fall 2016 Popa and Weaver
40
Computer Science 161 Fall 2016 Popa and Weaver
41
Computer Science 161 Fall 2016 Popa and Weaver
42
Computer Science 161 Fall 2016 Popa and Weaver
43
Computer Science 161 Fall 2016 Popa and Weaver
44
Computer Science 161 Fall 2016 Popa and Weaver
45
Computer Science 161 Fall 2016 Popa and Weaver
attacks, fix any that succeed
46
Computer Science 161 Fall 2016 Popa and Weaver
47
Computer Science 161 Fall 2016 Popa and Weaver
48
Computer Science 161 Fall 2016 Popa and Weaver
49
Computer Science 161 Fall 2016 Popa and Weaver
50
Computer Science 161 Fall 2016 Popa and Weaver
51