SLIDE 1
NCL: Facilitating Cybersecurity Experimentation as a Community
Liang Zhenkai National Cybersecurity R&D Lab (NCL)
SLIDE 2 National Cybersecurity R&D Lab
- National Cybersecurity R&D Lab (NCL)
– Shared national infrastructure of Singapore for cyber-security research & development
– Simplify research and experimentation effort – Provide realistic testing environment – Enrich users' testing and validation
– Infrastructure, Ready-to-use Environments, Data
SLIDE 3 Infrastructure
Servers
defined network
Servers
network topology
Environments
vulnerability configuration
runtime
components
Data
collection
hosting and access control
dataset
Services of NCL
SLIDE 4
Life Cycle of Cyber Security Research
Analysis Solution Attack Description Goal: Reuse existing configuration efforts Setup Research
SLIDE 5
NCL Infra from User’s View
NCL Infrastructure
Data Repo
SLIDE 6
Virtual Enterprise Network
SLIDE 7
Catalog of Vulnerabilities
SLIDE 8
– Infected more than 300,000 computers over 150 countries. – Encrypting user files – Asking for Bitcoin
- Target vulnerability CVE-2017-0143 (MS17-
010)
– Vulnerability in SMB (port 445), originally exploited in ETERNALBLUE – Patch released on March 14, 2017 by Microsoft
The WannaCry Ransomware
SLIDE 9
Virtual Enterprise Network
SLIDE 10
– www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
- HTTPS request to a few IPs
– 199.254.238.52 – 154.35.175.225 – 128.31.0.39 – .......
- Random probing of next target
– Local network first, then external network – Different interval of probing, 10 – 25 per second
WannaCry Network Behavior
SLIDE 11
- Propagate but never connect with TOR
servers
- DB349B97C37D22F5EA1D1841E3C89EB4
- Never propagate but do connect with TOR
servers
- 509C41EC97BB81B0567B059AA2F50FE8
- Query a domain first, and do nothing if no
response
- 8DD63ADB68EF053E044A5A2F46E0D2CD
More Network Behaviors
SLIDE 12
- Malware related files appear
- Background of desktop changes
- Encrypted files ‘*.WNCRY’ appear
- Notification window appears
- Original files disappear
WannaCry System Behaviors
SLIDE 13
- Different order of events
- Different filename extension of encrypted
files
8DD63ADB68EF053E044A5A2F46E0D2CD
- Different notification windows and
backgrounds of deskop
Variants of System Behavior
SLIDE 14
Life Cycle of Cyber Security Research
Analysis Solution Attack Description Goal: Reuse existing configuration efforts Setup Research Goal: Share and reuse research knowledge
SLIDE 15
- A community-maintained resource set on
NCL to support research
– E.g. network behavior modeling, binary analysis to identify vulnerability for zero-days.
Facilitating Research
SLIDE 16
- With automated vulnerability setup, we
can gather knowledge of experiments
- E.g., three level of information
– CVE description – Executable environment – Analysis results from research projects
NCL as a Knowledge Base
SLIDE 17
Flexible Infrastructure Ready-to-use Environments Data and data management Community Knowledge Base
NCL Platform http://ncl.sg
The NCL Platform