Peer-to-peer Architecture for Collaborative Intrusion and Malware - - PowerPoint PPT Presentation

peer to peer architecture for collaborative intrusion and
SMART_READER_LITE
LIVE PREVIEW

Peer-to-peer Architecture for Collaborative Intrusion and Malware - - PowerPoint PPT Presentation

UNIVERSITY OF MODENA AND REGGIO EMILIA Peer-to-peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale Mirco Marchetti, Michele Messori and Michele Colajanni WebLab, University of Modena and Reggio Emilia, Italy


slide-1
SLIDE 1

UNIVERSITY OF MODENA AND REGGIO EMILIA

Pisa - 9 September 2009 Information Security Conference 2009

Peer-to-peer Architecture for Collaborative Intrusion and Malware Detection

  • n a Large Scale

Mirco Marchetti, Michele Messori and Michele Colajanni WebLab, University of Modena and Reggio Emilia, Italy

slide-2
SLIDE 2

P2P Architecture for Collaborative Intrusion and Malware Detection 2

Defense scenarios

  • Complex information systems
  • Heterogenous networks (wired-wireless)
  • Networks consisting of multiple segments
  • Cooperation among multiple organizations

=> Centralized defensive solutions do not work => Our focus: distributed architectures where cooperation is carried out through p2p schemes

slide-3
SLIDE 3

P2P Architecture for Collaborative Intrusion and Malware Detection 3

Goals

Building high-level activity reports from low-level alerts (related to one peer) about:

  • Malware behavior
  • Malware diffusion
  • Network-based attacks
  • Diffusion of intrusions
  • Identification of suspicious IP addresses
  • Identification of the servers from which the malware is

downloaded

  • ...
slide-4
SLIDE 4

P2P Architecture for Collaborative Intrusion and Malware Detection 4

Distributed IDS model

Main components (Heterogeneous) analyzers:

  • Watch of host activities
  • Sniffing of network traffic
  • Interaction with (probable) attacker
  • Stateful analysis of gathered data

Collectors:

  • Collection of low-level alerts from the analyzers

Collaborator module:

  • Aggregation and correlation of the alerts
slide-5
SLIDE 5

P2P Architecture for Collaborative Intrusion and Malware Detection 5

Distributed IDS

Existing architectures Centralized processing:

  • Distributed analyzers
  • Centralized aggregation

Hierarchical processing:

  • Distributed analyzers
  • Multi-level hierarchical aggregation

Common drawbacks:

  • Single point(s) of failure
  • Load unbalance
  • Poor or fair scalability
slide-6
SLIDE 6

P2P Architecture for Collaborative Intrusion and Malware Detection 6

Distributed IDS architecture based on P2P

slide-7
SLIDE 7

P2P Architecture for Collaborative Intrusion and Malware Detection 7

Structure of a single node

slide-8
SLIDE 8

P2P Architecture for Collaborative Intrusion and Malware Detection 8

Structure of a single node

slide-9
SLIDE 9

P2P Architecture for Collaborative Intrusion and Malware Detection 9

Analyzer layer

Main features:

  • Intrusion detection
  • Malware collection

Analyzer types:

  • Host IDS
  • Network IDS
  • Honeypot
  • Sensor Manager
slide-10
SLIDE 10

P2P Architecture for Collaborative Intrusion and Malware Detection 10

Local aggregation layer

Main features:

  • Pre-processing of all

collected data for homogeneous storage

  • Classification and storage of

all alerts in the local alert database

slide-11
SLIDE 11

P2P Architecture for Collaborative Intrusion and Malware Detection 11

Collaboration layer

Main features:

  • Submits collected alerts

to the DHT-based

  • verlay network
  • Manages a portion of

the hash space

  • Disseminates the

analysis results

slide-12
SLIDE 12

P2P Architecture for Collaborative Intrusion and Malware Detection 12

1)Collecting alerts from analyzers 2)Extrapolating information 3)Keys selection 4)Messages distribution based

  • n hash key ( , , )

5)Real-time creation of the replicas 6)Automatic management of the replicas

Operations: Early detection

slide-13
SLIDE 13

P2P Architecture for Collaborative Intrusion and Malware Detection 13

One message submitted for every interesting field, such as:

  • Malware’s binary code ( )
  • IP address of the server from

which the malware has been downloaded ( )

  • IDS signature ID
  • IP address of the attacker ( )

Operations: Key selection

slide-14
SLIDE 14

P2P Architecture for Collaborative Intrusion and Malware Detection 14

7) Processing received messages 8) Broadcast communication

  • f analysis results (high level

activity reports)( ) 9) Early warning threats 10) All peers are protected

Operations: Early warning

slide-15
SLIDE 15

P2P Architecture for Collaborative Intrusion and Malware Detection 15

Prototype

Components Analyzers:

  • OSSEC (HostIDS)
  • Snort (NetworkIDS)
  • Nepenthes (Honeypot)

Collector:

  • Prelude (Hybrid IDS) – useful for IDMEF
  • MySql (DBMS)

Collaboration module:

  • Freepastry libraries (DHT overlay)
slide-16
SLIDE 16

P2P Architecture for Collaborative Intrusion and Malware Detection 16

Prototype

Present features

  • Key generation for different alert fields
  • Management of malware bincode
  • Anomaly detection threshold-based
  • Emulation of thousands of nodes through Freepastry libraries
slide-17
SLIDE 17

P2P Architecture for Collaborative Intrusion and Malware Detection 17

Fault Tolerance – graceful degradation

slide-18
SLIDE 18

P2P Architecture for Collaborative Intrusion and Malware Detection 18

Concurrent faults (%) k=4 k=5 k=6

1 0.009 2 0.16 0.003 3 0.735 0.019 0.001 4 2.117 0.075 0.002 5 5.022 0.219 0.015 6 9.732 0.542 0.037 7 16.64 1.186 0.081 8 25.859 2.172 0.159 9 36.682 3.774 0.315 10 48.685 5.904 0.529 Message loss probability for a network of 10,000 nodes and for different replica factor k. Values in percentage (%)

Simulation results

Fault tolerance

slide-19
SLIDE 19

P2P Architecture for Collaborative Intrusion and Malware Detection 19

Conclusions and future work

Conclusions

  • Load balancing (as in Indra)
  • Graceful degradation (as in Domino)
  • Interoperability with heterogeneous sensors/analyzers
  • Malware payload management
  • Prototype

Future works

  • To enhance anomaly detection (e.g., new aggregation

algorithms)

  • Malware analysis (through internal engine or external services)