SSH Compromise Detection using NetFlow/IPFIX
Rick Hofstede, Luuk Hendriks
SSH Compromise Detection using NetFlow/IPFIX Rick Hofstede, Luuk - - PowerPoint PPT Presentation
SSH Compromise Detection using NetFlow/IPFIX Rick Hofstede, Luuk Hendriks 51 percent of respondents admitted that their organizations have already been impacted by an SSH key-related compromise in the last 24 months. Ponemon 2014 SSH
Rick Hofstede, Luuk Hendriks
–Ponemon 2014 SSH Security Vulnerability Report
“51 percent of respondents admitted that their
SSH key-related compromise in the last 24 months.”
2
Rick Hofstede, Luuk Hendriks
4
10000 20000 30000 40000 50000 60000 70000 500 1000 1500 2000 2500 3000 IP Time (s) FROM ATTACKER TO ATTACKER
(a)
4
10000 20000 30000 40000 50000 60000 70000 500 1000 1500 2000 2500 3000 IP Time (s) FROM ATTACKER TO ATTACKER
(a)
Start Brute-force Compromise Scan End
scalable
security operators about the presence of attacks
5
7
10000 20000 30000 40000 50000 60000 70000 500 1000 1500 2000 2500 3000 IP Time (s) FROM ATTACKER TO ATTACKER
(a)
8
2 4 6 8 10 12 14 16 500 1000 1500 2000 2500 3000 ppf Time (s)
(b)
9
performance profiling, …
9
performance profiling, …
9
2 4 6 8 10 12 14 16 500 1000 1500 2000 2500 3000 ppf Time (s)
(b)
performance profiling, …
9
10
paper release), based on ‘action upon compromise’
10
paper release), based on ‘action upon compromise’
10
Time Flow data chunk Target 1 Target n
(a) Maintain connection, continue dictionary (1)
Time Flow data chunk Target 1 Target n
(d) Maintain connection, abort dictionary (1)
SSH Compromise Detection using NetFlow/IPFIX. In: ACM SIGCOMM Computer Communication Review, October 2014
paper release), based on ‘action upon compromise’
10
Time Flow data chunk Target 1 Target n
(a) Maintain connection, continue dictionary (1)
Time Flow data chunk Target 1 Target n
(d) Maintain connection, abort dictionary (1)
Time Flow data chunk Target 1 Target n
(c) Instant logout, continue dictionary
Time Flow data chunk Target 1 Target n
(f) Instant logout, abort dictionary
SSH Compromise Detection using NetFlow/IPFIX. In: ACM SIGCOMM Computer Communication Review, October 2014
paper release), based on ‘action upon compromise’
10
Time Flow data chunk Target 1 Target n
(a) Maintain connection, continue dictionary (1)
Time Flow data chunk Target 1 Target n
(b) Maintain connection, continue dictionary (2)
Time Flow data chunk Target 1 Target n
(c) Instant logout, continue dictionary
Time Flow data chunk Target 1 Target n
(d) Maintain connection, abort dictionary (1)
Time Flow data chunk Target 1 Target n
(e) Maintain connection, abort dictionary (2)
Time Flow data chunk Target 1 Target n
(f) Instant logout, abort dictionary
SSH Compromise Detection using NetFlow/IPFIX. In: ACM SIGCOMM Computer Communication Review, October 2014
paper release), based on ‘action upon compromise’
10
11
and workstations, divided over two datasets:
12
Honeypots Servers Workstations Attacks Dataset 1 13 636 Dataset 2 76 4 10353
13
TPR TNR FPR FNR Acc Dataset 1 0,692 0,921 0,079 0,308 0,839 Dataset 2 — 0,997 0,003 — 0,997
14
companies
Networks (NRENs)
15
16
16
skilled than we are
16
skilled than we are
16
skilled than we are
16
skilled than we are
16
skilled than we are
16
[1] http://surfmap.sf.net/
17
17
17
the Internet: Keep it clean!
17
18
18
workflow
18
workflow
IODEF, X-ARF, QuarantaineNet, …
18
19
19
themselves
19
themselves
TERENA TNC, RIPE, etc.)
19
themselves
TERENA TNC, RIPE, etc.)
19
20
20
20
20
21
21
sources as possible
21
sources as possible
21
sources as possible
21
sources as possible
21
22
23
https://nl.linkedin.com/in/rhofstede/
www
http://rickhofstede.nl
@
r.j.hofstede@utwente.nl, rick.hofstede@redsocks.nl http://nl.linkedin.com/in/luukhendriks
www
https://luukhendriks.eu
@
luuk.hendriks@utwente.nl
https://github.com/sshcure/sshcure