WebW ebWatche her A Ligh ghtweigh ght T Tool
- ol for
- r A
Anal alyzi zing ng Web Se Server L Logs
- gs
Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory deb@zurich.ibm.com
WebW ebWatche her A Ligh ghtweigh ght T Tool ool for or A - - PowerPoint PPT Presentation
WebW ebWatche her A Ligh ghtweigh ght T Tool ool for or A Anal alyzi zing ng Web Se Server L Logs ogs Herv DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory deb@zurich.ibm.com PROJECT GOALS To
Hervé DEBAR IBM Zurich Research Laboratory Global Security Analysis Laboratory deb@zurich.ibm.com
NDSS 2000 - Page 2
NDSS 2000 - Page 3
NDSS 2000 - Page 4
host - authenticated_user [date] "request string" status bytes
NDSS 2000 - Page 5
Report Facilities Pattern
Trusted
Suspicious
Refined
Parser
Decision
Combination
NDSS 2000 - Page 6
NDSS 2000 - Page 7
NDSS 2000 - Page 8
NDSS 2000 - Page 9
12 6 1 2 11 3 2 3 1 6 3 3 4 11 3 3 7 4 5 3 3 4 16 5 1 500 1000 1500 2000 2500 3000 3500 4000 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49 51 53 55 57 59 61 63 65 67 69 Days (since supervision started) Number of requests made Normal Traffic Since the malicious traffic is far smaller than the normal traffic, all days have been marked with a number, signifying the alarms raised by the monitor that particular day.
NDSS 2000 - Page 10
72270 4 105 422 4154 1 2975 99 200 OK 204 No Content 206 Partial Content 302 Moved Temporary 304 Not Modified 400 Bad Request 404 Not Found 500 Internal Server Error The total number of requests were 80,030. The malicious requests discovered are within these slices. As can be seen, most requests handled by the server are successful, with 96% benign ones and only 4% in the category of client or server error.
NDSS 2000 - Page 11
6179 23 76 1 770 2xx Success 3xx Redirection 4xx Client Error 5xx Server Error mixed status codes The server was accessed by a total of 7049 distinct host names during the analyzed time. The majority of the hosts only asks for requests which are handled successfully by the server. The likely cause is that these hosts access the main page and then follows one or two links. If the site is working, this should not cause any errors. Hosts asking only for status code: All serious attacks were within this slice. One host did not follow this pattern and is thus found in the slice "mixed status codes."
NDSS 2000 - Page 12
3 6 9 12 15 18 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49 51 53 55 57 59 61 63 65 67 69 Days (since supervision started) Number of Attacks (malicious requests) Hosts trying only the three programs: phf, test-cgi, and handler in a very short time interval. Internal tests of the setup of the WWW server. Host using the tool cgiScan to perform the attack. Unidentified tool A simple probe made by hand?
NDSS 2000 - Page 13
NDSS 2000 - Page 14
NDSS 2000 - Page 15
NDSS 2000 - Page 16