covert channel detection using process query systems · 2005. 9. 20. · 3 outline • covert...

19
1 Covert Channel Detection Using Process Query Systems Annarita Giani Vincent Berk George Cybenko FLoCon 2005 Institute for Security Technology Studies Thayer School of Engineering Dartmouth College Hanover, NH

Upload: others

Post on 09-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

1

Covert Channel Detection Using

Process Query Systems

Annarita GianiVincent BerkGeorge Cybenko

FLoCon 2005

Institute for Security Technology StudiesThayer School of EngineeringDartmouth CollegeHanover, NH

Page 2: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

2

MOTIVATION

Interest in network and computer securityStarted investigating DATA EXFILTRATION

COVERT CHANNELS are the most subtle way of moving data.They easily bypass current security tools.

Until now there has not been enough interest. So detection isstill at the first stage.

NEW YORK -- The names, banks and account numbers of up to 40million credit card holders may have been accessed by anunauthorized user, MasterCard International Inc. said.

CNN.COMSunday, June 19, 2005 Posted: 0238 GMT (1038 HKT)

Page 3: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

3

OUTLINE

• Covert Channels• Process Query Systems• Detection of covert channels using a PQS

“A communication channel is covert if it is neither designed norintended to transfer information at all.” (Lampson 1973)

“Covert channels are those that use entities not normally viewed asdata objects to transfer information from one subject to another.”(kemmerer 1983)

Page 4: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

4

EXAMPLE: TIMING COVERT CHANNEL

secTt =! 010001

INTERNET

tt !=! 2

Sender

RemoteReceiver

Noisy Channel

Since brass, nor stone, nor earth, nor boundless sea,

But sad mortality o'er-sways their power,

How with this rage shall beauty hold a plea,

010001

Since brass, nor stone, nor earth, nor boundless sea,

But sad mortality o'er-sways their power,

How with this rage shall beauty hold a plea,

1. Information Theory2. Statistical analysis

Two approaches

tt !=! 2

secTt =!

secTt =!

secTt =!

Page 5: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

5

We built a package that registers the time delays between consecutivepackets for every network traffic flow.

source ip: 129.170.248.33dest ip: 208.253.154.210source port: 44806dest port: 23164

Protocol:TotalSize:#Delays[20]: 3 0 0 16 882 2 0 17 698 2 0 0 1 0 1 0 0 0 0 0Average delay:Cmax;Cmean:

Traffic is separated in connection types

Sensor

3 delays between 0sec and 1/40sec

882 delays between 4/40sec and 5/40sec

Key

Attributes

Given an interval of time we build the following node:

Page 6: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

6

Assumptions of the experiments:• No malicious noise.• Binary source.

Delay - secs

Num

ber o

f Del

ays source ip: 129.170.248.33

dest ip: 208.253.154.210source port: 56441dest port: 23036

Delay - secs

Num

ber o

f Del

ays

Covert Channels

source ip: 129.170.248.33dest ip: 208.253.154.210source port: 56441dest port: 23041

Page 7: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

7

OUTLINE

• Covert Channels• Process Query Systems• Detection of covert channels using a PQS

Page 8: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

8

Process Query Systems for Homeland Security

• How it works:

• User provides a process description as query

• PQS monitors a stream of sensor data

• PQS matches sensor data with registered queries

• A match indicates that the process model may explain thatsensor data, hence that process may be the cause ofthose sensor readings.

Page 9: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

9

• Tactical C4ISR - Is there a large ground vehicle convoy moving towards ourposition?

• Cyber-security - Is there an unusual pattern of network and system calls ona server?

• Autonomic computing - Is my software operating normally?

• Plume detection – where is the source of a hazardous chemical plume?

• FishNet – how do fish move?• Insider Threat Detection - Is there a pattern of unusual document accesses

within the enterprise document control system?

• Homeland Security - Is there a pattern of unusual transactions?

• Business Process Engineering - Is the workflow system working normally?

• Stock Market

• …

Applications

All are “adversarial” processes, not cooperative so the observations are notnecessarily labeled for easy identification and association with a process!

Page 10: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

10

Example

Multiple Processes

λ1 = router failure

λ2 = wormλ3 = scan

Events

…….

Time

An Operational Network

consists of

that produce

Unlabelled Sensor Reports

…….

Time

thatare

seenas

Track 1

Track 2

Track 3Hypothesis 1

Track 1

Track 2

Track 3

Hypothesis 2

that PQS resolves into

that detectcomplex attacksand anticipatethe next steps

129.170.46.3 is at high risk129.170.46.33 is a stepping stone......

thatare

usedto

defendthe

network

1

2

3

4

5

6Indictors and Warnings

Real World PQS

Hypotheses

TrackScores

SampleConsole

Page 11: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

11

Stream of Observable EventsSE

T O

F M

OD

ELS

MO

DEL

LIK

ELIH

OO

DS

TRACKINGALGORITHMS

PQS

Page 12: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

12

TRACKINGALGORITHMS

PQS

Kinematic of a car

Kinematic of a bycicle

Kinematic of an airplane

Position over time

Likelihood of a car = 0.2

Likelihood of an aiplane = 0.01

Likelihood of a bycicle = 0.5

Multiple Hypothesis TrackingViterbi Algorithm

Page 13: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

13

OUTLINE

• Covert Channels• Process Query Systems• Detection of covert channels using a PQS

Page 14: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

14

Observationssource ip: 129.170.248.33dest ip: 208.253.154.210source port: 44806dest port: 23164

source ip: 129.170.248.33dest ip: 208.253.154.210source port: 44806dest port: 23164

maxC

Cmean

maxC

Cmean

Time T

Time T+1

Page 15: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

15

Covert channel

Covert Channels models

Delay - secs

Num

ber o

f Del

ays

1)(

max

<<C

C µCovert Channel

=maxC

= max number of packets with the same delay ( = 280)

=)C(ì number of packets with interpacket delay ( = 0 )

=µ sample mean of interpacket transmission times ( = 0.7)

maxC

1)(

max

!C

C µ Not Covert Channel

Page 16: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

16

RESULTS

maxC

Cmean

Bytes

Page 17: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

17

Exfiltration modes:

• SSH• HTTP• FTP• Email• Covert Channel• Phishing• Spyware• Pharming• Writing to media

• paper• drives

• etc

Increased outbound data

Normal activity

ScanningInfectionData Access

Low Likelihood ofMalicious Exfiltration

High Likelihood of Malicious Exfiltration

Also monitor inter-packet delays for covert channels

DATA EXFILTRATIONFlow Sensor Ouputs

Page 18: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

18

Flow Sensor

Samba

SnortTripwire

SnortIP Tables

Exfiltration

Data Access

Scanning

Infection

PQS

PQS

PQS

PQS

PQS

TIER 1

TIER 1 Models

TIER 1 Observations

TIER 1 Hyphotesis

TIER 2

TIER 2 Models

TIER 2 Observations

TIER 2 Hyphotesis

PreprocessingNode

PreprocessingNode

PreprocessingNode

PreprocessingNode

Events

Events

Events

Events

Models

RESULTS

Hierarchical PQS Architecture

Page 19: Covert Channel Detection Using Process Query Systems · 2005. 9. 20. · 3 OUTLINE • Covert Channels • Process Query Systems • Detection of covert channels using a PQS “A

19

[email protected]

[email protected]

[email protected]

Thanks.

www.pqsnet.netwww.ists.dartmouth.edu

For more information :