how to secure the network - darknet based cyber-security ...how to secure the network - darknet...

61
How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research Executive Director, Distinguished Researcher, NICT Information Security Fellow, KDDI Joint Japan-India Workshop on Cyber Security and Services/Applications for M2M and Fourteenth GISFI Standardization Series Meeting

Upload: others

Post on 09-Aug-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

How to secure the network - Darknet based cyber-security technologies for

global monitoring and analysis

Koji NAKAO

Research Executive Director, Distinguished Researcher, NICT Information Security Fellow, KDDI

Joint Japan-India Workshop on Cyber Security and Services/Applications for M2M and Fourteenth GISFI Standardization Series Meeting

Page 2: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

2

Outline of NICT Mission

As the sole national research institute in the information and communications field, we as NICT will strive to advance national technologies and contribute to national policies in the field, by promoting our own research and development and by cooperating with and supporting outside parties.

Budget (FY 2012): approx. 31.45 Billion Yen

(420 Million US$)

Personnel: 849 Researchers: 517

PhDs: 410 (as of April 2012)

Japa

n St

anda

rd T

ime

and

Spac

e W

eath

er F

orec

ast s

ervi

ces

Interaction with National ICT Policy

Collaboration between Industry, Academic Institutions and Government

Gro

wth

of J

apan

ese

Eco

nom

y

Safe

ty a

nd S

ecur

ity fo

r a

mor

e co

nven

ient

life

Con

trib

utio

n to

solv

e m

ajor

pro

blem

s of

the

glob

al c

omm

unity

R&D carried out by NICT’s researchers

R&D assistance to industry and academia Promotion of ICT businesses

Page 3: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

3

New

Generation N

etwork S

ecurity

Security Architecture Laboratory

Cybersecurity Laboratory

Security Fundamentals

Laboratory

Collaboration

Security O

rganizations

Recommendations for Cryptographic Algorithms and Key Lengths to Japan e-Government and SDOs

• Cyber attack monitoring, tracking, analysis, response and prevention • Prompt promotion of outcomes

• Dynamic and optimal deployment of security functions • Secure new generation network design

• Security evaluation of cryptography • Practical security • Post quantum cryptography • Quantum security

Daisuke Inoue Shin’ichiro Matsuo

Shiho Moriai

Kazumasa Taira (Director General)

Koji Nakao (Distinguished Researcher)

Network Security Research Institute

Page 4: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

4

Content for Today • Current Security Threats

(e.g. Malwares/Botnet, DDoS)

• Introduction of nicter project and others: Security Incident Analysis System for Detecting Large-scale Internet Attacks by means of Darknet traffic

- Macro/Micro-Analysis - Macro-Micro Correlation Analysis - DAEDALUS

- NIRVANA

• On-going new projects for cybersecurity in Japan: PRACTICE

Page 5: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

5

Malware Chronology (1970-2010) Year Malware

1990 1260 (1st polymorphic virus), Form, Whale

1991 Tequila, Michelangelo, Anti-Telefonica, Eliza

1992 Peach (1st anti-antivirus programs), Win.Vir_1_4 (1st Windows virus)

1993 PMBS

1994 Good Times (1st hoax)

1995 Concept (1st macro virus)

1996 Laroux, Staog (1st Linux m.w.)

1997 ShareFun, Homer, Esperanto

1998 Accessiv, StrangeBrew (1st Java m.w.), Chernobyl

1999 Happy99, Tristate, Melissa, ExploreZip, BubbleBoy, Babylonia

2000 Loveletter, Resume, MTX,Hybris

2001 Anna Kournikova,BadTrans, CodeRed I, Sircam,CodeRed II, Nimda, Klez

2002 LFM-926 (1st Flash m.w.), Chick, Fbound,Shakira, Bugbear

2003 Sobig, SQLSlammer, Deloder, Sdbot, Mimail, Antinny, MSBlaster, Welchia, Agobot, Swen, Sober

2004 Bagle, MyDoom, Doomjuice, Netsky,WildJP, Witty,Sasser, Wallon, Bobax, Rbot, Cabir(1stSymbianm.w.), Amus, Upchan , Revcuss, Lunii, Minuka, Vundo

2005 Bropia, Locknut,BankAsh,Banbra, Anicmoo, Commwarrior, Pgpcoder, Zotob, Gargafx, Peerload, Cardblock,PSPBrick (1st PSP m.w), DSBrick (1st Nintendo DS m.w.), Dasher

2006 Kaiten, Leap (1st Mac OS X m.w.),Redbrowser, Cxover,Exponny, Mdropper,Flexispy, Spaceflash,Stration, Mocbot, Fujacks, Allaple

2007 Storm Worm,Pirlames, Zlob, Srizbi (1st full-kernel m.w.), Silly, Pidief

2008 Mebroot,Infomeiti, Conficker

2009 Virux, Yxes,Gumbler, Induc, Ikee (1stiPhonem.w.)

2010 Zimuse, Trojan-SMS.AndroidOS.FakePlayer (1st Androidm.w.), Stuxnet

Year Malware

1970

1971 Creeper (1st worm)

1972 # The term “virus” first appeared in a SF novel “When HARLIE Was One”.

1973

1974

1975 # The term “worm” first appeared in a SF novel“The Shockwave Rider”.

1976

1977

1978

1979

1980 Xerox PARC Worm

1981

1982 Elk Cloner(1st virus)

1983

1984 # Cohen defined virus in his paper “Computer Viruses - Theory and Experiments”.

1985

1986 Brain (1st IBMPC virus), PC-Write (1st Trojan horse), Virdem

1987 Cascade, Jerusalem, Lehigh, Christmas Tree, MacMag

1988 Byte Bandit, Stoned, Scores, Morris Worm

1989 AIDS(1stransomware), Yankee Doodle, WANK

Disc

ove

ry

Crim

inal E

xplo

itatio

n

Experim

enta

tion

Page 6: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

6

Botnet (Collaborative attacks)

DDoS Scan spam C & C

Infected PCs by Bot

Attack Commands

Ex:Scan、 DoS、spam

Attacker

Page 7: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

7

Malicious Chains based on Botnet

Attacker

Zero-Day Market

Botnet Market

Scan & Intrusion

C & C Server

Malware Market

Infected PCs by Bot

DDoS

Termination of Services

Stock fraud

fraudulent business

advertisement

Information theft

Malicious Sites

Use of Benefit

Sending Mass Mail

Use of Vulnerability

Phishing

Redirect

Account Infor.

E mail

Document Infor.

spam

Page 8: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

8

nicter and Its Spin-offs

3. Livenet real-time visualizer NIRVANA

2. Darknet-based alert system DAEDALUS

1. Incident analysis system nicter

Page 9: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

9

Bird’s-eye View / Insect’s-eye View

nicter DAEDALUS NIRVANA

Global Monitoring

(Darknet) Local Monitoring

(Livenet)

Page 10: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

nicter

(Network Incident analysis Center for Tactical Emergency Response)

Page 11: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

11

What we are fighting against?

Virus

Bot Worm

Malware

short for malicious software designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.

(from Wikipedia)

Page 12: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

12

Overview of the project

Target: Comprehensive analysis of security threats on the Internet - What happens on the Internet? - What is the root cause?

Strategy: Network monitoring + Malware analysis

nicter Operation Room

nicter = Network Incident analysis Center for Tactical Emergency Response

Page 13: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

13

Alert ------------ ------------ ------------

Analysis Work Bench

Incident Alert

!

!

!

NemeSys: Network and malware enchaining System

IHS: Incident Handling System

Government

End Users

Internet Service Providers (ISPs)

Phen

omen

a R

oot C

ause

Visualization Analysis Engine

Tiles Atlas

Cube

MacS: Macro analysis System

Code Analyzer Behavior Analyzer

MicS: Micro analysis System

Darknet Traffic

Malware Samples

Honeypot

Virus

Bot

Worm

Correlation Engine

System Overview

200,000 darknet (dark IP addresses)

7,000 samples can be analyzed

per day

30 seconds for a correlation

analysis

Page 14: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

14

Macro Analysis System (MacS): • Monitors Darknet of over 0.2 million

Darknet = Globally Announced Unused IP Addresses (Black-hole address spaces)

• Real-time Detection of Incident Candidates such as: – New Attack Patterns of Malwares – Rapid Increase of Attacks

Micro Analysis System (MicS): • Automated Capture and Analysis of Malwares • Static Analysis and Dynamic Analysis

Network and malware enchaining System (Nemesys): • Automated Correlation of Darknet Traffic and Malwares

Three Analysis Systems in nicter

Page 15: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

15

MacS: Macro Analysis System (Darknet Monitoring and Analysis)

Page 16: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

16

Monitor data through Dark-Net • Dark-Net: Unassigned IP addresses space

and they are not connected to the Real Servers/PCs.

• Types of Packets arrived to the Dark-Net: – Scans by means of Malwares; – Malwares infection behaviors; – DDoS attacks by Backscatter; – Miss configurations/mistakes

• It is very useful to Observe the serious attacks behavior over the Internet.

Darknet

Page 17: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

17

Malware infection behavior by means of Dark-Net monitor

Back-Bone ISP

End-LAN

IX

ISP

ISP

ping

ping

ping

ping

ping

ping

Resp.

Resp.

TCP TCP ping

ping

ping

ping

Hacked!

Dark-Net senser for Dark-Net

Observe the scan behaviors

Page 18: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

18

Atlas: Geographical Traffic Visualization

• Shows geographical positions of a packet’s src and dst from the IP addresses in real-time •Each packet is represented by a rocket traversing from source to destination

• The color of the rocket indicates the type of packet • The altitude of the rocket is in proportion to its dst port number

■UDP ■TCP SYN ■TCP SYN/ACK ■TCP Other ■ICMP

2012 Bot US& China

Page 19: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

19

Daily Status of Darknet Traffic

Over 23 millions packets per day

Over 600 thousands unique hosts per day

Jan 01 – Jan 31, 2013

Page 20: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

20

Observing 3389/tcp in dark-net

0

200

400

600

800

1000

1200

1400

1600

1800

2000

0

5000

10000

15000

20000

25000

30000

35000 S12 Host S13 Host S29 Host S10 Host(RightAxis)

Report to SIGMON Microsoft, F−Secure Alerts

JPCERT/CC Alert

SecurityUpdate

Page 21: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

21

Observing 3389/tcp in dark-net (Zoom-up)

0

5

10

15

20

25

30

0

100

200

300

400

500

600

700

800 S12 Host

S13 Host

S29 Host

S10 Host(RightAxis)

Synchronized Increase Report to SIGMON

Page 22: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

22

Backscatter: Reflection of DDoS Attack Targeted Server

A large number of connection requests (TCP SYN) with source IP address spoofing

The targeted server sends back replies (TCP SYN-ACK) to spoofed IP addresses

140 thousands darknet (un-used IP addresses)

Attacker(s)

Page 23: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

23

Large Scale of Information Leakage: Sony • Incident that individual information on 100 million totals or more flows

out from online services of Sony group. The impact of the individual information leakage incident is a worst-ever scale.

• Before such a large information leakage, subsidiary companies of Sony were attacked by DDoS. Attacker was “Anonymous” hacker group. Sony’s behaviors (claiming to a federal district court) bought the anger of "Anonymous".

• After DDoS, the system was hacked and the incident was occurred.

Page 24: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

24

Backscatter from SONY - Attacked by Anonymous on April 2011 -

April 3, 2011 Sony Online Entertainment @San Diego April 5, 2011

Sony Computer Entertainment @Texas

April 5, 2011 Sony Computer Entertainment Europe @London

Anonymous

Sony

Page 25: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

25

Long-term Observation of Backscatter

0

500

1000

1500

2000

2500

0

1000000

2000000

3000000

4000000

5000000

6000000

7000000

8000000

9000000

10000000 20

06.0

4.01

20

06.0

5.26

20

06.0

7.20

20

06.0

9.13

20

06.1

1.07

20

07.0

1.01

20

07.0

2.25

20

07.0

4.21

20

07.0

6.15

20

07.0

8.09

20

07.1

0.03

20

07.1

1.27

20

08.0

1.21

20

08.0

3.16

20

08.0

5.10

20

08.0

7.04

20

08.0

8.28

20

08.1

0.22

20

08.1

2.16

20

09.0

2.09

20

09.0

4.05

20

09.0

5.30

20

09.0

7.24

20

09.0

9.17

20

09.1

1.11

20

10.0

1.05

20

10.0

3.01

20

10.0

4.25

20

10.0

6.19

20

10.0

8.13

20

10.1

0.07

20

10.1

2.01

20

11.0

1.25

20

11.0

3.21

20

11.0

5.15

20

11.0

7.09

20

11.0

9.02

20

11.1

0.27

Num

ber o

f Uni

que

Host

s per

Day

Num

ber o

f Pac

kets

per

Day

Page 26: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

26

General Statistics observed in Dark-net at NICT (for India)

• Observed – in all sensors (sum) – 1, Aug ~ 16, Sep (47days) – From India to NICT dark-net

• 12,401 unique hosts/day (avg) • 201,274 packets/day (avg)

– From Japan to NICT dark-net • 13,317 unique hosts/day (avg) • 741,189 packets/day (avg)

Number of unique source hosts per day

Number of packets per day India

Page 27: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

27

Backscatter Analysis (1) focusing on India

The targeted server sends back replies (TCP SYN-ACK) to spoofed IP addresses

A large number of connection requests (TCP SYN) with source IP address spoofing

Attackers

Targeted Benign Server

Sensor A

Sensor B

DDoS targeted

Hosts in India

India

Page 28: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

28

Backscatter Analysis (2)

0

5000

10000

15000

20000

25000

30000

35000

40000

45000

50000 Backscatter (Packet) from India IN backscatter Packet

0

2

4

6

8

10

12

8/1 8/3 8/5 8/7 8/9 8/11 8/13 8/15 8/17 8/19 8/21 8/23 8/25 8/27 8/29 8/31 9/2 9/4 9/6 9/8 9/10 9/12 9/14 9/16

Backscatter (Host) in India IN backscatter Host

Global darknet monitoring can detect DDoS targeted hosts in India 3.6 hosts and 8,806 packets per day

Page 29: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

29

Backscatter Analysis (3) • What kind of hosts were under the DDoS attacks?

59.165.131.33.man-static.vsnl.net.in. triband-del-59.177.88.236.bol.net.in. mail.sysconinfoway.com. 8-239-2-103.mysipl.com. mum-46.fknet.flipkart.com. 111servers.com. www.go4hosting.com. unknown.xeex.net. mail14.amitip.com. 115.114.191.203.static-Mumbai.vsnl.net.in. ABTS-North-Static-217.33.160.122.airtelbroadband.in. ABTS-North-Dynamic-233.166.162.122.airtelbroadband.in. ABTS-TN-dynamic-143.102.174.122.airtelbroadband.in. ws38-227-252-122.rcil.gov.in. 19-243-201-123.static.youbroadband.in. segment-124-7.sify.net. nicnet.nic.in. ns1.nic.in. nitpuguwa.nic.in. hungama.com. archive.gtlinfra.com. archive.epalindia.com. archive.gtllimited.com. archive.globalproserv.com. archive.globalruralnetco.com. archive.educationforpeace.in. pop.ghc.in. :

hungama.com

Page 30: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

30

Cube: 3D Traffic Visualization • Shows comprehensive traffic animation in real-time •Each packetis represented bya thin rectangle • The rectangle is placed on the source plane according to its src IP addr and port number

• It glides to the destination plane taking about six seconds

•The position it reaches is according to its dst IP addr and port number ■UDP

■TCP SYN ■TCP SYN/ACK ■TCP Other ■ICMP

Sour

ce IP

Add

ress

Des

tinat

ion

IP A

ddre

ss

Network scan Bot

Page 31: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

31

Tiles: Host-based Behavioral Analysis Engine

• One tile illustrates behavior of an attacking host in 30 sec. • Each behavior is automatically categorized and stored in a

DB. • Unknown attack pattern can be detected.

Tiles

Page 32: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

32

MicS: Micro Analysis System (Fully Automated and Isolated Malware

Analysis)

Page 33: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

33

Goals and Current Status of MicS Goals:

– Fully automated and isolated analysis environment – Extract malware’s internal and external activities

Current Achievements:

– Fully-automated malware analysis system • flexible to add new analysis engine

– 6 to 10 minutes per one malware sample • totally 1200 to 2000 samples per day

Two Analyzers:

– Malware Code Analyzer – Malware Behavior Analyzer

Code Analyzer Behavior Analyzer

Page 34: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

34

34

Unique ID Malware Name Status of Analysis Analysis Results

Page 35: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

35

NemeSys: Network and malware enchaining System

(Macro-Micro Correlation Analysis)

Page 36: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

36

NemeSys Overview Goal:

To bind phenomena (attacks) observed by the MacS and root cause(malwares) inspected in the MicS

Basic Idea (scan based correlation): • MacS: Profiling scan sent by a certain host

• MicS: Profiling scan captured in the behavior analyzer

• Compare scan profiles by using correlation coefficient

then candidates of infecting malware can be listed

In the Wild

In the Lab

Correlation

Page 37: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

37

Correlation Links MacS Result MicS Result

IP address of an attacking host observed in MacS

IP address of an attacking host that injected malware samples into the honeypot

Scan profile of an attacking host observed in MacS

Scan profile of a malware sample executed in micro behavior analyzer

Tiles signature (scan behavior) of an attacking hosts observed in MacS

Tiles signature of a malware sample executed in micro behavior analyzer

Signature (MD5 hash value) of shellcode captured by honeypot from an attacking host

Signature of shellcode of a malware sample executed in behavior analyzer

IP Address Link

Scan Profile Link

Tiles Signature Link

Shellcode Hash Link

(same or not)

(Similarity)

(same or not)

(same or not)

Page 38: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

38

Result of Real-time Correlation Analysis (1/2)

Demo

Page 39: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

39

Result of Real-time Correlation Analysis (2/2)

Page 40: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

40

DAEDALUS

(Direct Alert Environment for Darknet And Livenet Unified Security)

Daedalus

Ikaros

Page 41: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

41

Goal and Mechanism of DAEDALUS

Goal: Utilize the darknet monitoring results for securing the livenet.

Mechanism: if (nicter receives packets from a cooperative organization)

alert;

Page 42: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

42

System Overview

nicter

: Darknet : Livenet

Page 43: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

43

Internal Darknet Alert (Local Scan) Case 1

nicter

: Darknet : Livenet

: Infected Host

Page 44: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

44

External Darknet Alert (Global Scan)

: Darknet : Livenet

: Infected Host

Case 2

nicter

Darknet Traffic

Page 45: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

45

External Darknet Alert (Backscatter)

nicter

Darknet Traffic

Case 3

: Darknet : Livenet

: DDoS Victim

Page 46: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

46

# of DAEDALUS Alerts to a Certain Country

• From Jun 1, 2012 to Nov 19, 2012 • Plotting # of new alerts per day (i.e., # of attacking hosts)

Date

# o

f new

ale

rts

/ da

y # of alerts is gradually decreasing

Page 47: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

47

DAEDALUS vis

Demo

Page 48: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

NIRVANA (nicter real-network visual analyzer)

Page 49: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

49

Objective

Visualizing livenet

Reducing a load of network administration

(promptly find malfunction, misconfiguration and congestion)

Cost reduction

Demo

Page 50: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

50

System Setting

monitor

Sensor

Sensor

Sensor

Gate Viz Engine

Enterprise Network

NIRVANA

Page 51: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

51

Packet Mode and Flow Mode • Packet Mode

• Flow Mode

Page 52: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

52

Filtering Functions • IP Address

• Protocol

• Port Number

• Sensor ID

• Area

Page 53: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

53

Sum of NICT projects nicter : Incident analysis system

+ DAEDALUS : Darknet-based alert system

+ NIRVANA+ : Livenet real-time visualizer with detector

+ Countering Drive-by-download

+ Boundary Protection (existing technologies)

||

New Horizon of Cybersecurity

Page 54: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

PRACTICE Project Proactive Response Against Cyber-attacks

Through International Collaborative Exchange

Ministry of Internal affairs and Communications (MIC), Japan

Page 55: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

55 Malware sandboxes

Distributed Sensors

Distributed Sensors

Global Trends

Deep Insights

◆ Project is organized by MIC and is consisted of R&D part and Field Trial part. ◆ R&D part: Gaining maximum awareness of ongoing cyber attacks (botnets) 1) Macroscopic tracking of botnet attacks using various types of distributed

sensors (victim-side monitoring) for grasping Global Trends 2) Microscopic tracking of individual bot-infected hosts using malware

sandboxes (attacker-side monitoring) Deep Insights 3) Based on correlation analysis among the above two approaches,

Investigation of symptoms of cyber-attacks will be carried out for sharing among partners including international partners.

◆ Field Trial part: Establishing quick and proactive response scheme with ISPs’ cooperation through a field trial by utilizing input from R&D part.

Final Goal: Toward Proactive Response against Cyber-Attacks

Page 56: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

56

Who operates PRACTICE? - MIC organizes the PRACTICE, which has Implementing Organizations and Supporting Organization. - Implementing Organizations are ISP association(i.e. Telecom ISAC Japan) and related companies as a “field trial” part, and research institutes or security related companies as an “R&D” part. - Supporting Organization is NICT which supports and assists “R&D” part of Implementing Organizations with technical expertise for cyber-attacks analysis technology.

56

Implementing Organizations Supporting Organization

• Institute of Systems, Information Technologies and Nanotechnologies

• Japan Datacom Co., Ltd. • KDDI R&D Laboratories • SecureBrain Corporation • Yokohama National University

- Technical support based on NICT’s excellent expertise; - Providing captured data and the results of analysis by NICT. R&D of technologies which investigate

symptoms of cyber attacks.

Field trial of quick and proactive response based on the cooperation among ISPs.

Visualization of cyber-attacks

Data sharin

g

Partner countries

Data sharin

g

Data & expertise

Page 57: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

57

What types of data to be shared

57

• Basic data to be shared with our collaborative partner's country: 1) Cyber attack information captured in Japan by LEU located in Japan 2) Cyber attack information captured in our partner’s country 3) DAEDALUS data is provided (see Annex 1)

• Results of Analysis can also be shared with our collaborative partner's country: 4) Attack similarity and specificity

5) Symptoms of attack behavior

■UDP ■TCP SYN ■TCP SYN/ACK ■TCP Other ■ICMP

Information is visualized by means of the tool developed by NICT. Using this information, cyber-attack behaviors (mainly SCANs) to Japan can be observed. Each country could interestingly compare the trend of attacks with your own country (see below 2)).

Cyber-Attack Information targeted to your own country is visualized by means of the tool developed by NICT based on the captured data from darknet space in your country.

An organization (Use Case) : 14,000 addresses for livenet and 2,500 addresses for darknet Attacks by means of five continued alerts (with yellow) and one new alert (with red) were observed at 18:00 on July 10, 2012 in real-time basis. It is also possible to detect DDoS attack targeted to the livenet addresses just registered previously from your country.

Based on several analysis engines, your country can grasp similar attack behaviors observed by many sensors located all over the world. This information can be shared among our all collaborative partners. Therefore, your country should be aware of this similar propagation of attack for your proactive response. On the other hand, attack behavior specificity in your country can be reported. In this case, your country will be required to take a special measure against specific attack only observed in your country (only shared with your country).

Based on data mining and other analysis methods, you will get symptoms of cyber-attack which will be very early stage of attack behavior. For example, “a new type of scan is getting observed in a synchronized manner among several sensors” will be informed.

Page 58: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

58

Tech-1:Prediction based on the data captured in foreign monitors

Based on the captured data from Japan, Asia, EU and US, characteristics of attack traffic and malware executable can be identified and analyzed for investigation of -attack similarity, -attack specificity and -attack propagativity.

Results of Analysis can also be shared with our collaborative partner's country

Attack has come! Attack will come

soon!

Tech-2:Prediction by means of Data mining of traffic data

Page 59: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

59

Tech-3:Prediction based on DNS data, etc.

Scan

DDoS

Spam

Etc,

C&C Server

Botnet

Attack command from Attacker e.g.:Scan、 DDoS、spam

Attacker DNS Server

② ③

Tech-4:Prediction based on Malware observing – New Plug-in (in the case of Zero-Access) Malware Analysis

Malware function 1 New function 2 New function 3

Malware function 4

→ Already used in the previous attacks ← New Plug-in ← New Plug-in → Already used in the previous attacks

Will be used near future!

Page 60: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

60

• By utilizing “darknet monitoring (black-hole monitoring)”, we could observe the following on-going threats/attacks: - Scanning behavior; - DDoS back-scatter; - Infected hosts by DAEDALUS.

• Since un-detectable attacks are apparently increasing nowadays such as targeted attacks (APT) and drive-by-download, it is getting hard to appropriately recognize specific threats and vulnerabilities by means of the existing darknet monitor tools at networks and systems.

• It is also difficult for the management of organizations, CII and Government to assess the risk which exists in their environments. Furthermore, it is necessary to be ready against new threats and/or unanticipated attacks.

• Since there are no boundaries in IT society based on the Internet, “activities for information security” should be carried out in International level. Especially, world-wide threats monitoring platform will be expected with collaboration among many countries.

Conclusion

Page 61: How to secure the network - Darknet based cyber-security ...How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research

Internet Security Days 2012

61