lateral movement detection - assured cloud...

27
Lateral Movement Detection Using Distributed Data Fusion Atul Bohara PI: William H. Sanders ACC Seminar, Sep. 28, 2016 Citation: Lateral Movement Detection Using Distributed Data Fusion. Ahmed Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders. In Proceedings of 35th Symposium on Reliable Distributed Systems (SRDS 2016). Slide Credits: some slides are taken from the presentation made at SRDS 2016 by Ahmed Fawaz

Upload: others

Post on 21-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement Detection Using Distributed Data Fusion

Atul BoharaPI: William H. Sanders

ACC Seminar, Sep. 28, 2016

Citation: Lateral Movement Detection Using Distributed Data Fusion. Ahmed Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders. In Proceedings of 35th Symposium on Reliable Distributed Systems (SRDS 2016).

Slide Credits: some slides are taken from the presentation made at SRDS 2016 by Ahmed Fawaz

Page 2: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Introduction

Intrusion resilience• Monitor the operation of system• Detect intrusions• Take response actions

Volume of information that is required to construct a system-wide state can grow rapidly

Long-lasting targeted attacks pose more scalability challenges

Presenter
Presentation Notes
With the growing size and complexity of modern systems, it has become practically impossible to prevent all the intrusions. Intrusion resiliency provides second layer of defense by detecting intrusions and controlling the effect of these intrusions on the system while maintaining system service
Page 3: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Contributions

• A distributed data fusion framework for system resiliency.

• An agent-based monitoring and fusion mechanisms to detect lateral movement behavior in an enterprise system.

• A host-level monitor to infer connection causation relations.

3

Presenter
Presentation Notes
1. Since the first task for intrusion resilience is to estimate system state via the observations recorded by monitors, it is essential to combine the information recorded at various places in the system. This is not a new claim, but what’s new is to formally specify the different requirements of such fusion. Essentially it is a distributed processing architecture to collect and combine information of interest. 2. To show the utility of the fusion framework in practice, we specify a mechanism to detect lateral movement behavior in a system. Lateral movement detection being important and hard we use the framework as a formal way to do it. I will explain the details later in the presentation, but in short -We establish causation with high confidence (using process events) -Load is distributed by clustering nodes in groups We perform a trace-based simulation experiment to evaluate the lateral movement detection approach in terms of scalability, fairness of distributed processing, and quality of local states at higher-level agents 3. We use DTrace on an OS X machine to implement a prototype host-level data collection and processing agent, and we evaluate its overhead
Page 4: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Distributed Data Fusion Framework

We propose a fusion framework, , where:

4

A graph of agents

Local transformation function

Fusion transformation function

A set of temporal propositions

Presenter
Presentation Notes
Data fusion is defined as the process to combine data originating from different sources to obtain information of greater quality Data fusion is required for system resiliency to generate a holistic view of system state
Page 5: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Fusion Graph

55

1 45

6 732

A graph where the edges between the agents represent communication channels

8 9 10

Page 6: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Local Transformation

66

1 732

A function f to estimate local state

Page 7: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Fusion Transformation

77

1 32

A function g that fuses and abstracts local data and received data

4

Page 8: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Temporal Propositions

88

1 32

A temporal proposition defines trigger events

4 10

Page 9: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement DetectionA Case Study

9

Page 10: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Stages of Advanced Persistent Threat (APT) Attacks

Recon

• Port Scans• Vulnerability

Scans

Initial Entry

• Phishing Attacks

• Zero-days

Establish C&C

• Execute Remote commands

• Meterpreter

Lateral Movement

• Use local services

Identify Targets

• Methods to exploit

Actions on Target

• Data Exfiltration

• Target Asset

10

Source: http://www.trendmicro.com/vinfo/us/threat-encyclopedia/web-attack/3142/carbanak-targeted-attack-campaign-hits-banks-and-financial-institutions

Presenter
Presentation Notes
Be brief goal is to detect and respond. To respond and detect we need to be able to observe Command & control not communication
Page 11: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement Explained

• Starting from the entry point attacker moves to target host• Uses system services or custom tools

11

Entry Point

Host 1

Host 2

Host 3

Host 4

Host 5

Target Host

Page 12: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

In the NewsPersistence, stealthiness, and lateral movement

Presenter
Presentation Notes
Office of personal management attack, 2015 Target 2013 Stuxnet 2009 Ukrain
Page 13: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Motivation

Lateral movement detection is challenging• Need to estimate system-wide state• Information overhead• Attacker uses legitimate network services• Requires a global clock

Lateral movement detection enables proactive prevention and response before the actual damage (e.g., data exfiltration)

13

Presenter
Presentation Notes
-Be explicit about the state of the art (it is bad) -methods require a global clock for aggregation -We do not want to use a specific port or timing we want a generic way to detect
Page 14: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement Detection Overview

14

Presenter
Presentation Notes
The host-level agents collect process information from the kernel and infer causation relationships between incoming and outgoing network connections A causation relation implies that there is a dependency between the incoming and outgoing connections. Use of kernel-level information allows us to infer the connection causations more accurately than we could by just using timing information or port numbers The higher- level cluster agents use abstracted data from host-level agents and construct a graph of lateral movement Finally, the global agent uses the information from the cluster agents to generate a global view of lateral movement in the system
Page 15: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

System Model

15

Cluster 1Cluster 2

Presenter
Presentation Notes
The clusters are leader kind of clusters. The hierarchy is because of the way the information abstracts Agents are on machines, the leader are part of the machines them selves (just different roles) THIS IS ENTERPRISE and it can be used in other places Cluster 3
Page 16: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement

16

13

4

562

Entry Point

Host 1

Host 2

Host 3

Host 4

Host 5

Target Host

C1C2

A critical step during APT to move from the entry point to target host

L2 L1

GL

Page 17: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Inside Host 1

17

Local agent infers connection causation using the Process Communication Graph

Collect timestamped events of:• Processes running• Process communication (pipes, messages,…)• Network connections• File access

The agent creates a timed directed graph of communication between processes

Causation is inferred via a path between incoming and outgoing connections

Presenter
Presentation Notes
Talk about the types of collected events
Page 18: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Inside Host 1

18

Connection 1 (C1)Connection 2 (C2)

P1P4

P3

T=0

(Fork)T=1

Write fileT=2

Start app using imageT=3

T=4

Local agent infers connection causation using the Process Communication Graph

Presenter
Presentation Notes
Talk about the types of collected events
Page 19: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Inside Host 1

19

Local agent infers connection causation using the Process Communication Graph

Connection 1 (C1)Connection 2 (C2)

T=0T=4 Caused

C1 ▷ C2 ⇒ t(C1)<t(C2)

Page 20: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement

20

13

4

56

GL

L1L2

Entry Point

Host 1

Host 2

Host 3

Host 4

Host 5

Target Host

A critical step during APT to move from the entry point to target host

C1C2

C1 ▷ C2

C3C42

C2 ▷ C3

C3 ▷ C4

Page 21: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Inside Cluster Leader 1

21

C1 ▷ C2

C2 ▷ C3

C3 ▷ C4

Cluster head maintains Host Communication Graph

Host 1

Host 2

Host 3Host 4

Incoming Causation Events:

Agents do not need to synchronize clocksC1 ▷ C2 ▷ C3 ▷ C4

⇒ t(C1)<t(C2)<t(C3)<t(C4)

Page 22: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Lateral Movement

22

13

4

56

Entry Point

Host 1

Host 2

Host 3

Host 4

Host 5

Target Host

A critical step during APT to move from the entry point to target host

C1C2

C1 ▷ C2

C3C4C5

C62

C2 ▷ C3

C3 ▷ C4

C4 ▷ C5 C5 ▷ C6

Cluster1 ▷ C4 Cluster2 ▷ C6

L2 L1

GL

Presenter
Presentation Notes
Make the abstracted event boldface
Page 23: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Discussion

23

13

4

56

Entry Point

Host 1

Host 2

Host 3

Host 4

Host 5

Target Host

A critical step during APT to move from the entry point to target host

C1C2

C1 ▷ C2

C3C4C5

C62

C2 ▷ C3

C3 ▷ C4

C4 ▷ C5 C5 ▷ C6

Cluster1 ▷ C4 Cluster2 ▷ C6

L2 L1

GL

The load of system-wide lateral movement chain collection is distributed over all agents

The method can fuse all process level information without overloading a single monitoring server

Presenter
Presentation Notes
Make the abstracted event boldface
Page 24: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Results

• Simulation-based evaluation• Evaluated storage and processing overhead, fairness of resource

consumption, and quality of local state• Clustering improves the scalability• Better fairness and quality can be achieved through topology-aware clustering

of hosts

• Implemented a prototype of host-level process monitor• Using DTrace on OS X• Overhead is manageable

Presenter
Presentation Notes
System model, attacker model
Page 25: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Conclusion

The data fusion framework is a generalized method for fusing monitoring information

Hierarchical fusion framework distributes the fusion loads across the network

Process communication at the host-level infers connection relations

Detection of malicious chains is not investigated• Work provides a needed step towards the goal

25Lateral Movement Detection Using Distributed Data Fusion. Ahmed Fawaz, Atul Bohara, Carmen Cheh, William H. Sanders. In Proceedings of 35th Symposium on Reliable Distributed Systems (SRDS 2016).

Presenter
Presentation Notes
How can the framework be used?? Moving data Conclude on a high note saying that we did really well and there is enormous opportunity of doing more such as lateral movement response paper, and other future work
Page 26: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

BACKUP SLIDES

26

Page 27: Lateral Movement Detection - Assured Cloud Computingassured-cloud-computing.illinois.edu/files/2016/10/... · 2016-10-03 · Lateral Movement Detection Using Distributed Data Fusion

Image Sources

• Ukrain: http://thehackernews.com/2016/01/Ukraine-power-system-hacked.html

• Target: https://securityledger.com/2015/12/target-agrees-to-pay-39m-to-banks-for-data-breach-reuters/

• OPM: http://thehackernews.com/2015/09/opm-hack-fingerprint.html

• Stuxnet: http://www.mapsofworld.com/around-the-world/recent-hacking-incidents.html