Top Banner
Countering Denial of Information Attacks with Network Visualization Gregory Conti www.cc.gatech.edu/~conti [email protected] p://plus.maths.org/issue23/editorial/information.jpg
60

Countering Denial of Information Attacks with Network Visualization Gregory Conti conti [email protected] .

Jan 02, 2016

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Countering Denial of Information Attacks with Network Visualization

Gregory Conti

www.cc.gatech.edu/~conti

[email protected]

http://plus.maths.org/issue23/editorial/information.jpg

Page 2: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Disclaimer

The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. 

image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm

Page 3: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Denial of Information Attacks:

Intentional Attacks that overwhelm the human or otherwise alter their decision making

http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg

Page 4: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

http://cagle.slate.msn.com/news/EvilEmailHackers/main.asp

Page 5: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

The Problem of Information Growth

• The surface WWW contains ~170TB (17xLOC) • IM generates five billion messages a day (750GB),

or 274 terabytes a year. • Email generates about 400,000 TB/year. • P2P file exchange on the Internet is growing

rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files).

http://www.sims.berkeley.edu/research/projects/how-much-info-2003/

Page 6: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Applying the Model & Taxonomy…

http://www.butterfly-insect.com/butterfly-insect/graphic/education-pic-worldlife-on.gif

Page 7: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 8: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Defense Taxonomy (Big Picture) Microsoft, AOL, Earthlink and Yahoo file 6 antispam lawsuits (Mar 04)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 9: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

System Model

Page 10: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

very small text

exploit round off algorithm

trigger many alerts

ExampleDoI

Attacks

misleadingadvertisements

spoof browser

Page 11: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

TCP Damping

UsableSecurity

Eliza Spam Responder

Decompression Bombs

ExampleDoI

Defenses

ComputationalPuzzle Solving

Page 12: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Orient

Observe

Act

Decide

Scan Subject Line

SpamDelete

Confirm DeletionSuccessful

Not Spam

No Observation

No Action

OverheadNumber of Email

x Time to Decide

OverheadNumber of Spam x Time to Delete

OverheadNumber of Spam

x Time to Observe

Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan))

OverheadNumber of Email

x Time to Scan

Page 13: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

For more information…

G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published)

email me…

Page 14: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

DoI Countermeasures in the Network Security Domain

Page 15: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

http://en.wikipedia.org/wiki/Information_visualization

Page 16: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

rumint v.51

Page 17: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .
Page 18: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

nmap 3 (RH8)

NMapWin 3 (XP)

SuperScan 3.0 (XP)

SuperScan 4.0 (XP)

nmap 3 UDP (RH8)

nmap 3.5 (XP)

scanline 1.01 (XP)

nikto 1.32 (XP)

Page 19: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

For more information… G. Conti and K. Abdullah; "

Passive Visual Fingerprinting of Network Attack Tools;" ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004.

--Talk PPT Slides

see www.cc.gatech.edu/~conti and www.rumint.org for the tool

G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004.

--Talk PPT Slides --Classical InfoVis Survey PPT Slides--Security InfoVis Survey PPT Slides

Page 20: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Last year at DEFCON

First question…

How do we attack it?

Page 21: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Malicious Visualizations…

Page 22: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Pokemon

http://www.miowebitalia.com/desktop/cartoni/pokemon.jpg

Page 23: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Visual Information Overload (perception)

Page 24: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Attack Fading(memory)

Image: http://www.inf.uct.cl/~amellado/gestion_en_linux/etherape.jpg

http://etherape.sourceforge.net/

Page 25: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Motion Induced Blindness(perception)

http://www.keck.ucsf.edu/~yoram/mib-basic.html

Page 26: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Optical Illusions (perception)

http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html

Page 27: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Crying Wolf…(cognitive/motor)

• Snot vs. Snort

Page 28: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

CDX 2003 DatasetX = TimeY = Destination IPZ = Destination Port

Labeling Attack (algorithm)

Page 29: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

AutoScale Attack/Force User to Zoom(algorithm)

Page 30: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Precision Attack(algorithm)

http://developers.slashdot.org/article.pl?sid=04/06/01/1747223&mode=thread&tid=126&tid=172

http://www.nersc.gov/nusers/security/Cube.jpg

Page 31: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Occlusion(visualization design)

Page 32: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Jamming (visualization design)

Page 33: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

For more information…

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005. (submitted, under review)

See also www.rumint.org for the tool.

email me…

Page 34: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

rumint v 1.15 beta

Page 35: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Net

wor

k pa

cket

s ov

er ti

me

Bit 0, Bit 1, Bit 2 Length of packet - 1

Page 36: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

rumint 1.15 tool overview

network monitoring mode (left), clicking the small pane brings up the detailed analysis view for that visualization.

Page 37: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

So what do you think…

Page 38: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .
Page 39: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Visual exploration of binary objects…

Page 40: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Reverse Engineering

• IDA Pro Dissassembler and Debugger

http://www.datarescue.com/idabase/

Page 41: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Textual vs. Visual Exploration

Page 42: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

binaryexplorer.exe

Page 43: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

visualexplorer.exe(visual studio)

calc.exe(unknown compiler)

rumint.exe(visual studio)

regedit.exe(unkown compiler)

Comparing Executable Binaries(1 bit per pixel)

mozillafirebird.exe(unknown compiler)

cdex.exe(unknown compiler)

apache.exe(unknown compiler)

ethereal.exe(unknown compiler)

Page 44: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

image.bmp image.zipimage.jpg image.pae(encrypted)

Comparing Image Files(1 bit per pixel)

Page 45: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

pash.mp3 disguises.mp3the.mp3

Comparing mp3 files(1 bit per pixel)

Page 46: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

secvisw/Sven Krasser, Julian Grizzard, Jeff Gribschaw and Henry Owen (Georgia Tech)

Page 47: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Overview of Visualization

age

age

pa

cke

t si

ze

pa

cke

tsi

zecolor:protocol

color:protocol

0.0.0.0

65535255.255.255.255

0

timetime now now

Page 48: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Overview of Visualization

age

age

pa

cke

t si

ze

pa

cke

tsi

ze

color:protocol

color:protocol

0.0.0.0

65535255.255.255.255

0

timetime now now

Page 49: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Overview and Detail

Page 50: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Routine Honeynet Traffic(baseline)

Page 51: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Compromised Honeypot

Page 52: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Slammer Worm

Page 53: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Constant Bitrate UDP Traffic

Page 54: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Port Sweep

Page 55: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

System Performance

Page 56: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

For more information…

S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005. (submitted)

email me…

Page 57: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Demos

• binary exploration

• rumint 1.15

• secvis

Page 58: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Questions?

Image: http://altura.speedera.net/ccimg.catalogcity.com/210000/211700/211780/Products/6203927.jpg

Gregory [email protected]/~conti

Page 59: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

Backup Slides

Page 60: Countering Denial of Information Attacks with Network Visualization Gregory Conti conti conti@acm.org .

External IP to Internal Port

6 Oct 04 13 Oct 04 20 Oct 04 27 Oct 04 30 Nov 04

One Week Snapshots One Month