Top Banner
CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)
12

CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

CS-495 Advanced NetworkingJ. Scott Miller, Spring 2005

Against Internet Intrusions (paper)

Page 2: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

2CS-495 Advanced Networking

Plan of Attack

Introduction

Data Collection

Data Analysis– Data as over-generalized– Response to data as flimsy– Projections as too simplistic– Final analysis shoddy

Page 3: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

3CS-495 Advanced Networking

Introduction

As we’ve already heard, this paper has a lot of data!

Unfortunately, the analysis provided does not match the depth of information collected– Few meaningful conclusions are drawn– Analysis is very simplistic and preliminary– Future work is suggested once

Page 4: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

4CS-495 Advanced Networking

Data Collection

Firewall logs from across the world– 1600 different locations– Collected over four months

Sounds good, but…– No information given regarding the subnets these

firewalls protect, such as size and composition (this become important later)

– Logs lack IP header and connection information

Page 5: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

5CS-495 Advanced Networking

Data as Over-Generalized

Data is placed into two very large groups– Worms– Non-worms

But behavior of each intruder is specialized– Code Red I exhibits strong day-of-the-month

characteristics whereas Code Red II does not– Global characteristics inferred are therefore very

dependant on the worm in question– Same for non-worms

Page 6: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

6CS-495 Advanced Networking

Data as Over-Generalized (cont.)

What does this mean?– Analysis of persistence is biased toward the

worms considered• Code Red I is memory resident while II is not

– Periodicity is skewed by varied behavior• While it’s neat to see traffic spike during the Code Red I

spread phase, it is not necessary telling

One more thing…– Not clear if the firewalls catch intra-subnet traffic,

important for some worms

Page 7: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

7CS-495 Advanced Networking

Response to Data

Analysis of top sources– Focus limited to non-worm sources– Author’s find a very Zipf-like distribution

Page 8: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

8CS-495 Advanced Networking

Response to Data (cont.)

So author’s suggest…– “… blacklisting worst offenders would be an

effective mechanism defending against non-port 80 intrusions.”

Unfortunately, this is ineffective because of the long tail distribution– A few nodes are making a large number of attacks– Many are making a small number of attacks and not

all IPs in that group can be banned– No information is given on how many intrusions

would still remain

Page 9: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

9CS-495 Advanced Networking

Projections

The limited data set is extrapolated to give an idea of the amount of intrusions Internet-wide– Calculated by taking the average intrusions per IP

and multiplying that by the IP space– “We assume uniformity, but do not test for it. That

is, we assume that since our set of provider networks are reasonably well distributed … our perspective reflects what is seen over the general internet.”

Sound naïve?

Page 10: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

10CS-495 Advanced Networking

Projections (cont.)

It is!– Simply stating that you did not test for uniformity

does not make it ok to ignore it!

A number of other factors are ignored in this assumption:– Intra-subnet traffic missed by the router– Traffic behind a NAT– Unassigned IP addresses

Without regard to these factors, 25 billion scans a day is arbitrary

Page 11: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

11CS-495 Advanced Networking

Final Analysis

Finally, the author’s take a look at how many subnets is adequate to determine “worst offenders” (top) and target ports (bottom)Data appears erratic still – is it possible that this data does not fit that model?Only mentions the data should be “relatively stable”

Page 12: CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)

12CS-495 Advanced Networking

Moving on to My Opponent…