Top Banner
Network Attack Visualization Greg Conti www.cc.gatech.edu/~conti
48
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Attack Visualization Greg Conti conti.

Network Attack Visualization

Greg Contiwww.cc.gatech.edu/~conti

Page 2: Network Attack Visualization Greg Conti conti.

Disclaimer

The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government. 

image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm

Page 3: Network Attack Visualization Greg Conti conti.

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

http://en.wikipedia.org/wiki/Information_visualization

Page 4: Network Attack Visualization Greg Conti conti.

An Art Survey…

http://www.artinvest2000.com/leonardo_gioconda.htmhttp://www.geocities.com/h2lee/ascii/monalisa.htmlhttp://www.muppetlabs.com/~breadbox/bf/http://www.clifford.at/cfun/progex/

A B C

Page 5: Network Attack Visualization Greg Conti conti.

• Patterns• Anomalies• Comparisons• Outliers/Extremes• Big Picture & Details• Interaction• Large Datasets

Why InfoVis?

Replies

Views

Page 6: Network Attack Visualization Greg Conti conti.

TCP Dump

Tcpdump image: http://www.bgnett.no/~giva/pcap/tcpdump.pngTCPDump can be found at http://www.tcpdump.org/

Ethereal image: http://www.linux-france.org/prj/edu/archinet/AMSI/index/images/ethereal.gifEthereal by Gerald Combs can be found at http://www.ethereal.com/

EtherApe image: http://www.solaris4you.dk/sniffersSS.htmlEtherape by Juan Toledo can be found at http://etherape.sourceforge.net/

Ethereal

EtherApe

Packet Capture Visualizations

Page 7: Network Attack Visualization Greg Conti conti.

So What?• Go Beyond the Algorithm

– Complement current systems

• Make CTF a Spectator Sport• Enhance forensic analysis

– Mine large datasets – Logs

• Monitor in real time– Allow big picture, but details on demand– Fingerprint attacks/tools (people?)– Alerts (2-3 Million /day)

• Observe attacker behavior (example)

What tasks do you need help with?

Page 8: Network Attack Visualization Greg Conti conti.

Recon

Focused Attacks

Next Wave

Des

tina

tion

IP

Time

Page 9: Network Attack Visualization Greg Conti conti.

Classical InfoVis Research

Page 10: Network Attack Visualization Greg Conti conti.

InfoVis Mantra

http://www.cs.umd.edu/~ben/

Overview First

Zoom and Filter

Details on Demand

Page 11: Network Attack Visualization Greg Conti conti.

Overview and Detail

Examples by Dr. John Stasko, see www.cc.gatech.edu/classes/AY2002/ cs7450_spring/Talks/09-overdetail.ppt for more details.

Game shown is Civilization II

Page 12: Network Attack Visualization Greg Conti conti.

Focus and Context

Examples by Dr. John Stasko, see www.cc.gatech.edu/classes/AY2001/ cs7450_fall/Talks/8-focuscontext.ppt for more details.Table lens (right) is from Xerox Parc and Inxight

Fisheye View

Table Lens

Page 13: Network Attack Visualization Greg Conti conti.

For more information…

•Courses (free)•Conferences•Systems•Research Groups

Bookmarks on CD

Page 14: Network Attack Visualization Greg Conti conti.

Example Classical InfoVis Systems

Page 15: Network Attack Visualization Greg Conti conti.

example 1 - data mountain

http://www1.cs.columbia.edu/~paley/spring03/assignments/HW3/gwc2001/mountain.jpg

Page 16: Network Attack Visualization Greg Conti conti.

example 2 - filmfinder

http://transcriptions.english.ucsb.edu/archive/colloquia/Kirshenbaum/filmfinder.gif

Page 17: Network Attack Visualization Greg Conti conti.

example 3 - parallel coordinates

A. Inselberg and B. Dimsdale. Parallel coordinates: A tool for visualizing multidimensional geometry. Proc. of Visualization '90, p. 361-78, 1990.

http://davis.wpi.edu/~xmdv/images/para.gif

MPG

35

0

Page 18: Network Attack Visualization Greg Conti conti.

example 4 -informative art

http://www.viktoria.se/fal/projects/infoart/

Page 19: Network Attack Visualization Greg Conti conti.

Many, many untapped security applications…

examples 5 - 72 (on CD)

Page 20: Network Attack Visualization Greg Conti conti.

More InformationInformation Visualization

• Envisioning Information by Tufte• The Visual Display of Quantitative Information by Tufte• Visual Explanations by Tufte• Beautiful Evidence by Tufte (due this year)• Information Visualization by Spence• Information Visualization: Using Vision to Think by Card• See also the Tufte road show, details at www.edwardtufte.com

images: www.amazon.com

Page 21: Network Attack Visualization Greg Conti conti.

Representative Security Visualization Research

Page 22: Network Attack Visualization Greg Conti conti.

Soon Tee Teoh

Routing Anomalies

http://graphics.cs.ucdavis.edu/~steoh/

See also treemap basic research: http://www.cs.umd.edu/hcil/treemap-history/index.shtml

Page 23: Network Attack Visualization Greg Conti conti.

Secure Scope

http://www.securedecisions.com/main.htm

Page 24: Network Attack Visualization Greg Conti conti.

Starlight

http://starlight.pnl.gov/

Page 25: Network Attack Visualization Greg Conti conti.

Open Source Security Information Management (OSSIM)

http://www.ossim.net/screenshots/metrics.jpg

Page 26: Network Attack Visualization Greg Conti conti.

TCP/IP SequenceNumber Generation

Initial paper - http://razor.bindview.com/publish/papers/tcpseq/print.htmlFollow-up paper - http://lcamtuf.coredump.cx/newtcp/

Linux 2.2 TCP/IP sequence numbers are not as good as they might be, but are certainly adequate, and attack feasibility is very low. Linux 2.2 TCP/IP sequence numbers are not as good as they might be, but are certainly adequate, and attack feasibility is very low.

Michal Zalewski

x[n] = s[n-2] - s[n-3] y[n] = s[n-1] - s[n-2] z[n] = s[n] - s [n-1]

x[n] = s[n-2] - s[n-3]

y[n] = s[n-1] - s[n-2]

z[n] = s[n] - s [n-1]

Page 27: Network Attack Visualization Greg Conti conti.

Wireless Visualization

http://www.ittc.ku.edu/wlan/images_all_small.shtml

Page 28: Network Attack Visualization Greg Conti conti.

Observing Intruder Behavior

Dr. Rob Erbacher

– Visual Summarizing and Analysis Techniques for Intrusion Data

– Multi-Dimensional Data Visualization

– A Component-Based Event-Driven Interactive Visualization Software Architecture

http://otherland.cs.usu.edu/~erbacher/

Page 29: Network Attack Visualization Greg Conti conti.

http://otherland.cs.usu.edu/~erbacher/

Glyphs

Dr. Rob Erbacher

Page 30: Network Attack Visualization Greg Conti conti.

examples 9 - 45(to be posted)

Page 31: Network Attack Visualization Greg Conti conti.

Hot Research Areas…• visualizing vulnerabilities • visualizing IDS alarms (NIDS/HIDS) • visualizing worm/virus propagation • visualizing routing anamolies • visualizing large volume computer network logs • visual correlations of security events • visualizing network traffic for security • visualizing attacks in near-real-time • security visualization at line speeds • dynamic attack tree creation (graphic) • forensic visualization

http://www.cs.fit.edu/~pkc/vizdmsec04/

Page 32: Network Attack Visualization Greg Conti conti.

More Hot Research Areas…

• feature selection and construction • incremental/online learning • noise in the data • skewed data distribution • distributed mining • correlating multiple models • efficient processing of large amounts of data • correlating alerts • signature and anomaly detection • forensic analysis

http://www.cs.fit.edu/~pkc/vizdmsec04/

Page 33: Network Attack Visualization Greg Conti conti.

Building a System

Page 34: Network Attack Visualization Greg Conti conti.

Visual IDS

Page 35: Network Attack Visualization Greg Conti conti.

Ethernet

Packet Capture

Parse

Process

Plot

tcpdump(pcap, snort)

Perl

Perl

xmgrace(gnuplot)

tcpdumpcapturefiles

winpcap

VB

VB

VB

System Architecture

Creativity

Page 36: Network Attack Visualization Greg Conti conti.

rumint tool components (CD)

Page 37: Network Attack Visualization Greg Conti conti.
Page 38: Network Attack Visualization Greg Conti conti.

External Port Internal Port

65,535 65,535

0 0

External IP Internal IP

255.255.255.255 255.255.255.255

0.0.0.0 0.0.0.0

External IP Internal Port

255.255.255.255 65,535

0.0.0.0 0

parallel port views

Page 39: Network Attack Visualization Greg Conti conti.

External IP External Port Internal Port Internal IP

255.255.255.255 65,535 65,535 255.255.255.255

0.0.0.0 0 0 0.0.0.0

Also a Port to IP to IP to Port View

Page 40: Network Attack Visualization Greg Conti conti.

sara 5.0.3 (port to port view)

Light Medium Heavy

Page 41: Network Attack Visualization Greg Conti conti.

nmap 3 (RH8)

NMapWin 3 (XP)

SuperScan 3.0 (XP)

SuperScan 4.0 (XP)

nmap 3 UDP (RH8)

nmap 3.5 (XP)

scanline 1.01 (XP)

nikto 1.32 (XP)

Tool Fingerprinting(port to port view)

Page 42: Network Attack Visualization Greg Conti conti.

time sequence data(external port vs. packet)

nmap win superscan 3

port

s

port

spackets packets

Also internal/external IP and internal port

Page 43: Network Attack Visualization Greg Conti conti.

packet length and protocol type over time

port

s

packe

tslength

Page 44: Network Attack Visualization Greg Conti conti.

30 days on the Georgia Tech honeynet

External IP Internal Port External Port Internal Port

Page 45: Network Attack Visualization Greg Conti conti.

Demo’s

rumintxmgracetreemapworm propagationsurvey x 2 .pptlinks

Page 46: Network Attack Visualization Greg Conti conti.

classic infovis survey(on CD)

security infovis survey(www.cc.gatech.edu/~conti)

perl/linux/xmgrace demo(on CD)

rumint tool(on CD)

bookmarks(on CD)

this talk(on CD & www.cc.gatech.edu/~conti)

Page 47: Network Attack Visualization Greg Conti conti.

Acknowledgements• 404.se2600

– Clint– Hendrick– icer– Rockit– StricK

• Dr. John Stasko– http://www.cc.gatech.edu/~john.stasko/

• Dr. Wenke Lee– http://www.cc.gatech.edu/~wenke/

• Dr. John Levine– http://www.eecs.usma.edu/

• Julian Grizzard– http://www.ece.gatech.edu/

Page 48: Network Attack Visualization Greg Conti conti.

Questions?http://carcino.gen.nz/images/index.php/04980e0b/53c55ca5