a framework for packe trace manipulation

19
[email protected] A Framework for Packe Trace Manipulation Christian Kreibich

Upload: ruana

Post on 19-Mar-2016

32 views

Category:

Documents


3 download

DESCRIPTION

A Framework for Packe Trace Manipulation. Christian Kreibich. Motivation. Say you need to solve a problem that involves manipulating network traffic: complex filtering (e.g. data analysis) fine-grained editing (e.g. header field bitflips) large-scale editing (e.g. anonymization) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Framework for Packe Trace Manipulation

[email protected]

A Framework for Packe Trace Manipulation

Christian Kreibich

Page 2: A Framework for Packe Trace Manipulation

Motivation Say you need to solve a problem that involves

manipulating network traffic:complex filtering (e.g. data analysis) fine-grained editing (e.g. header field bitflips) large-scale editing (e.g. anonymization)visualization (e.g. behavioural analysis)

What do you do?

Page 3: A Framework for Packe Trace Manipulation

Motivation II Find a tool that does it

where? does it build? maintained? If so, lucky you!

Page 4: A Framework for Packe Trace Manipulation

Motivation II Find a tool that does it

where? does it build? maintained? If so, lucky you!

Mhmm ... invent here ... again.Okay, pcap.Now you typically need infrastructure:

data types conn. state tracking protocol header lookup

Lots of duplicated effortCut’n’paste is bad

Page 5: A Framework for Packe Trace Manipulation

Motivation III Current practice:

Page 6: A Framework for Packe Trace Manipulation

Introducing ... Netdude — NETwork DUmp Data Editor Framework for packet inspection and manipulation Multiple usage paradigms: GUI + command line Scalable to arbitrary trace sizes Reusable at all levels Extensible

Page 7: A Framework for Packe Trace Manipulation

Architecture

Page 8: A Framework for Packe Trace Manipulation

Architecture

Page 9: A Framework for Packe Trace Manipulation

Architecture

Page 10: A Framework for Packe Trace Manipulation

Architecture

Page 11: A Framework for Packe Trace Manipulation

Architecture

Page 12: A Framework for Packe Trace Manipulation

Experience Fine-grained header field modifications:

M. Handley, C. Kreibich, V. Paxson: Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics, 9th USENIX Security Symposium, 2001

Large-scale filtering and reassembly: A. Moore, J. Hall, C. Kreibich, E. Harris, I. Pratt: Architecture of a

Network Monitor, PAM Workshop, 2003

Fine-grained payload editing: C. Kreibich, J. Crowcroft: Honeycomb - Creating Intrusion

Detection Signatures Using Honeypots, HotNets II, 2003

Page 13: A Framework for Packe Trace Manipulation

Future Work

Perceived length (normalized)

Vis

ual i

nter

pret

atio

n

Progress Chart

0 1

Page 14: A Framework for Packe Trace Manipulation

Future Work

Perceived length (normalized)

Vis

ual i

nter

pret

atio

n

Progress Chart

0 1

Page 15: A Framework for Packe Trace Manipulation

Future Work

Perceived length (normalized)

Vis

ual i

nter

pret

atio

n

Progress Chart

0 1

Page 16: A Framework for Packe Trace Manipulation

Future Work

Lots to do:Packet resizing Less coding Scriptability

Perceived length (normalized)

Vis

ual i

nter

pret

atio

n

Progress Chart

0 1

Page 17: A Framework for Packe Trace Manipulation

Don’t get me wrong ...

I

Page 18: A Framework for Packe Trace Manipulation

Summary System detects patterns in network traffic Using honeypots, the system can create useful

signatures Good at worm detection Todo list

Ability to control LCS algorithm (whitelisting?)Tests with higher traffic volumeExperiment with approximate matchingBetter signature reporting scheme

Page 19: A Framework for Packe Trace Manipulation

Thanks!

Shoutouts to all contributors! Debian packagers needed ... Questions?