regional botnet detection - merit

19
Regional Botn Michae Jake Czyz Michae Research University o NANOG 49 – Sa Securit 2010- Jake Czyz Research Engineer Merit Network Dave Dittrich Senior Security Engineer APL - University of Washington net Detection el Bailey Manish Karir el Bailey h Faculty of Michigan an Francisco, CA ty BOF -06-14 Manish Karir Director of Research Merit Network Michael K. Hamilton Chief Information Security Officer City of Seattle

Upload: others

Post on 03-May-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Regional Botnet Detection - Merit

Regional Botnet Detection

Michael BaileyJake Czyz Michael BaileyResearch Faculty

University of Michigan

NANOG 49 – San Francisco, CASecurity BOF2010-

Jake CzyzResearch Engineer

Merit Network

Dave DittrichSenior Security Engineer

APL - University of Washington

Regional Botnet Detection

Michael Bailey Manish KarirMichael BaileyResearch Faculty

University of Michigan

San Francisco, CASecurity BOF

-06-14

Manish KarirDirector of Research

Merit Network

Michael K. HamiltonChief Information Security Officer

City of Seattle

Page 2: Regional Botnet Detection - Merit

Agenda

� Motivation & Vision

� PRISEM

� A Botnet Detection System

Ongoing and Future Work� Ongoing and Future Work

� Conclusion

Regional Botnet Detection | 2010

Agenda

A Botnet Detection System

Ongoing and Future WorkOngoing and Future Work

2Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 3: Regional Botnet Detection - Merit

Criticality of Local Government

• Federal gov’t wants resilience

• vs. OLD message of “preventing terrorism”

• Effective first response is key to resilience

• Local government

• Is first responder, last to leave scene in any disruption• Is first responder, last to leave scene in any disruption

• Is where 100% of critical infrastructure is deployed

• Infosec controls neither prioritized nor regulated

• But, all response services are enabled by IT

• Thus, we have a problem that requires immediate attention

Regional Botnet Detection | 2010

Criticality of Local Government

resilience from all hazards

vs. OLD message of “preventing terrorism”

Effective first response is key to resilience

Is first responder, last to leave scene in any disruptionIs first responder, last to leave scene in any disruption

Is where 100% of critical infrastructure is deployed

controls neither prioritized nor regulated

But, all response services are enabled by IT

Thus, we have a problem that requires immediate

3Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 4: Regional Botnet Detection - Merit

Grand Challenges for State/Local Government Cybersecurity

• Antiquated technology and methods (socioproblem set, not just technical)

• Under-resourced and overwhelmed

• Small regional networks often lack the security expertise necessary to take action on the information

• Metropolitan areas need a “block

• Key challenges:

• Balancing privacy rights concerns with gathering & sharing quality cybercrime intelligence

• Current information sharing methods (phone calls, bulletins, ISACs, portals, notification systems, etc.) fall short (don’t scale, reactive, no aggregation, no situational awareness, classification system sometimes a hindrance)

Regional Botnet Detection | 2010

Grand Challenges for State/Local Government Cybersecurity

Antiquated technology and methods (socio-technical problem set, not just technical)

resourced and overwhelmed

Small regional networks often lack the security expertise necessary to take action on the information

Metropolitan areas need a “block-watch” model

concerns with gathering & sharing quality cybercrime intelligence

Current information sharing methods (phone calls, , portals, notification systems, etc.) fall

short (don’t scale, reactive, no aggregation, no situational awareness, classification system sometimes a hindrance)

4Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 5: Regional Botnet Detection - Merit

DHS S&T STATE & LOCAL Botnet Technology Transfer

Program: DHS S&T RTAP CS 1 - Botnet Detection and

Goal: Transition US-CERT technology to local and state governments through the Public Regional Information Security Event Management (PRISEM) project

• Enhance the information security and compliance

• Provide a method for reporting cyber-security event and trend information• Provide a method for reporting cyber-security event and trend informationparticipants, and the intelligence and law

• Create an operational setting for the deployment of research

Regional Botnet Detection | 2010

STATE & LOCAL Government Botnet Technology Transfer

Botnet Detection and Mitigation – Phase 2

CERT technology to local and state governments Public Regional Information Security Event Management

Enhance the information security and compliance status of participant agencies

security event and trend information to security event and trend information to participants, and the intelligence and law-enforcement communities

deployment of research-grade technologies

5Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 6: Regional Botnet Detection - Merit

Visions• A paradigm for local government security information and action sharing – one also applicable to small ISPs and other resource-constrained networks

• Pilot underway involving the University of Washington, City of Seattle, and other local governments

• Testing processes and agreements to share intelligence while guarding privacy

• A Community and toolset enabling less

Regional Botnet Detection | 2010

• A Community and toolset enabling lessfederated security monitoring:

• Repository and community around set of openfree modular tools for botnet detection

• http://www.botnets.org

• Seeded with an initial set of detectors developed by the University of Michigan and Merit, funded by DHS under PRISEM (the “Botnets System”)

VisionsA paradigm for local government security information

one also applicable to small ISPs constrained networks

Pilot underway involving the University of Washington, City of Seattle, and other local governments

Testing processes and agreements to share infosecintelligence while guarding privacy

and toolset enabling less-expensive

6Regional Botnet Detection | 2010-06-14 | Jake Czyz

and toolset enabling less-expensive federated security monitoring:

Repository and community around set of open-source tools for botnet detection

Seeded with an initial set of detectors developed by the University of Michigan and Merit, funded by DHS under PRISEM (the “Botnets System”)

Page 7: Regional Botnet Detection - Merit

Privacy and Other ConcernsPRISEM Pilot Attempts to Address

• These issues have been a serious obstacle similar security info sharing efforts in the past

• Participant-driven governance

• Data retention/destruction fixed by state • Data retention/destruction fixed by state requirements

• Formal data-sharing agreement

• Notice of privacy practices (we don't want your user data!)

• Data access protocols and security controls

Regional Botnet Detection | 2010

Privacy and Other ConcernsPRISEM Pilot Attempts to Address

have been a serious obstacle to similar security info sharing efforts in the past

driven governance

Data retention/destruction fixed by state Data retention/destruction fixed by state

sharing agreement

Notice of privacy practices (we don't want your

Data access protocols and security controls

7Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 8: Regional Botnet Detection - Merit

Initial Toolset Overview (the Botnets System)

� Python-based software that implements several standalone malicious network traffic detectors

� Able to detect suspicious traffic related to botnets or other anomalous netflow and syslog streams

Regional Botnet Detection | 2010

netflow and syslog streams

� Passive

� Scalable

� Flexible & Hackable (well

� Free (as in both beer and

Initial Toolset Overview (the Botnets System)

software that implements several standalone malicious network traffic detectors

to detect suspicious traffic related to botnets or other anomalous activity as seen in netflow and syslog streams

8Regional Botnet Detection | 2010-06-14 | Jake Czyz

netflow and syslog streams

(well-documented, OOP)

and freedom)

Page 9: Regional Botnet Detection - Merit

System Diagram Goes HereSystem Diagram Goes Here

Page 10: Regional Botnet Detection - Merit

Current Detectors

Detector

Blacklist (and shadow, cymru, bogon, darknet derivatives)

Initialized with one or more blacklist or specific IP/prefix; detects traffic destined to addresses in blacklist; Can also help build list of all active IPs on a network

DNS Reports DNS queries to blacklisted domains (receives syslog from resolvers)

Port Scan Alerts when more than threshold connections to wellin threshold seconds by a single source

Syn Flood Alerts when too many destination

Regional Botnet Detection | 2010

destination

SMTP Spam Flags SMTP server

Service/Server Flags server services (well known ports) or traffic volume indicative of likely server

IRC Reports traffic destined to one of the several welllikely innocuous traffic

Feature Alerts when a flow matching src/dest ip, src/dest

Current Detectors

Purpose/Features

Initialized with one or more blacklist or specific IP/prefix; detects traffic destined to addresses in blacklist; Can also help build list of all active IPs on a network

Reports DNS queries to blacklisted domains (receives syslog from resolvers)

Alerts when more than threshold connections to well-known ports are attempted in threshold seconds by a single source

Alerts when too many syns are seen within threshold time window to the same

10Regional Botnet Detection | 2010-06-14 | Jake Czyz

Flags SMTP server-like behavior, often indicating a compromised host

Flags server services (well known ports) or traffic volume indicative of likely

Reports traffic destined to one of the several well-known IRC ports; ignores likely innocuous traffic

Alerts when a flow matching commandline-specified features is detected (e.g. src/dest port, protocol, packet count)

Page 11: Regional Botnet Detection - Merit

Zenoss: a Poor

Regional Botnet Detection | 2010

Zenoss: a Poor-Man’s SEM

11Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 12: Regional Botnet Detection - Merit

Zenoss: a Poor

Regional Botnet Detection | 2010

Zenoss: a Poor-Man’s SEM

12Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 13: Regional Botnet Detection - Merit

Ongoing and Future

� Botnets System (detectors) pilot in progress: Validation by having alerts investigated by actual Merit customer, Davenport University

� Incorporate pilot and user feedback

Evaluation with other SEM (e.g.

Regional Botnet Detection | 2010

� Evaluation with other SEM (e.g.

� Enhance current & create additional detectors

� Build a community around core toolset and a repository for maintained open source detectors

Ongoing and Future Work

Botnets System (detectors) pilot in progress: Sys. Validation by having alerts investigated by actual

customer, Davenport University

Incorporate pilot and user feedback

Evaluation with other SEM (e.g. Alienvault OSSIM)

13Regional Botnet Detection | 2010-06-14 | Jake Czyz

Evaluation with other SEM (e.g. Alienvault OSSIM)

Enhance current & create additional detectors

Build a community around core toolset and a repository for maintained open source detectors

Page 14: Regional Botnet Detection - Merit

Conclusion: The Trickle Down Effect

• Trickling down NSP-SEC sorts of activities to lower regional and local communities is a challenge

• Sharing and coordinating with peers is only one aspect of the problem, we need to ensure diffusion of both expertise as well as condensed knowledge and alerts to all layers

• State/Regional government structures and issues are similar in • State/Regional government structures and issues are similar in nature to the relationship between service providers and customers as well as regional networks and campuses or even a campus and its departments

• Our goal is to create a co-operative environment where groups can share some basic tools, architectures, and knowledgemake it easier to implement a minimal set of current best practices

Regional Botnet Detection | 2010

Conclusion: The Trickle Down Effect

SEC sorts of activities to lower regional and local communities is a challenge

Sharing and coordinating with peers is only one aspect of the problem, we need to ensure diffusion of both expertise as well as condensed knowledge and alerts to all layers

State/Regional government structures and issues are similar in State/Regional government structures and issues are similar in nature to the relationship between service providers and customers as well as regional networks and campuses or even a

operative environment where groups can share some basic tools, architectures, and knowledge to make it easier to implement a minimal set of current best

14Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 15: Regional Botnet Detection - Merit

Thank You!

Other Feedback andand

Questions

Thank You!

Other Feedback and

15

andQuestions

Page 16: Regional Botnet Detection - Merit

Backup SlidesBackup Slides

Regional Botnet Detection | 2010

Backup SlidesBackup Slides

16Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 17: Regional Botnet Detection - Merit

City/Regional Information Sharing

• How it’s done today:

• Phone calls and personal relationships

• Online Publications / Blogs and Sites / DHS Daily

• Portals, ISACs, and more portals; Vendor reports

• National, State, Regional Notification Systems• National, State, Regional Notification Systems

• Problems with this way:

• Personal relationships do not scale; reactive

• One-way communication, not inter

• No summary/aggregate; no situational awareness

• Classification system sometimes a hindrance

Regional Botnet Detection | 2010

City/Regional Information Sharing

Phone calls and personal relationships

Online Publications / Blogs and Sites / DHS Daily

, and more portals; Vendor reports

National, State, Regional Notification SystemsNational, State, Regional Notification Systems

Problems with this way:

Personal relationships do not scale; reactive

way communication, not inter-sector

No summary/aggregate; no situational awareness

Classification system sometimes a hindrance

17Regional Botnet Detection | 2010-06-14 | Jake Czyz

Page 18: Regional Botnet Detection - Merit

Initial Toolset � Python 2.6 : Rapid development, readable, maintainable

� Standard python distutils packaging/installation system

� Object-oriented design for better code reuse and quicker detector writing; highly-commented code

� Main Code components:

Collectors: netflow5, ascii (csv), syslog

Regional Botnet Detection | 2010

� Collectors: netflow5, ascii (csv), syslog

� BotnetsDetector Superclass:

� Implements common core features, including: option parsing, history/purge/email, network naming, etc.

� Subclasses: IrcDetector, Server…,

� Network operator friendly features

� Runs on Linux (tested on CentOS and Ubuntu)

Initial Toolset Architecture2.6 : Rapid development, readable, maintainable

packaging/installation system

oriented design for better code reuse and quicker commented code

), syslog

18Regional Botnet Detection | 2010-06-14 | Jake Czyz

), syslog

features, including: option parsing, whitelisting, history/purge/email, network naming, etc.

Server…, Portscan…, SynFlood…, etc.

Network operator friendly features

Runs on Linux (tested on CentOS and Ubuntu)

Page 19: Regional Botnet Detection - Merit

Glossary

• DHS – Department of Homeland Security

• DHS S&T RTAP CS – DHS Science and Technology Rapid Technology Adaptation Program: Cyber Security

• ISAC – Information Sharing and Analysis Center

• OSSIM – Open Source Security Information Management (by

• PRISEM – Public Regional Information Security Event Management

• SEM – Security Event Management

• SIEM – Security Information and Event Management

Regional Botnet Detection | 2010

Glossary

Department of Homeland Security

DHS Science and Technology Rapid Technology

Information Sharing and Analysis Center

Open Source Security Information Management (by Alienvault)

Public Regional Information Security Event Management

Security Information and Event Management

19Regional Botnet Detection | 2010-06-14 | Jake Czyz