210 likes | 350 Views
Security System for KOREN/APII-Testbed. Sungkwan Youm Korea Univ. Research Goal. Deploy attack defense system to KOREN for improving security Yearly Plan 2003 : Security system design and algorithm proposal Proposal of dynamic and adaptive detecting algorithm
E N D
Security System for KOREN/APII-Testbed Sungkwan Youm Korea Univ. A Study of TE for KOREN/APII-Testbed
Research Goal • Deploy attack defense system to KOREN for improving security • Yearly Plan • 2003 : Security system design and algorithm proposal • Proposal of dynamic and adaptive detecting algorithm • Design system which detects and defends attack • Implementation of signature detector • 2004 : Implementation of system and deployment of KOREN • Implementation of dynamic detecting component • Implementation of agent, manager A Study of TE for KOREN/APII-Testbed
System Architecture Server Filtering Manager AGENT Security DB To another agent Libcap Signature Detector Visualization NetFlow Flow isolation Anomaly Detector Elementary classification attack Adaptive classification A Study of TE for KOREN/APII-Testbed
Another Network Agent Agent Agent Agent Agent Configuration for Security Agent Detecting KOREN Protected Server Filtering Filtering attack Filtering Filtering attack User A Study of TE for KOREN/APII-Testbed
Signature Detector Seoul • Using Snort • Perform as NIDS • Optimize RuleSet • Deployed in Suwon, Deajeon Seoul XP Suwon Snort Server Daegu Snort Server Daejeon Busan Kwangju A Study of TE for KOREN/APII-Testbed
Signature Detector Detection Results • Alert List A Study of TE for KOREN/APII-Testbed
Anomaly Detection Algorithm • Entropy • Measure randomness of packet attribute (ex. Source address) • Maintain average of entropy • Detect attack with threshold setting • Chi-square test • Measure distribution of attribute • Use anomaly detection of various packet attributes A Study of TE for KOREN/APII-Testbed
Incoming traffic (attack and normal packets) Incoming traffic (attack and normal packets) Suspicious Signature Malicious Signature Suspicious Malicious Anomaly Detection Mechanism Adaptive Classification Elementary Classification Using single detecting algorithm (entropy) with low accuracy Using multiple detecting algorithms (chi-square) with high accuracy Filtering Manager Secure packets A Study of TE for KOREN/APII-Testbed
Anomaly Detection Mechanism • Elementary classification • Apply suspicious signature with high sensitive • Classification achieved widely about attack packets • Reduce congestion problem of network • Use entropy calculation with low threshold value • Adaptive classification • Apply malicious signature with high sensitive • Reduce error detection rate • Use chi-square test with high threshold value A Study of TE for KOREN/APII-Testbed
Pick up next packet attributes (as sa or ma) Calculate entropy of packet attribute, sa and compare with average Update average value of entropy Calculate chi-square value of packet attribute ma and update average No Exceed threshold? Calculate chi-square value of packet attribute ma of suspicious packets Yes Create suspicious signature based on packet attribute, sa No Exceed threshold? Yes Yes Do number of packets that belong to suspicious signature exceed upper-bound threshold n? Create malicious signature by adding ma to suspicious signature No Filtering based on signatures Flowchart of Signature Creation A Study of TE for KOREN/APII-Testbed
Example of detection process Entropy (About source address) Anomaly Detection Process • Chi-square (about packet length) A Study of TE for KOREN/APII-Testbed
Anomaly Detector Architecture Monitoring Tool Agent Detecting Module 1 Detecting Module 2 Detecting Module n Packet attributes Source address Destination address Source port number Destination port number Protocol Anomaly Detection Manager Suspicious, Malicious Signature Filtering Manager A Study of TE for KOREN/APII-Testbed
Testing Environment Agent Agent Master Signature Detector Testing (DDoS) Attack Packet Target Control Msg. Attack Packet Snort : impossible to detect attack packet (203.255.255.94, Daejeon) Control Msg. Control Msg. Snort : possible to detect control message (163.180.118.68, Suwon) A Study of TE for KOREN/APII-Testbed
TFN2K icmp possible communication detection Signature Detector Testing (DDoS) • DDoS TFN client command BE detection A Study of TE for KOREN/APII-Testbed
Anomaly Detector Algorithm Testing (DDoS) • Testing Environment Local Network (Normal Traffic) DDoS Attack(TFN2K) Analyze Packet, Flow’s attribute using detecting algorithm Attribute DB Monitoring Tool (Libcap, NetFlow) Source Address Destination Address Source Port Num Destination Port Num Victim Packet Length A Study of TE for KOREN/APII-Testbed
Anomaly Detector Testing (DDoS) • About Packet Attributes A Study of TE for KOREN/APII-Testbed
Anomaly Detector Testing (DDoS) • In this case, packet length is not valid attribute A Study of TE for KOREN/APII-Testbed
Anomaly Detector Testing (DDoS) • About Flow Attributes A Study of TE for KOREN/APII-Testbed
Anomaly Detector Testing (DDoS) • Need to set threshold value lower A Study of TE for KOREN/APII-Testbed
Conclusion • Signature Detector detect well-known attack • Anomaly Detector detect DDoS attack that can’t detect by Signature Detector • Security system will improve KOREN’s security A Study of TE for KOREN/APII-Testbed
Future Works • Monitor malicious traffic using signature detector • Design filtering manager • Implement detecting module A Study of TE for KOREN/APII-Testbed