290 likes | 475 Views
Honeynet-based Collaborative Defense using Improved Highly Predictive Blacklisting Algorithm. Xiaobo Ma, Jiahong Zhu, Zhiyu Wan, Jing Tao, Xiaohong Guan, Qinghua Zheng. Xi’an JiaoTong University. Introduction Overview Algorithm Experiment Conclusion. Outlines. Introduction Overview
E N D
Honeynet-based Collaborative Defense using Improved Highly Predictive Blacklisting Algorithm Xiaobo Ma, Jiahong Zhu, Zhiyu Wan, Jing Tao, Xiaohong Guan, Qinghua Zheng Xi’an JiaoTong University
Introduction Overview Algorithm Experiment Conclusion Outlines 2
Introduction Overview Algorithm Experiment Conclusion Outlines 3
Introduction • Background • Internet attacks: • complicated & changing • Traditional defense: • passive & delay • Completely proactive defense: • impossible • Relatively proactive defense: • less delay 4
Introduction • Related work • GWOL (Global Worst Offender Listing) • LWOL (Local Worst Offender Listing) • HPB (Highly Predictive Blacklisting ) • HPB’s central idea: • – personalized blacklists for each contributor • – log-sharing system • – correlation between attackers and contributors 5
Introduction • Motivation • Limitations of HPB: • Dependent on data contributors • Single metric of attacker’s severity • Fixed size of blacklists • To solve the problems: • HCDF (honeynet-based collaborative defense framework) 6
Introduction • Central Idea • HCDF’s advantages: • Honeynet • Multiple metrics of attacker’s severity • Varying size of blacklists • HCDF’s goal: • Blacklists with high hit rate and defense rate • Reduce time delay in defending new attackers 7
Introduction Overview Algorithm Experiment Conclusion Outlines 8
HCDF Overview Attack traffic Honeynet Honeynet Honeynet Attack Schematic Diagram of HCDF Training process 9
HCDF Overview IHPB Blacklists Honeynet Honeynet Honeynet High similarity IHPB algorithm process 10
HCDF Overview Honeynet Honeynet Honeynet Defense(Testing) process 11
Introduction Overview Algorithm Experiment Conclusion Outlines 12
Data preparation An attack event: 1. attacker IP 2. victim’s subnet address 3. port 4. duration 5. total packet size IHPB Algorithm
Relevance Ranking An attack event: 1. attacker IP 2. victim’s subnet address 3. port 4. duration 5. total packet size IHPB Algorithm Attacker-Victim Matrix
Relevance Ranking 1. attacker IP 2. victim’s subnet address K=ranki{[(I-αW)-1-I]B} IHPB Algorithm Attacker-Victim Matrix
Relevance Ranking 1. attacker IP 2. victim’s subnet address K=ranki{[(I-αW)-1-I]B} IHPB Algorithm Relevance Ranking K(i,j): the relevance rank of attacker aj in subnet vi
Attacker Severity Metrics of attacker’s severity 1. attacker IP 2. victim’s subnet address 3. port 4. duration 5. total packet size IHPB Algorithm I(a): amount of unique subnets P(a): amount of unique ports T(a): average duration of all attacks B(a): average packet size in all attacks F(j):final severity of attacker aj
Subnet Vulnerability Metrics of subnet vulnerability 1. attacker IP 2. victim’s subnet address 3. port 4. duration 5. total packet size IHPB Algorithm I(v): amount of unique attackers P(v): amount of unique ports T(v): average duration of all attacks B(v): average packet size in all attacks G(i):final vulnerability of victim vi
Final Blacklist Relevance ranking – K(i,j) Attacker Severity – F(j) Subnet Vulnerability – G(i) Blacklisting: 1. F(i,j) = K(i,j) – βF(j) 2. larger G(i) – larger L(i). (L: length of blacklists) 3. smallest F(i,j) & L(i) – final blacklist IHPB Algorithm
Introduction Overview Algorithm Experiment Conclusion Outlines 20
Evaluation Metrics Defense Rate (DR) Hit Rate (HR) Collaborative Defense Rate (CDR) Collaborative Missing Rate (CMR) Experiment and Evaluation
Experiment Results Experiment and Evaluation % Time (hour) Hit Rates of Four Blacklists
Experiment Results Experiment and Evaluation % Time (hour) Defense Rate of Four Blacklists
Experiment Results Experiment and Evaluation % Time (hour) CDRs of GWOL, HPB and IHPB
Experiment Results Experiment and Evaluation % Time (hour) CMRs of GWOL, HPB and IHPB
Introduction Overview Algorithm Experiment Conclusion Outlines 26
Conclusion & Future Work • Conclusions • Honeynets provide abundant and accurate attack data • IHPB algorithm generates highly personalized and predictive blacklists • IHPB’s high collaborative defense rate and capability shows the great application value of HCDF • Future Work • More algorithms in HCDF with shorter training time and generate dynamic blacklists more timely 27 27