420 likes | 604 Views
Analysis and Detection of Insider Threats. DSS. 4 May 2005. MITRE. Workshop Goal. Design and develop a proof of concept system for early indication and warning of malicious insiders. Multidisciplinary Team. Hypotheses.
E N D
Analysis and Detection of Insider Threats DSS 4 May 2005 MITRE
Workshop Goal Design and develop a proof of concept system for early indication and warning of malicious insiders
Hypotheses • A heterogeneous approach to indications and warning will enhance MI detection • Fusing information results in more accurate and timely indications and warning of MIs • Observables together with domain knowledge (e.g., user role) can help detect inappropriate behavior (e.g., need to know violations)
Methodology Insider Case Analysis Model Insiders and Observables Novel Sensors Design and Development Evaluation Live Network Experimentation
Observables Taxonomy Observables Polygraph Communications Violations MissingReporting(financial, travel, contact) Physical Access(e.g., card door logs) Cyber Actions Foreign Travel Finances, Wealth, Vices Materials Transfer to handlers Counter Intelligence Social Activity Internal External Physical Security Cyber Security Reconnaissance Access Entrenchment Exploitation Extraction& Exfiltration Communication Manipulation Counter Intelligence Other Cyber Activities Install Sensors Install unauthor. software Sensor Mgmt Bot Command & Control Net Scan Web Browsing DB Search Encrypted Email Coded Messages Covert Channels CI Case Files Disk Erasure Disk Wiping Printing Downloads Removable Media Copy machine Orphan account use Password cracking Account misuse Privilege escalation Terminals left logged on unattended, no time out File Permissions Misinformation Info suppression Pornography Gambling … Honeypot data Maintenance Schedule Trouble Tickets DATA and SENSORS Calling patterns Keyboard logs Network IDS Logs Email patterns File systems logs Syslog Travel/vacation
Human Analyst Operator System Admin Network Admin Hardware Software Resources Physical Access Secretary $$ Server Web Server Manager … Router Mail Server … Badge … Guard DB Key Information Encryptor Application … Op. System Document/Briefing Phone … … Web Page Satellite … Log (web, DB, …) Removable Media (floppys, USB devices, CDROMs) … Network Structure Net Vulnerabilities CPU Sources & Methods Workstation Monitor Passwords Keyboard Counter Intelligence Asset Taxonomy Assets
User Taxonomy Employees Executive Technical/Engineer Secretarial Prof. Support Misc. Non MITRE Summer tenant Software Analyst consultant subcontractor Physical InfoSec Electronics Data and Info InfoSec Facilities Financial Media/Comm Legal Transportation System & Network Admin HR Security and Safety
Account Taxonomy Locations: Bedford, Washington, Sites User Accounts Professional Support Technical Secretarial Executive Others Co-op/Summer Financial / Purchasing / Admin Human Resources Technical Project Support Media / Communications System & Network Admin Facilities & Equipment Transportation Information Security Security & Safety Misc Expert Services Applications Engineering Electronics Engineering Analysts Physical Engineering Information Security Data & Information Multi Discipline Information Systems Groups Non-human entities Executive Secretary Clerks / Aides (46) Non-MITRE Employees Secretary (328) Co-op Summer Listservers Tenants Consultants Mail Forwarders Subcontract SysAdmin Accounts
Malicious Insider Testbed • Real network - MITRE’s DMZ • A separate network for experimentation and sponsor community support established outside of the MITRE internal network • 300 – 400 hosts • Various services: Web, news, email, database, ... • Data sources on network for use in scenarios • Deploy additional sensors • 3 of 75 users active during period acted as malicious insiders based on historical and project scenarios of insider behavior Internet MITRE Internal Network MITRE DMZ
Insider Scenarios • Three scenarios: • Aggregate Historical Insider • “Pal” • Projected Insiders • “Jill” News Admin • “Jack” • Drew upon historical examples for “Pal” • Intelligence analyst • News Admin and “Jack” developed their scenarios • Needed to be consistent with prior activity on systems • An application administrator • A system administrator • More realistic (“red teaming”)
Multiple Data Sources sendmail sshd web_log web_notice web_warn web_error nnrpd innd Web Application User Role Taxonomy Service Framework Host HTTP su login yppasswdd last Support Snort IDS Stealthwatch Honeynet e-mail sensor Domain Knowledge Network Web Server badge reader Physical Network Server 18 (of 400) Hosts, 11+M records, 4000 users, 75 active on DMZ
Collection and Anonymization Sendmail logs Authentication logs Badge reader logs Common Data Repository Web server logs News server logs Archive Database StealthWatch logs Scrubber Honeynet logs Other logs Flat Files ARDA NRRC Space Protected Computing Space
Evaluation Activity Insider Activity with Journal Available During Test Insider Activity with Journal Revealed After Test PAL(Analyst) Normal Activity Jill(News Admin) Normal Activity Jack(Sys Admin) Normal Activity . . . December January February
Heterogeneous I&W Approaches • StealthWatch • Multilevel network flow analysis • Honeynets • Simulated targets to elicit knowledge of attacker • Structured Analysis Group (SAG) • Top-down, real-time model based detection of MI • Data Fusion • Bottom-up analysis of traditional and novel indicators
Decision Analysis Data Fusion Structured Analysis Adversary Models Honeynet Anomaly Detection(StealthWatch+) Big file, scanning, zone alert Common Data Sensor Sensor Sensor Integrated Framework • COMMON DATA • - Authentication, Mail, DMZ Servers, IDS, Honeynet, BadgeData • Application Logs (e.g., web, DB, mail) • Nessus Scans (vulnerability analysis) • Switch logs, Stealth Watch logs
Performance Evaluation Metrics • Timeliness, e.g., time from defection to detection • years, months, weeks, minutes • Accuracy • Precision = # correctly detected insiders / # reported • Recall = # reported insiders / total # actual insiders • False positives = 1-precision • False negatives = total # actual insiders - # correctly detected
Scanning Activity by “Jack” Alarm Level, 20 Approved Scanning Activity by “info-scan”
Hypothesis (Brad Wood-BBN) OK, Common Data Repository “Jack” downloaded more than 4 gigabytes on Feb. 12 Jack - Known SSH
Jack “Jack” did not increase the number of inside connections, normally 8, maximum was 10 on Feb. 11. CDR Jack
Structured Analysis Group:Top-down, real-time model based detection
Structured Analysis GroupObservables Taxonomy Addressed at Workshop Observables Polygraph Communications Violations MissingReporting(financial, travel, contact) Physical Access(e.g., card door logs) Cyber Actions Foreign Travel Finances, Wealth, Vices Materials Transfer to handlers Counter Intelligence Social Activity Internal External Physical Security Cyber Security Reconnaissance Access Entrenchment Exploitation Extraction& Exfiltration Communication Manipulation Counter Intelligence Other Cyber Activities Sensors Install unauthor soft. Web Browsing DB Searches Net Scan Encrypted Email Coded Messages Covert Channels CI Case Files Disk Erasure Disk Wiping Orphan Account use Password Cracking Account misuse Privilege escalation Unattended terminals Printing Downloads Removable Media Copy machine File Permissions … Pornography Gambling … Honeypot data Maintenance Schedule Trouble Tickets DATA and SENSORS Calling patterns Keyboard logs Network IDS Logs Email patterns File systems logs Syslog Travel/vacation
Data Fusion:Bottom-up analysis of traditional and novel indicators
Data Fusion Observables Taxonomy Observables Polygraph Communications Violations MissingReporting Physical Access Cyber Actions Foreign Travel Finances, Wealth, Vices Materials Transfer to handlers Counter Intelligence Social Activity Internal External Physical Security Cyber Security Reconnaissance Access Entrenchment Exploitation Extraction& Exfiltration Communication Manipulation Counter Intelligence Other Cyber Activities News/Web Browsing need-to-know Bulk news/web search Net Scan in IDS logs Authentication logs - root access for non-admin - su from one normal user to another IDS logs- http, tp, telnet from non-standard ports Unusual recipient & encryptedhidden or masqueraded content type Lack of required digital watermark on images Uploads (fttp, http) in IDS logs Printing Implemented at Workshop Implemented elsewhere Not Implemented Sensors
Data Fusion Cyber-Access, user324, weight 1, at 2003-12-10 11:14:38, from news.mitre.orgsu to user9676 failed for non-admin user user324 on /dev/pts/0-----------------------------------------------------------------------------------------------------Physical-Access, user295, weight 5, at 2003-12-15 19:19:37,After hours badge access for user295----------------------------------------------------------------------------------------------------- Cyber-Extraction-Exfiltration, user2649, weight 5, at 2004-01-06 15:37:28, from nrrc-springfield.mitre.org, Data was uploaded to an external server via FTP protocol----------------------------------------------------------------------------------------------------- Cyber-Reconnaissance, user295, weight 10, at 2004-01-09 20:57:18, from nrrc-springfield.mitre.org, User user295 searching in non-need-to-know country korea ----------------------------------------------------------------------------------------------------- Cyber-Communication, user9, weight 15, at 2004-02-10 22:14:48, from cvw.mitre.org,User user9 received email with masqueraded content from user11649@yahoo.com -----------------------------------------------------------------------------------------------------Cyber-Reconnaissance, user1, weight 5, at 2004-02-10 13:54:15, from nrrc-plymouth.mitre.org, Ongoing CI violation -- 066.170.227.074 has 49613 alerts of this type… -----------------------------------------------------------------------------------------------------Cyber-Extraction-Exfiltration, user295, weight 8, at 2004-02-12 23:54:58, from dmzsrv1.mitre.org, User user295 sent encrypted email user9983@comcast.net-----------------------------------------------------------------------------------------------------Cyber-Extraction-Exfiltration, user1, weight 15, at 2004-02-20 12:25:03, from nrrc-erie.mitre.org, user1 sent email with masqueraded content user1@mitre.org
Experimental Results Breadth 5 1 3 2 2 Breadth of 1: Not on Watch • DATA REDUCTION • 7.4 M records examined for 75 users • 259 indicators for 24 users
Data Fusion Accuracy Across approaches, correctly identified 3 out of 3 insiders
KEY StealthWatch Structured Analysis Data Fusion Watch list Alert 12/17/03 2/6/04 12/11/03 1/24/04 2/11/04 1/9/04 2/6/04 12/9/04 2/15/04 PAL Jill (News Admin) 2/11/04 2/16/04 2/15/04 2/12/04 2/17/04 2/20/04 Jack 2/11/04 2/20/04 Dec Jan Feb Performance: Timeliness
Summary • Malicious insiders are a serious threat • Malicious insider behavior is distinct and cannot be readily detected using classic, external intruder detection • Results from the challenge workshop show that an integration of multiple approaches promises early and effective warning and detection • Workshop insider cases and dataset leave behinds • Inspiration of new sensor development
Malicious Insider Evaluation Select Insider Case Simulate on network Participants Sign Data NDA Data Sent to Participants Participants Submit Runs
Our Insider Knowledge and Focus O C C U R R E N C E Occurred Not yet Occurred MI who attacks the network Robert Philip Hanssen Detectable Hard to Detect Not yetDetectable ? X S T E A L T H Ana Belen Montes No cyber component ? - Unaddressed by workshop X – Unobservable in cyberspace Focus: “Indications and warnings not conviction and sentencing”
“Pal” Scenario Web Search News Honeytoken Retrieves “interesting” data for which has no need to know Changes news subscriptions Email Makes new (inappropriate) queries Exfiltration and communication with handler
“Jill” or News Admin Scenario Covert Access Account Manipulation Web Search Creates news account and uses this account to read news Accesses news through hidden newsgroups Makes new (inappropriate) queries
Jack Scenario Searches for data Create backdoor Stealthy exfiltration Searches news.mitre.org data at file system level Masquerades compressed data as image Maps network Builds a reverse ssh tunnel between news server and admin workstation Maps network using nmap
Heterogeneous Data (1 of 3) • Badge reader: • “0M151_Telephone_Room 12/06/2003 02:43:26 Admitted user2930 at 0M151 Telephone Room” • “0M422_Rear_Door_[In]_ 12/06/2003 05:20:24 Admitted user2930 at 0M422 Rear Door [In]” • Login: • “nrrc-plymouth.mitre.org ROOT LOGIN /dev/console” • Su: • “nrrc-plymouth.mitre.org 'su root' succeeded for user1 on /dev/pts/1”
Heterogeneous Data (2 of 3) • Sshd: • “Accepted publickey for root from 129.83.10.17 port 52893” • “Accepted password for user1265 from 66.189.44.167 port 61007” • “Failed password for user1265 from 66.189.44.167 port 61011” • Last-a: • “nrrc-boston.mitre.org user2645 pts/0 Wed Jan 7 21:06 - 23:18 (02:11) 128.230.14.115” • “nrrc-boston.mitre.org user2643 pts/0 Fri Dec 12 16:54 - 17:25 (00:30) sgdykes.datasys.swri.edu”
Heterogeneous Data (3 of 3) • Web_log: • “GET /cvw/licenses/source/license.html HTTP/1.0” • “GET /basilix.php3?request_id[DUMMY]=../../../../etc/passwd&RequestID=DUMMY&username=user2311&password=xxxxx HTTP/1.1” • Web_error: • “Invalid method in request get /scripts/...” • “File does not exist: /news_1/.../etc/passwd” • Sendmail: • “cvw.mitre.org 14436 i0J507Lb014436: from=<user10368@digito.com>, size=2789, class=0, nrcpts=0, proto=ESMTP, daemon=MTA, relay=smtp-bedford-x.mitre.org [192.160.51.76]” • “cvw.mitre.org 14645 i0J7ErLb014644: to=user8, ctladdr=<user9@cvw.mitre.org> (1/0), delay=00:00:00, xdelay=00:00:00, mailer=*file*, pri=41013, dsn=2.0.0, stat=Sent”
Data [# of records and % of total] Not shown: StealthWatch = 7.5MB or 68%