overview of nicter - enisa · atlas: geographical traffic visualization • shows geographical...

20
Overview of nicter - R&D project against Cyber Attacks in Japan - Daisuke INOUE Cybersecurity Laboratory Network Security Research Institute (NSRI) National Institute of Information and Communications Technology (NICT) nicter video http:// www.youtube.com / watch?v =asemvKgkib4 DAEDALUS video http:// www.youtube.com / watch?v =3u5u5A8_SE0 1

Upload: others

Post on 10-Jun-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Overview of nicter - R&D project against Cyber Attacks in Japan -

Daisuke INOUE Cybersecurity Laboratory

Network Security Research Institute (NSRI) National Institute of Information and Communications Technology (NICT)

nicter video à http://www.youtube.com/watch?v=asemvKgkib4 DAEDALUS video à http://www.youtube.com/watch?v=3u5u5A8_SE0

1

Page 2: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Outline of NICT �Mission

As the sole national research institute in the information and communications field, we as NICT will strive to advance national technologies and contribute to national policies in the field, by promoting our own research and development and by cooperating with and supporting outside parties.

Budget (FY 2011): approx. 35.5 Billion Yen

(300 Million Euro)

Personnel: 843 Researchers: 517

PhDs: 410 (as of April 2011)

Japa

n St

anda

rd T

ime

and

Spac

e W

eath

er F

orec

ast s

ervi

ces

Interaction with National ICT Policy

Collaboration between Industry, Academic Institutions and Government

Gro

wth

of J

apan

ese

Eco

nom

y

Safe

ty a

nd S

ecur

ity fo

r a

mor

e co

nven

ient

life

Con

trib

utio

n to

solv

e m

ajor

pro

blem

s of

the

glob

al c

omm

unity

R&D carried out by NICT’s researchers

R&D assistance to industry and academia Promotion of ICT businesses

2

Page 3: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

What we are fighting against?

3

Virus

Bot Worm

Malware

short for malicious software designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior.

(from Wikipedia)�

Page 4: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Overview of the project

Target: Integrated analysis of security threats in large scale networks - What happens on the Internet? - What is the root cause?

Strategy: Network monitoring + Malware analysis

nicter Operation Room

4

nicter = Network Incident analysis Center for Tactical Emergency Response

Page 5: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Report ------------ ------------ ------------

Analysis Work Bench

Incident Alert

!

!

!

NemeSys: Network and malware enchaining System

IHS: Incident Handling System

Government

End Users

Internet Service Providers (ISPs)

Phe

nom

ena

Roo

t Cau

se

Visualization Analysis Engine

Tiles Atlas

Cube

MacS: Macro analysis System

Code Analyzer Behavior Analyzer

MicS: Micro analysis System

Darknet Traffic

Malware Samples

Honeypot

Virus

Bot

Worm

Correlation Engine

System Overview

5

Page 6: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Report ------------ ------------ ------------

Analysis Work Bench

Incident Alert

!

!

!

NemeSys: Network and malware enchaining System

IHS: Incident Handling System

Government

End Users

Internet Service Providers (ISPs)

Phe

nom

ena

Roo

t Cau

se

Visualization Analysis Engine

Tiles Atlas

Cube

MacS: Macro analysis System

Code Analyzer Behavior Analyzer

MicS: Micro analysis System

Darknet Traffic

Malware Samples

Honeypot

Virus

Bot

Worm

Correlation Engine

6

190,000 darknet (dark IP addresses)

5,000 samples can be analyzed

per day

30 seconds for a correlation

analysis

System Overview

Page 7: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

What is Darknet? •  Darknet: Unassigned IP addresses space

and they are not connected to the real servers/PCs.

•  Types of packets arrived to the darknet: –  Scans and attacks by malwares –  Backscatter (reflection of DDoS attack) –  Miss configurations/mistakes

•  It is very useful to observe the serious attacks behavior over the Internet.

Darknet

7

Page 8: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Atlas: Geographical Traffic Visualization

•  Shows geographical positions of a packet’s src and dst from the IP addresses in real-time •  Each packet is represented by a rocket traversing from source to destination

•  The color of the rocket indicates the type of packet •  The altitude of the rocket is in proportion to its dst port number

■UDP ■TCP SYN ■TCP SYN/ACK ■TCP Other ■ICMP

8

Page 9: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Cube: 3D Traffic Visualization

9

•  Shows comprehensive traffic animation in real-time •  Each packet is represented by a thin rectangle •  The rectangle is placed on the source plane according to its src IP addr and port number

•  It glides to the destination plane taking about six seconds

•  The position it reaches is according to its dst IP addr and port number ■UDP

■TCP SYN ■TCP SYN/ACK ■TCP Other ■ICMP

Sou

rce

IP A

ddre

ss

Source Port Number

Des

tinat

ion

IP A

ddre

ss

Src Plane

Page 10: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

10

Tiles: Host-based Behavioral Analysis Engine

•  One tile illustrates behavior of an attacking host in 30 sec. •  Each behavior is automatically categorized and stored in a DB. •  Unknown attack pattern can be detected.

Page 11: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

NemeSys

NemeSys: Macro-Micro Correlation Analysis

MicS DB (malware database)

Profiler

Correlator

Profile parameter 1 parameter 2 parameter 3 parameter 4 …

PF of MW1 parameter 1 parameter 2 parameter 3 parameter 4 …

… PF of MW2

parameter 1 parameter 2 parameter 3 parameter 4 …

PF of MW3 parameter 1 parameter 2 parameter 3 parameter 4 …

PF of MW4 parameter 1 parameter 2 parameter 3 parameter 4 …

PF of MW5 parameter 1 parameter 2 parameter 3 parameter 4 …

Scan from a certain host

1st Candidate

11

Page 12: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

12

Result of Real-time Correlation Analysis

Page 13: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

- nicter real-time alert system -

DAEDALUS

(Direct Alert Environment for Darknet And Livenet Unified Security)

13

Daedalus

Ikaros

Page 14: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Goal and Mechanism of DAEDALUS

14

Goal: Utilize the darknet monitoring results

for securing the livenet.

Mechanism: if (nicter receives packets from a cooperative organization)

alert;

Page 15: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Organization A

Organization C

System Overview

: Darknet : Livenet

15

nicter

Page 16: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Internal Darknet Alert Organization A

Organization C

: Darknet : Livenet

: Infected Host

16

nicter

Page 17: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

External Darknet Alert

: Darknet : Livenet

: Infected Host

Organization A

Organization C

17

nicter

Darknet Traffic

Page 18: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

18

DAEDALUS viz

Page 19: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Yet Other Emerging Threats…

19

•  Drive-by Download •  SNS Malware •  Targeted Attack •  Threats on IPv6 Network etc…

Page 20: Overview of nicter - ENISA · Atlas: Geographical Traffic Visualization • Shows geographical positions of a packet’s src and dst from the IP addresses in real-time • Each packet

Conclusions

20

•  We are conducting R&D to investigate practical Cybersecurity technologies.

•  We still need new frameworks to observe, analyze and respond to the emerging threats.

•  International collaboration is crucial for

developing state-of-the-art Cybersecurity technologies.