Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul...

40
Characteristics of Internet Characteristics of Internet Background Radiation Background Radiation Authors: Ruoming Pang, Ruoming Pang, Vinod Yegneswaran, Vinod Yegneswaran, Paul Barford, Paul Barford, Vern Paxson, Vern Paxson, & Larry Peterson & Larry Peterson Publisher: ACM Internet Measurement Conference ACM Internet Measurement Conference (IMC), 2004 (IMC), 2004 Presented by: Chowdhury, Abu Rahat Chowdhury, Abu Rahat

Transcript of Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul...

Page 1: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Characteristics of Internet Characteristics of Internet Background RadiationBackground Radiation

Authors:Ruoming Pang, Ruoming Pang,

Vinod Yegneswaran, Vinod Yegneswaran, Paul Barford, Paul Barford, Vern Paxson, Vern Paxson,

& Larry Peterson& Larry Peterson

Publisher:ACM Internet Measurement Conference ACM Internet Measurement Conference

(IMC), 2004(IMC), 2004

Presented by: Chowdhury, Abu RahatChowdhury, Abu Rahat

Page 2: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Today’s OutlineToday’s Outline

• The Authors and their Problem Statements• Objective & Terminology • The study and Network Telescope• Measurement Methodology:

• Passive Measurement• Active Measurement

• Comments.

Page 3: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Ruoming PangSoftware engineer Google NY

Current Research Projects and ThrustsCurrent Research Projects and ThrustsMeasurement, analysis, and security of wide area networked systems and network protocols

Vern Paxson Associate Professor

EECS Department of UC Berkeley,

Vinod YegneswaranGrad Student

Computer Science and Statistics

University of Wisconsin

The Authors

Paul BarfordAssistant Professor, Department of Computer SciencesUniversity of Wisconsin-Madison

Larry L. Peterson ProfessorDepartment of Computer Science Princeton, NJ 08544

Page 4: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

The ProblemThe Problem

• Background radiation reflects fundamentally nonproductive traffic, either malicious or benign. While the general presence of background radiation is well known to the network operator community, its nature has yet to be broadly characterized

• Goals of Characterization:– What is all this nonproductive traffic trying to

do?– How can we filter it out to detect new types of

malicious activity?

Page 5: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

OutlineOutline

• The Authors and their Problem Statements• Objective & Terminology • The study and Network Telescope• Measurement Methodology:

• Passive Measurement• Active Measurement

• Comments

Page 6: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

ObjectiveObjective

• To characterize Background Radiation based on:

– Types of attack, behavior, traffic composition, frequency, target networks, etc.

• Secondary objectives– Development of an effective traffic filtering system– Use of active responders to effectively identify the

objective of attacks

Page 7: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Natural Natural Background Background RadiationRadiation

We are all exposed to ionizing radiation from natural sources at all times. This radiation is called natural background radiation, and its main sources are the following:

• Radioactive substances in the earth's crust

• Emanation of radioactive gas from the earth

• Cosmic rays from outer space which bombard the earth

Source: Google Earth

Page 8: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Internet Background RadiationInternet Background Radiation

• The Baseline “Noise” of Internet traffic– Every IP address---even an unused one---receives packets constantly…So Fundamentally nonproductive traffic.

– Traffic sent to unused addresses.

– Nonproductive traffic: malicious (flooding backscatter, hostile scan, spam) OR benign (misconfigurations).

– Pervasive nature (hence “background”).

Page 9: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

BackscatterBackscatter

Source: [MVS01]

Page 10: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Background RadiationBackground Radiation• The volume of this traffic is not minor. For example, traffic

logs from LBL for an arbitrarily-chosen day show that a total of about 8 million connection attempts (2/3 of the total)

MisconfigurationBackscatters

Scan for Vulnerability

Worms

Benign Malicious

Background Radiation

Page 11: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

The StudyThe Study

• Why do we study it?– To understand Internet malware in action

This paper is the first broad characterization of Internet background radiation

Focus: traffic semantics– What is the traffic trying to do at application level?

Measurement methodology– How to extract the meaning of background radiation ?

Page 12: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Measurement Apparatus:Measurement Apparatus:Network TelescopeNetwork Telescope

• Unused but globallyreachable IP Addresses

• Their main telescopes:– Lawrence Berkeley National Lab

– Size: 1,280 addresses

Page 13: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

OutlineOutline

• The Authors and their Problem Statements• Objective & Terminology • The study and Network Telescope• Measurement Methodology:

• Passive Measurement• Active Measurement

• Comments.

Page 14: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Measurement Methodology: Measurement Methodology: PassivePassive

Hit PatternHit Pattern

What is the type and volume of observed traffic without actively responding to any packet?

Page 15: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

How Often Do We See a How Often Do We See a Packet?Packet?

• Feb 2006 at Lawrence Berkeley Lab(Average on 1,280 IP’s over period of a week)342 packets / destination IP / day

=== > A packet every 4 minutes on any IP

• But, how are radiation packets distributed:– Among destination IP’s? (Hotspot?)– Over time

Source: Ruoming Pang

Page 16: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Distribution over Destination Distribution over Destination IP’sIP’s

Number of packets per destination IP received over a week

Page 17: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Distribution over Destination Distribution over Destination IP’sIP’s

• Packets are in general evenly distributed among destinations• The biggest hotspot receives < 1% of packets

Page 18: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Number of Source IP’s Per Number of Source IP’s Per HourHour

Variation of Number of Source IP’s

Number of source IP’s also vary over time

But not correlated with packet volume

Page 19: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Other FiguresOther Figures

Page 20: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Summary of Passive Summary of Passive ObservationObservation

• TCP dominates (99% of the TCP packets are TCP/SYN)

• Near uniformity among destinations– Hit pattern: sweeping or random

• Variation over time• Considerable amount of ICMP traffic• Smaller set of sources scan all possible IPs• Most of spoofed IPs are in class A

The sources are expecting replies!

Page 21: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

OutlineOutline

• The Authors and their Problem Statements• Objective & Terminology • The study and Network Telescope• Measurement Methodology:

• Passive Measurement• Active Measurement

• Comments.

Page 22: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

The Big PictureThe Big Picture

Unused IP space

Monitoredtraffic

Internet

Local network

• Monitor network traffic to understand/track Internet attack activities

• Monitor incoming traffic to unused IP space

Active Measurement

Page 23: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Network TelescopeNetwork Telescope• Use a honeypot to keep

conversation going… (in the paper they used HoneyD and Active Sink)

• Answer PING

• Establish TCP connections

• Reply to application (e.g., HTTP) requests …

• …• …• …

• Till we find out what the intention is

Page 24: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Key ComponentsKey Components

Responding to Application Requests

Taming the Traffic Volume

Analyzing Traffic Semantics

Filter

Page 25: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Measurement MethodologyMeasurement Methodology(Application-Level Responders)(Application-Level Responders)

• Data-driven: – Which responders to build is based on observed traffic

volumes

• Application-level Responders:– Not only adhere to the structure of the underlying

protocol, but also to know what to say

• New types of activities emerge over time, responders also need to evolve

Page 26: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Radiation Activity ClassificationRadiation Activity ClassificationWhich Malware is Most Active?

What is the most PopularApplication?

Which Vulnerability is MostTargeted?

Page 27: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

A Rich Collection of Applications are A Rich Collection of Applications are targeted in the Background Radiationtargeted in the Background Radiation

• Windows RPC• HTTP• Netbios/CIFS/SMB• Virus backdoors (MyDoom, Beagle, etc.)• Dameware• Universal PnP• Microsoft SQL (Slammer)• MySQL• DNS• BitTorrent

Page 28: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

TCP Port 80 (HTTP)TCP Port 80 (HTTP)

• Targeted against Microsoft IIS server.• Dominant activity is a WebDAV buffer-overrun

exploit.

Page 29: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

TCP Port 80 (HTTP)TCP Port 80 (HTTP)

Port 80 Activities

Page 30: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Other FiguresOther Figures

Page 31: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Summary of Active Summary of Active ObservationObservation

• Study dominant activities on the popular ports• Same Attacker on multiple networks• Some sources avoid Class A• Traffic is divided by ports:

– Consider all connections between a source-destination pair on a given destination port

• Background Radiation concentrates on a small number of ports:– Only look at the most popular ports.– Many popular ports are also used by the normal traffic

use application semantic level.– Many replies are needed to see what is happening

Page 32: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

ConclusionConclusion

• Background Radiation is – Complex in Structure, highly automated, frequently

malicious, potentially adversarial & matured in rapid speed

• Passive measurement reveal only part of the story

• Need to interact with the traffic to see what are the actual objectives of the attacker

Page 33: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

StrengthsStrengths

• First attempt to characterize background radiation

• Good Measurement Methodology:– Detailed set of active responders for popular ports.

• Meaningful Data Analysis:– Passive Analysis: activities concentrate on popular ports.– Active Analysis: Extreme dynamism in many aspects of

background radiation.

Page 34: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

WeaknessesWeaknesses

• The filtering could be biased.– The same kind of activity to all destination IP addresses.– Fail to capture multi-vector worms that pick one exploit per IP

address

• Significant amount of connections didn’t proceed

• DHCP problem makes source IP address less accurate as source identity.

• To what extent the development of application-level responders can be automated?

Page 35: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Reference & Back up SlideReference & Back up Slide

Page 36: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

ReferencesReferences

• [Barford2004] Paul Barford. Trends in Internet Measurement. PPT from U. of Wisconsin, Fall 2004

• [MVS01] Moore, Geoffrey M. Voelker, and Stefan Savage. Inferring Internet Denial-of-Service Activity. In Proceedings of the 10th USENIX Security Symposium, pages 9--22. USENIX, August 2001

• Google Earth

Page 37: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Measurement MethodologyMeasurement Methodology(Experimental Setup)(Experimental Setup)

• Two different systems: iSink, and LBL Sink.• Traces collected from three sites:

– Class A network– UW campus– Lawrence Berkeley Lab (LBL)

• Same forms of application response.• Different underlying mechanisms.• Support two kinds of data analysis:

– Passive analysis: no filter, no responder– Active analysis: with filter, and responder

Page 38: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Experimental Setup: iSinkExperimental Setup: iSink

Page 39: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

Experimental Setup: LBL SinkExperimental Setup: LBL Sink

Page 40: Characteristics of Internet Background Radiation Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, & Larry Peterson & Larry Peterson.

0 1 1 0 1 1 1 0 1 1 0 10 1 1 0 1 1 1 0 1 1 0 1

0 1 1 0 1 1 1 0 1 1 0 1

0 1 1 0 1

1 1 0 1 1 0 1 1 1 1 0 1 1

0 1 1 0 1 1 1 0 1 1 0 1

0 1 1 0 1 1 1 0 1 1 0 1

0 1 1 0 1

1 1 0 1 1 0 1 1 1 1 0 1 1

0 1 1 0 1

1 1 0 1 1 0 1 1 1 1 0 1 1

0 1 1 0 1 1 1 0 1 1 0 1

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010 0101010

01011111101111111010101111111001111111110101010

0101010 0101010 0101010 0101010 0101010 0101010 0101010

Thank YouThank You