Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of...

17
Steganophony: Challenges and Detection of Exfiltration Attacks 16 November 2017 Juan C Bennett, Ph.D. Distribution A: Approved for public release; distribution is unlimited.

Transcript of Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of...

Page 1: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Steganophony: Challenges and Detection

of Exfiltration Attacks

16 November 2017

Juan C Bennett, Ph.D.

Distribution A: Approved for public release; distribution is unlimited.

Page 2: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

SSC PAC MISSION

…research, development, engineering, and support of integrated C4ISR, cyber, and

space systems across all warfighting domains

From concept to capability via…

1

Page 3: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Cyber Forensics Research Lab

2

Mission

• Investigate novel ways to collect, protect, analyze network-based evidence.

• Understand collection, classification/exploitation of knowledge about

adversaries (cyber threat intelligence) from a cyber-forensics perspective.

• Perform network forensics investigations in different DoD environments (e.g.

cloud-based, mobile, converged, tactical), analyze traffic and flow records,

behavior analysis, and generate intelligence.

• Research collaboration with industry, academia and government.

Operational Relevance

• Enables DCO forces to detect incidents across multiple Navy networks

• Allows DCO forces to conduct network monitoring and analysis within a

converged environment

• Develop novel forensic tools and methods to conduct live cyber forensic

investigations

• Support network investigators to identify actual intrusions, collect more and

better evidence, reduce analysis time, and help to stop attacks against the

converged network.

• Improving cyber posture for immediate and persistent cyber threats to

networks

• Reduction in threat detection to response time

• Reduction in Cyber Analyst Information Overload

Distribution A: Approved for public release; distribution is unlimited.

Page 4: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Background: What’s Steganography?

3 Distribution A: Approved for public release; distribution is unlimited.

Page 5: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

4 Distribution A: Approved for public release; distribution is unlimited.

Unified Capabilities

Voice & Video /

Conferencing Bridges

Voice

Integrated

Directory

Voicemail/

E-mail

Integration

Presence

Conferencing

& Conf.

Control

Video

Co-Ringing

A

IM/Chat

Mobile Devices

Integrated, fully-converged, cloud-

based environment

Page 6: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Network Models Using Patterns

• Discover new ways to characterize network environments and

information embedded in the network.

• Comprehensive pattern system based on a collection of semi-formal

patterns.

• Analyze network forensic investigations in converged environments

using forensic patterns.

• Pattern systems specify, analyze and implement network forensics

investigations for different architectures.

• Secure and convenient method of collecting/analyzing digital attack

evidence in converged environments.

Distribution A: Approved for public release; distribution is unlimited. 5

Page 7: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

UC Pattern System

• Architectural patterns

– Analyze existing VVoIP architectures in UC.

– Focus on modeling tactical architectures using UML language.

– Patterns are used for high-level specification of the UC system.

• Attack patterns

– Systematic description of the steps/goals of an attack and ways to defend the system.

– Attack pattern template to describe how to document and organize generic attack patterns.

– Attack pattern catalog.

• Security patterns

– Based on security mechanisms/standards to stop attacks against the UC system.

– Understand what security patterns are necessary to prevent or mitigate the threats.

• Forensic patterns

– Capturing, recording, and analyzing information collected on UC networks from intrusion detection, auditing, and checking points.

– Help network investigators to select evidence

Distribution A: Approved for public release; distribution is unlimited. 6

Page 8: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Network Forensics Patterns

• Extra dimension of protection to the system.

• Abstract view of forensic information to network investigators.

• Enable faster response and more structured investigations of network

attacks.

• Discover source of security breaches

• VEC to collect attack packets on the basis of adaptively setting

filtering rules for real-time collection.

• Sensors with examination capabilities to look at UC traffic (i.e.

signaling and media)

• VEA analyzes collected forensic data packets, and presents a

process of investigating attacks against the converged network.

Distribution A: Approved for public release; distribution is unlimited. 7

Page 9: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Use Case: Signaling Steganophony Pattern

Context

• Subscribers engage in a voice call conversation over a VoIP channel.

• Signaling protocols: H.323 and SIP. Signaling messages are exchanged between endpoints.

• Use of cryptographic protocols (e.g. AS-SIP in TLS, SIPS) which encrypts signaling to improve the

security of VoIP connections.

Distribution A: Approved for public release; distribution is unlimited. 8

Page 10: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Use Case: An OPSEC Approach

Problem

• How to transmit a secret message to a remote user in a regular conversation via the

VoIP system?

Vulnerabilities

• Digital audio signals are, due to their stream-like composition and the high data rate,

appropriate covers for a steganographic method

• Creation of covert channels in SIP is possible because in the protocol specifications

there are no restrictions to generating parameters about the desired length.

• VoIP connection does not give examiners enough time to detect possible abnormality

• Amount of information that attackers can covertly transfer in VoIP networks is

significant.

• Use of steganophony should be considered as a threat to the security of the converged

network as it may be used for data exfiltration.

Distribution A: Approved for public release; distribution is unlimited. 9

Page 11: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Statistical-based IDS Approach

10 Distribution A: Approved for public release; distribution is unlimited.

Page 12: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Forensics

• VoIP Evidence Collector pattern to collect attack packets on the basis

of adaptively setting filtering rules for real-time collection.

• Sensors with examination capabilities that look at VoIP traffic (i.e.

signaling and media) and flag packets where typically unused bits/fields

actually have data stored.

• VoIP Evidence Analyzer pattern which analyzes the collected forensic

data packets, and presents a process of investigating attacks against

the VoIP network.

• Misuse patterns indicate where to look for attack data, which

components of the network may be more useful to find evidence, and

which parts of the network should have additional capabilities to collect

forensic data.

Distribution A: Approved for public release; distribution is unlimited. 11

Page 13: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

*

Forensic

Server

Evidence

Collector

*

* collect

Call Server

*

Evidence

Send data

*

*

VoIP

Network

* Network

Traffic Filter

*

*

IDS Send alarm

Monitor real

traffic

*

*

* 1

Forensic

components Embedded

Sensor

NFAT

1

Evidence Collector Class Diagram

Distribution A: Approved for public release; distribution is unlimited. 12

Page 14: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

*

Forensic

Components

* Layer 2

Switch

manages Call Server

conferencing

* 1

1

Forensic

Server

Evidence

Collector

Network

Investigator

*

connect

IP-to-IP

Gateway

1

Terminal

Device 1

*

* PSTN-to-PSTN

*

MCU 1

connect

*

1

*

1

*

manages

manages

*

VoIP Network

Forensic LAN

VoIP Network Forensic System

Architecture

Evidence

Database 1

VoIP Network Forensic

System Architecture

Distribution A: Approved for public release; distribution is unlimited. 13

Page 15: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Conclusions

• Approach provides a precise framework where to apply security.

• Patterns can guide systems development, be used to evaluate existing designs, be a basis for simulation, and be a pedagogical tool.

• Implement network forensics as a secure and convenient method of collecting/analyzing digital evidence in UC.

• Creation of a comprehensive pattern system to be used in forensic investigation processes.

• Concentrated on pattern functionality/usefulness. First steps toward a methodology for modeling network forensics.

• Potential to be used as evidence. Forensic patterns value may be realized when semi-formal models are reused on similar investigations.

Distribution A: Approved for public release; distribution is unlimited. 14

Page 16: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

Moving Forward

• Strong demand for Cyber security and forensics

• Increasing demand for integrated UC Forensic (UFO)

Framework, rapid prototyping and experimentation

• Expand misuse pattern catalog (new/evolving attacks)

• Live-forensics vs. post-mortem

• Automated network forensics system (MS&A)

• UC / Cloud forensics

15 Distribution A: Approved for public release; distribution is unlimited.

Page 17: Steganophony: Challenges and Detection of …...Network Forensics Patterns • Extra dimension of protection to the system. • Abstract view of forensic information to network investigators.

16