Sunteți pe pagina 1din 31

CERT Analysis Center:

Research into Predictive Cyber Analysis


Casey J. Dunlevy
Team Lead

CERT Centers, Software Engineering Institute


Carnegie Mellon University
Pittsburgh, PA 15213-3890

SEI is sponsored by the U.S. Department of Defense


2001 by Carnegie Mellon University

Intelligence - page 1
Why Analysis Research?
Bad Guys!

Threats growing

Vulnerabilities Increasing

Internet now part of the social fabric


- Impact of major cyber-attack would be significant
- Cascading effects a major concern

Reactive response must give way to Proactive


preparation

2000 by Carnegie Mellon University Intelligence - page 2


2000 by Carnegie Mellon University Intelligence - page 3
Threats
National Security
- Critical National Infrastructure
- Cyber-Warfare

Computer Crime
- Organized Crime
- Identity Theft
- Extortion

Non-State Actors
- Terrorists
- Political Activists

2000 by Carnegie Mellon University Intelligence - page 4


Recent Events
Release of malicious code from China - Each release
concurrent with political event

CodeRed In all its forms

CSI/FBI Survey: 90+% experience unauthorized use, 44%


did not report

G8 Finance Ministers estimate computer crime costing


$80 Billion per year

All point to a pervasive fundamental misunderstanding


of the Internet environment

2000 by Carnegie Mellon University Intelligence - page 5


Analytic Approaches
The systematic and broad-scale accumulation of
understanding for current and prospective behaviors on
the Internet.
Technical, Political, Economic, and Social triggers
Attacks and defenses
Vulnerabilities and corrections
Victims and perpetrators

Coupled with:
The systematic and broad-scale examination of Internet
activity to assess, predict and understand current and
prospective political, economic, societal, and
technological impacts (PEST).

2000 by Carnegie Mellon University Intelligence - page 7


Attack Sophistication vs.
Intruder Technical Knowledge
new class of cross site tools

stealth / advanced
Tools
High scanning techniques

packet spoofing denial of service


sniffers distributed
attack tools
Intruder sweepers www attacks
Knowledge
automated probes/scans
GUI
back doors
disabling audits network mgmt. diagnostics
hijacking
burglaries sessions
Attack exploiting known vulnerabilities
Sophistication
password cracking
self-replicating code
password guessing
Attackers
Low
1980 1985 1990 1995 2000
2000 by Carnegie Mellon University Intelligence - page 8
New Threat Paradigm
Traditional Threat Definition:

- Threat = Capability + Intent

New Threat Definition:

- Threat = Capability + Intent + Knowledge


Capability includes tools and ability to access
Intent is the motivation
Knowledge is specific, sophisticated ability to
operate within a system/network after gaining
access

New Threat Paradigm most applicable to high level


threats
2000 by Carnegie Mellon University Intelligence - page 9
Incident Figures
CERT/CC Incidents Reported

- 1988-2000: 47,711
- 1999: 9,859
- 2000: 21,756
- Q1-Q3: 34,754

Vulnerabilities Discovered

- 1995-2000: 2,596
- 1999: 417
- 2000: 1,090
- Q1-Q3: 1,820

2000 by Carnegie Mellon University Intelligence - page 10


Emerging and Future Trends
Computer Network Operations being incorporated into
national military Strategies and Doctrines

Overlapping of Traditional Crime with Cyber-Crime

Use of Nuisance Tools for Overtly Criminal Purposes

Increasing Opportunities for Cyber-Extortion

DDoS Provides National CNO, Organized Crime and Terrorist


Groups a Weapon of Last Resort

Growing Use of Encryption

Exploitation of Jurisdictional Asymmetries

2000 by Carnegie Mellon University Intelligence - page 11


Dealing with the Threat - Analysis
Efforts
Technical Analysis

Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker support

Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies

2000 by Carnegie Mellon University Intelligence - page 12


Low-Packet Filtering
TCP is a session-based protocol
Used for remote access, file transfers
Its hard to use TCP without generating a lot of packets
Negotiation, transmission, configuration, error
checking
Few legitimate low-packet sessions possible
Mostly web access

2000 by Carnegie Mellon University Intelligence - page 13


One Effort Looking Inside the
Noise
Network Activity Example

Overall Activity
Approx 2.5 Gbytes/day

Noise - Below the Radar

2000 by Carnegie Mellon University Intelligence - page 14


Low-Packet Traffic

2000 by Carnegie Mellon University Intelligence - page 15


Initial Results
Spikes usually mean a scan in progress
The peaks amount to <1% of the total byte traffic at any
time
400 Kb vs. 1.4 Gb
Fair results using a top 10 list approach
Identify and investigate 10 busiest low-packet sites per
hour

2000 by Carnegie Mellon University Intelligence - page 16


Future Work
Tighter Metrics
How many unique sessions before its a scan?
Synchronize with tcpdump data
Most single-packet scans exploit tcp flags

2000 by Carnegie Mellon University Intelligence - page 17


Projects - I
1. Routing Anomalies and Backdoors
Find and fix poor router configurations. Identify and
monitor/eliminate backdoors.
2. NetFlow/Collector Architecture
Better data for security analysis, engineering.
3. Detecting Stealth Scans
Identify all scans broad, deep, and stealthy

2000 by Carnegie Mellon University Intelligence - page 18


Projects - II
4. Empirical Baseline
Traffic-based definition of normality -> anomaly
detection
5. Topology Mapping and Maintenance
Create and maintain map of Network -> anomaly
detection
6. DNS Database
Rapid identification of domain names and locations
with history.
7. Laboratory
Discover signatures and experiment with policies

2000 by Carnegie Mellon University Intelligence - page 19


Projects - III
8. Incident Analysis
Identification of vulnerable or compromised hosts
9. Fusion Analysis for Social Adjacency
Discover social networks of cyber attackers
10.Sensor Hierarchy Architecture
Improved defense in depth
11.Analysis Toolkit
Modular architecture and tools for NSS and Sponsors

2000 by Carnegie Mellon University Intelligence - page 20


Dealing with the Threat - Analysis
Efforts
Technical Analysis

Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker support

Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies

2000 by Carnegie Mellon University Intelligence - page 21


Fusion Efforts
Small Packet Probes analyzed
- Patterns emerged
- Identified potential threat

Analysis of CERT/CC Incident Data


- Identified possible link between state and hacker
groups
- Hacker communications assessment

Working on profiles, country studies, event analysis

2000 by Carnegie Mellon University Intelligence - page 22


Low-Packet Traffic

2000 by Carnegie Mellon University Intelligence - page 23


Results of Fused Analysis
What was determined?
- Data collected showed definite network indicators
- Methodology can be developed to provide possible
warning indicators
- Based on limited dataset, network indicators
suggest possible malicious probes by China

Network Indicators suggest number of motivations


- Exploitation
- Site mapping
- Intelligence gathering for further activity

2000 by Carnegie Mellon University Intelligence - page 24


Pakistani/Indian Defacements

10/99 1/00 4/00 7/00 10/00 1/01 4/01

Well written Juvenile

No mention of terrorist organizations

Mentions terrorist organizations

2000 by Carnegie Mellon University Intelligence - page 25


Results of Fused Analysis
First indication of a national Intelligence Agency (ISI)
co-opting hacker groups

Malicious effort targeted against another nation-state

Capabilities increasing with experience

Potential use of cyber-weapons in future

2000 by Carnegie Mellon University Intelligence - page 26


Dealing with the Threat - Analysis
Efforts
Technical Analysis

Fusion Analysis
- Country Studies
- Political, Social, Economic awareness
- Decision Maker Support

Policy/Legal Analysis
- New Legislative efforts
- Lack of consistent policies

2000 by Carnegie Mellon University Intelligence - page 27


Policy and Legal Analysis
Lack of consistent policies

Clarify inter-dependencies between Public and Private


interests

Increase understanding of the global nature of the


Internet

Review proposed and enacted legislation

Analyze statutory conflicts both nationally and


internationally

2000 by Carnegie Mellon University Intelligence - page 28


Problems with Legislation
Lack of laws
- Two U.S. States have no cyberlaw
- Foreign laws vary widely

Ambiguous Laws
- Crime sometimes hard to
define

Lack of Precedent
- Case law limited at best

Conflicting Law
- Illegal in one state Legal in another
- Illegal in one country Legal in another

2000 by Carnegie Mellon University Intelligence - page 29


Problems with Legislation
(continued)
Knowledgeable Legislators?
- Lack of understanding of complexities
- Not technically up-to-date
- Knee Jerk reaction to visible threat

Slow Process
- Keeping up with Technology Trends
- Search Warrants

Authorized v. Unauthorized Access

Intent

2000 by Carnegie Mellon University Intelligence - page 30


Challenges to Analysis Research
Gathering sufficient datasets to make statistically valid
judgements

Developing automated technical analysis tools

Developing a reliable methodology for cyber-analysis

Overcoming organizational bias


against sharing information

Dealing with complex legal issues

Developing analytic professionals

2000 by Carnegie Mellon University Intelligence - page 31


Bottom Line
Time
to deal with the world as it is - Not how
we want it to be! The Monsters are real!

The threat is real, varied, growing, and


distributed

Multi-level, multi-discipline analysis critical


to success

No solutions without working partnerships

2000 by Carnegie Mellon University Intelligence - page 32

S-ar putea să vă placă și