Web Tap: Detecting Covert Web Traffic Kevin Borders, Atul Prakash

34 Slides3.02 MB

Web Tap: Detecting Covert Web Traffic Kevin Borders, Atul Prakash University of Michigan Department of Electrical Engineering and Computer Science, 2004 Presented by Nate Salemme [email protected] Worcester Polytechnic Institute 1

Disclaimer Content taken from Proceedings of the 11th ACM conference on Computer and communications security – Presented by Kevin Borders & Atul Prakash Images and graphs also borrowed from – http://www.cisa.umbc.edu/courses/cmsc/444/fall05/spyware/webtap.pdf Presentation template borrowed from Mike Putnam. Thanks Mike. Worcester Polytechnic Institute 2

About the Authors Atul Prakash -Professor in the Department of EECS at the University of Michigan. Kevin Borders -Graduate student at the University of Michigan -Involved in Eta Kappa Nu -He is also currently serving as the Director of the Software Systems Laboratory. Worcester Polytechnic Institute 3

Outline OUTLINE Introduction Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Threat Model Related & Future Work Conclusion Thoughts Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Worcester Polytechnic Institute 4

Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Hackers life use to be easy – – – – Direct connection to Internet No protection Backdoors and Trojans easily spawned Programs like AOL made this easy Security became BIG concern – Firewalls – Proxy Servers – Mail Servers Worcester Polytechnic Institute 5

Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts The Firewall Worcester Polytechnic Institute 6

Introduction OUTLINE Introduction Threat Model Web Tap Filters Hackers get creative – Firewalls leave open port 80 (HTTP) System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts – Use outgoing HTTP as attack vehicle Examples – Spyware, Adware – User information can be hidden within legitimate outgoing HTTP traffic – System resources severely hindered through some malicious spyware Worcester Polytechnic Institute 7

Introduction OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap – Definition: “A network-level anomaly detection system that takes advantage of legitimate web request patterns to detect convert communication, backdoors, and spyware activity that is tunneled through outbound HTTP connections” – Web Tap Guys – Deployed at an organization’s proxy server or router – Acts as an extension to the proxy/firewall where all outgoing traffic is passed through – A ‘training period’ is used to calibrate Web Tap Worcester Polytechnic Institute 8

Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation HTTP Tunnels Vulnerabilities Related & Future Work Conclusion Thoughts Backdoors Programs Spyware Worcester Polytechnic Institute 9

Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion HTTP Tunnels – Allow non-HTTP services to be access through an outgoing HTTP session Thoughts – Wsh(Microsoft Script Host) allows file transfer and remote shell access over HTTP – Firepass creates a tunnel between a client process and a remote service Worcester Polytechnic Institute 10

Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Backdoor Programs – Usually spawned by a user opening a Trojan from email attachment or Internet Thoughts – Trojan runs on computer as a client and makes ‘calls’ to a server hosting a certain script – These calls are hidden within outgoing HTTP HTTP headers or POST data Worcester Polytechnic Institute 11

Threat Model OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Spyware – Installed by piggybacking on legitimate software (WeatherBug, Kazaa) Thoughts – Uses the same methods as described with Backdoor Worcester Polytechnic Institute 12

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Web Tap was written in Python – Easy to code – Type Safe – Platform Independent Web Tap reside in a module where all outgoing HTTP traffic is funneled through this module and either analyzed real-time or logged and analyzed offline Web Tap calibrated based on 30 users over 1 week training period Worcester Polytechnic Institute 13

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Some “hope to’s ” – Hope to keep additional state in the header of outgoing requests to verify integrity (Right now just calculates # of bytes in header) Thoughts – Hope to measure other statistics Request type (image, html, CGI, etc) Request Content Inbound Bandwidth Inbound Content Worcester Polytechnic Institute 14

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters Web deploys the following filters – Header Formatting System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts – Delay Times – Individual Request Size – Outbound Bandwidth Usage – Request Regularity – Request Time of Day Worcester Polytechnic Institute 15

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Header Formatting Filter – Parses each header – If header is indicative of a non-browser request, sound alarm – Example- IE sends out header with XP signature when all computers are running Windows 98 – Good at detecting unwanted clients AIM Express iTunes Gator Worcester Polytechnic Institute 16

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Delay Times Filter – Measure inter-request arrival time for specific clients – Goal is to detect programs that makes requests with set timers – “Jumps” in CDF indicate areas of concern (30 seconds, 4 minutes, 5 minutes) Worcester Polytechnic Institute 17

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Individual Request Size – Requests to most sites contain little information – Hackers needs to send out large amounts of data to transfer files off a remote host – Out of 1600 sites 99.28% 11 sites 3 KB 4 sites 10 KB – Most effective setting is at 3 KB Worcester Polytechnic Institute 18

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Outbound Bandwidth Usage – Outbound bandwidth expected to be LOW for normal web browsing – Outbound bandwidth usage will increase when hackers use HTTP for covert communication – Measure both aggregate and per site bandwidth; per site used – Lower bound set at 20 KB (bytes/day) per site per user – Upper bound set at 60 KB (bytes/day) per site per user Vulnerabilities Related & Future Work Conclusion Anywhere in here is good Thoughts Worcester Polytechnic Institute 19

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Regularity – Due to bandwidth constraints of previous filters, Hackers spread requests over long time period – Legitimate web traffic is bursty – Too many requests indicate website is being accessed by automated program – 16% Threshold chosen for 8 hr plot Worcester Polytechnic Institute 20

Web Tap Filters OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Time of Day – People tend to follow a set schedule of browsing times – When requests are made outside of normal browsing period, alerts can be raised – Very effective in corporate environments (set schedules) Worcester Polytechnic Institute 21

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work The TEST – 40 Days, 30 clients at the University of Michigan Conclusion Thoughts – 1 Week Training Period – ALL FILTERS were active – 428,608 requests logged – 6441 unique websites Worcester Polytechnic Institute 22

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Header Format Filter – – – Detected 5 out of 30 clients that had some form of Adware Other non-desirable clients detected (AIM Express, iTunes) NO FALSE ALARMS Worcester Polytechnic Institute 23

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Delay Time Filter – – – Low false alarm rate (1 every 6 days) Some legit sites blocks that used timers (espn.com, nytimes.com) Recommended that System Admins create “allowable sites” Worcester Polytechnic Institute 24

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Size Filter – – – High false alarm rate (34%) Mostly ASP and shopping cart scripts Again, create database of trusted sites Worcester Polytechnic Institute 25

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Request Regularity – – – Using both count and variance measurements Approximately 1 false alarm every 3 days Found Adware such as browser search bars that other filters did not pick up Worcester Polytechnic Institute 26

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Daily Bandwidth Filter – – – As threshold decreases, false positives increase 60KB reasonable for small group sizes 20 KB roughly 1 false alarm per day Worcester Polytechnic Institute 27

System Evaluation OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Time of Day Filter – – – Training period lengthened to the first TWO weeks During training period spyware and adware programs were active! Time of Day filter pretty much useless Worcester Polytechnic Institute 28

System Evaluation OUTLINE Introduction Web Tap vs. Third Party HTTP Tunnel Programs Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts – Wsh, Hopster, Firepass – These programs help people inside a network bypass firewall restrictions – All detected by Web Tap, sweet Web Tap vs. Backdoor program (Tunl) – – – – – Tunl written for windows (since it’s vulnerable) With no workload, set off 3 filters Minimal workload, set off more filters Moderate workload, even more filters Pointless Worcester Polytechnic Institute 29

Vulnerabilities OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Single Request Size Filter – Large data transfers can be broken into multiple smaller transfers Delay Time Filter – Delays could be randomized to prevent detection Time of Day Filter – Schedule requests when users are active Request Regularity – Keep a running count of activity and stay below threshold – If threshold not known, then filter can be avoided by emulating the regularity of a common site Bandwidth limit filter – Keep a running count of total bytes that have been sent that day. Don’t exceed threshold Worcester Polytechnic Institute 30

Related and Future Work Related work OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Signature Analysis [Ad-Aware, Snort, Spybot] – Signature rules used to detect attacks – Web Tap relies on anomalies rather than signature – Signature Analysis is limited since new attacks are developed. Human browsing patterns [A. Bestavros, D. Marwood, T. Kelly] – Relies on human browsing patterns – Web Tap uses some of the same browsing patterns (delay time, request size, bandwidth usage) – WebTap uses this information to determine if it’s legitiment; previous research used it for performance reasons Content-filter Proxy [MIMEsweeper, Websense] – Block certain websites through a proxy server – Hackers can still get around this by other web proxys http://www.freeproxy.ru/en/free proxy/cgi-proxy.htm Worcester Polytechnic Institute 31

Related and Future Work Future Work OUTLINE Introduction Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Conclusion Thoughts Create database that contains hosts that tend to set off alarms – Reduce false positives Proxy caching – Place proxy before Web Tap – This would help isolate legitimate web request from the anomalous ones Compress large transactions – Reduce false positives for bandwidth filter – Example; 3.87 KB POST request can be compressed to 2.07 KB – Good Hackers are likely to already have compressed their requests which would prevent further compression Worcester Polytechnic Institute 32

Conclusion OUTLINE Introduction Threat Model Web Tap Filters Web Tap monitors outgoing HTTP traffic as opposed to the actual attack on a server System Evaluation Vulnerabilities Related & Future Work Conclusion Design filters cover wide range of Hacker tactics Thoughts Only concerned with the detection process 30 users, 40 days, 1 week training period Successful at detecting spyware, adware, HTTP tunneling programs, backdoors Vulnerabilities explained Manageable number of false alarms Worcester Polytechnic Institute 33

Thoughts OUTLINE Introduction Good paper, easy to read and well explained Threat Model Web Tap Filters System Evaluation Vulnerabilities Related & Future Work Interesting approach Conclusion Thoughts Problems – User groups will be different depending on size, characteristics, etc. Each implementation of Web Tap would need to be customized – Sites with refresh counters would trigger alerts (espn.com gamecast) Not good. – They don’t mention flash crowds – Spyware/Adware screws up Time of Day filter – Tunl – . Applicable for schools and companies. Home? Worcester Polytechnic Institute 34

Back to top button