Transcript
Page 1: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 2: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 3: BURN: Baring Unknown Rogue Networks
Page 4: BURN: Baring Unknown Rogue Networks

Malicious Activity on the Internet

Page 5: BURN: Baring Unknown Rogue Networks

Malicious Activity on the InternetRogue or Fake Software AD/Click Fraud Targeted Attacks Phishing

Page 6: BURN: Baring Unknown Rogue Networks

Malicious Activity on the InternetRogue or Fake Software AD/Click Fraud Targeted Attacks Phishing

Exposing Malicious Hosts

. . .

Page 7: BURN: Baring Unknown Rogue Networks
Page 8: BURN: Baring Unknown Rogue Networks

FIRE: FInding RoguE Networkswww.maliciousnetworks.orgFunded by WOMBAT FP7 EU Project

Page 9: BURN: Baring Unknown Rogue Networks

Four top Internet threats

Funded by WOMBAT FP7 EU Project

Page 10: BURN: Baring Unknown Rogue Networks

Four top Internet threats

Page 11: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware

Page 12: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets

Page 13: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing

Page 14: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing Spam

Page 15: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing Spam

Page 16: BURN: Baring Unknown Rogue Networks

Autonomous System (AS)

Page 17: BURN: Baring Unknown Rogue Networks
Page 18: BURN: Baring Unknown Rogue Networks

FIRE: Per-AS Malicious Activity

Page 19: BURN: Baring Unknown Rogue Networks

FIRE: Per-AS Malicious Activity

Activity

Data source

Page 20: BURN: Baring Unknown Rogue Networks

Malware Botnet Phishing Spam

FIRE: Per-AS Malicious Activity

Anubis Anubis PhishTank SpamHaus

Activity

Data source

Page 21: BURN: Baring Unknown Rogue Networks

Malware Botnet Phishing Spam

FIRE: Per-AS Malicious Activity

Anubis Anubis PhishTank SpamHaus

Overall Malicious Score

Many “shady” ISPs exposed Many unaware ISPs helped

Activity

Data source

Outcome

Page 22: BURN: Baring Unknown Rogue Networks
Page 23: BURN: Baring Unknown Rogue Networks
Page 24: BURN: Baring Unknown Rogue Networks

Downside?

Page 25: BURN: Baring Unknown Rogue Networks

Downside?

Page 26: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 27: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

Page 28: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

aim

Page 29: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

AcademicsPractitioners aim

Page 30: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

AcademicsPractitioners

InternetUsersaim

Page 31: BURN: Baring Unknown Rogue Networks
Page 32: BURN: Baring Unknown Rogue Networks

System Overview

Page 33: BURN: Baring Unknown Rogue Networks
Page 34: BURN: Baring Unknown Rogue Networks

Global view

Page 35: BURN: Baring Unknown Rogue Networks

AS view

Global view

Page 36: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Page 37: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Page 38: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Bubb

le chart

Geographical map

Trend chart

Page 39: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Bubb

le chart

Geographical map

Trend chart

Page 40: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 41: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 42: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 43: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 44: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 45: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 46: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 47: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 48: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 49: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 50: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 51: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 52: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 53: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 54: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 55: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 56: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 57: BURN: Baring Unknown Rogue Networks

Trend Chart

Page 58: BURN: Baring Unknown Rogue Networks

Trend Chart

Page 59: BURN: Baring Unknown Rogue Networks

Global view

Page 60: BURN: Baring Unknown Rogue Networks

AS view

Page 61: BURN: Baring Unknown Rogue Networks

AS view

De

tails HistoryMigra

tion

Longevity

Page 62: BURN: Baring Unknown Rogue Networks

AS view

De

tails HistoryMigra

tion

Longevity

Page 63: BURN: Baring Unknown Rogue Networks

History Chart

Page 64: BURN: Baring Unknown Rogue Networks

History Chart

Page 65: BURN: Baring Unknown Rogue Networks

History Chart

Page 66: BURN: Baring Unknown Rogue Networks
Page 67: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 68: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 69: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 70: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 71: BURN: Baring Unknown Rogue Networks
Page 72: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 73: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 74: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 75: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 76: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 77: BURN: Baring Unknown Rogue Networks

De

tails HistoryMigra

tion

Longevity

AS view

Page 78: BURN: Baring Unknown Rogue Networks

Rogue behavior analysis

Page 79: BURN: Baring Unknown Rogue Networks

Service Migration

Page 80: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

Page 81: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$

!"#$%&"'("

)*$"+,"-%

Shutdowns

Page 82: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$

!"#$%&"'("

)*$"+,"-%

!"#$

!"#$%&"'("

)*$"+,"-%

Shutdowns

Possible Migrations

Page 83: BURN: Baring Unknown Rogue Networks

Service Migration - Details

Page 84: BURN: Baring Unknown Rogue Networks

Service Migration - Details

!"#$

!"#$%&"'("

)*$"+,"-%

!"#$

!"#$%&"'("

)*$"+,"-%Shutdowns

!"#$

!"#$%&"'("

)*$"+,"-%

Possible Migrations

Page 85: BURN: Baring Unknown Rogue Networks

Compatibility Score

Page 86: BURN: Baring Unknown Rogue Networks

Compatibility Score

Source AS Destination AS

Page 87: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

Page 88: BURN: Baring Unknown Rogue Networks

Compatibility Score

High compatibility

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Page 89: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Page 90: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

j 2 {C&C, Malware, Spam, Phishing}

Page 91: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

j 2 {C&C, Malware, Spam, Phishing}

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

Page 92: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 93: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 94: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 95: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 96: BURN: Baring Unknown Rogue Networks
Page 97: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Page 98: BURN: Baring Unknown Rogue Networks
Page 99: BURN: Baring Unknown Rogue Networks

Timeline and Time Range selection

Page 100: BURN: Baring Unknown Rogue Networks

Timeline and Time Range selection

Page 101: BURN: Baring Unknown Rogue Networks
Page 102: BURN: Baring Unknown Rogue Networks

Activity Filter

Page 103: BURN: Baring Unknown Rogue Networks

Activity Filter

Page 104: BURN: Baring Unknown Rogue Networks
Page 105: BURN: Baring Unknown Rogue Networks

Country Filter

Page 106: BURN: Baring Unknown Rogue Networks

Country Filter

Page 107: BURN: Baring Unknown Rogue Networks
Page 108: BURN: Baring Unknown Rogue Networks

Autonomous System Tracking List

Page 109: BURN: Baring Unknown Rogue Networks

Autonomous System Tracking List

Page 110: BURN: Baring Unknown Rogue Networks

Conclusions

Limitations

Future Work

Page 111: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Limitations

Future Work

Page 112: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Migrations are difficult to validate

Stress feature to avoid cluttered bubble map

Limitations

Future Work

Page 113: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Migrations are difficult to validate

Stress feature to avoid cluttered bubble map

Limitations

BURN is in private beta — DEMO available

Future Work

Bot meta-data from Anubis for migration analysis

Usability study with three target users

Page 114: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli


Recommended