114
Francesco Roveta [email protected] Politecnico di Milano Luca Di Mario [email protected] Politecnico di Milano Federico Maggi [email protected] Politecnico di Milano Giorgio Caviglia [email protected] Politecnico di Milano Stefano Zanero [email protected] Politecnico di Milano Paolo Ciuccarelli [email protected] Politecnico di Milano BURN BARING UNKNOWN ROGUE NETWORKS

BURN: Baring Unknown Rogue Networks

Embed Size (px)

DESCRIPTION

Manual analysis of security-related events is still a necessity to investigate non-trivial cyber attacks. This task is particularly hard when the events involve slow, stealthy and large-scale activities typical of the modern cybercriminals' strategy. In this regard, visualization tools can effectively help analysts in their investigations. In this paper, we present BURN, an interactive visualization tool for displaying autonomous systems exhibiting rogue activity that helps at finding misbehaving networks through visual and interactive exploration. Up to seven values are displayed in a single visual element, while avoiding cumbersome and confusing maps. To this end, animations and alpha channels are leveraged to create simple views that highlight relevant activity patterns. In addition, BURN incorporates a simple algorithm to identify migrations of nefarious services across autonomous systems, which can support, for instance, root-cause analysis and law enforcement investigations.

Citation preview

Page 1: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 2: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 3: BURN: Baring Unknown Rogue Networks
Page 4: BURN: Baring Unknown Rogue Networks

Malicious Activity on the Internet

Page 5: BURN: Baring Unknown Rogue Networks

Malicious Activity on the InternetRogue or Fake Software AD/Click Fraud Targeted Attacks Phishing

Page 6: BURN: Baring Unknown Rogue Networks

Malicious Activity on the InternetRogue or Fake Software AD/Click Fraud Targeted Attacks Phishing

Exposing Malicious Hosts

. . .

Page 7: BURN: Baring Unknown Rogue Networks
Page 8: BURN: Baring Unknown Rogue Networks

FIRE: FInding RoguE Networkswww.maliciousnetworks.orgFunded by WOMBAT FP7 EU Project

Page 9: BURN: Baring Unknown Rogue Networks

Four top Internet threats

Funded by WOMBAT FP7 EU Project

Page 10: BURN: Baring Unknown Rogue Networks

Four top Internet threats

Page 11: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware

Page 12: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets

Page 13: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing

Page 14: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing Spam

Page 15: BURN: Baring Unknown Rogue Networks

Four top Internet threatsMalware Botnets Phishing Spam

Page 16: BURN: Baring Unknown Rogue Networks

Autonomous System (AS)

Page 17: BURN: Baring Unknown Rogue Networks
Page 18: BURN: Baring Unknown Rogue Networks

FIRE: Per-AS Malicious Activity

Page 19: BURN: Baring Unknown Rogue Networks

FIRE: Per-AS Malicious Activity

Activity

Data source

Page 20: BURN: Baring Unknown Rogue Networks

Malware Botnet Phishing Spam

FIRE: Per-AS Malicious Activity

Anubis Anubis PhishTank SpamHaus

Activity

Data source

Page 21: BURN: Baring Unknown Rogue Networks

Malware Botnet Phishing Spam

FIRE: Per-AS Malicious Activity

Anubis Anubis PhishTank SpamHaus

Overall Malicious Score

Many “shady” ISPs exposed Many unaware ISPs helped

Activity

Data source

Outcome

Page 22: BURN: Baring Unknown Rogue Networks
Page 23: BURN: Baring Unknown Rogue Networks
Page 24: BURN: Baring Unknown Rogue Networks

Downside?

Page 25: BURN: Baring Unknown Rogue Networks

Downside?

Page 26: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Page 27: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

Page 28: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

aim

Page 29: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

AcademicsPractitioners aim

Page 30: BURN: Baring Unknown Rogue Networks

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli

Visualization and Knowledge Discoveryon top of FIRE

AcademicsPractitioners

InternetUsersaim

Page 31: BURN: Baring Unknown Rogue Networks
Page 32: BURN: Baring Unknown Rogue Networks

System Overview

Page 33: BURN: Baring Unknown Rogue Networks
Page 34: BURN: Baring Unknown Rogue Networks

Global view

Page 35: BURN: Baring Unknown Rogue Networks

AS view

Global view

Page 36: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Page 37: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Page 38: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Bubb

le chart

Geographical map

Trend chart

Page 39: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Bubb

le chart

Geographical map

Trend chart

Page 40: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 41: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 42: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 43: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 44: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 45: BURN: Baring Unknown Rogue Networks

Global view

Bubb

le chart

Geographical map

Trend chart

Page 46: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 47: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 48: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 49: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 50: BURN: Baring Unknown Rogue Networks

Bubble Chart

Page 51: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 52: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 53: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 54: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 55: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 56: BURN: Baring Unknown Rogue Networks

Geographical Map

Page 57: BURN: Baring Unknown Rogue Networks

Trend Chart

Page 58: BURN: Baring Unknown Rogue Networks

Trend Chart

Page 59: BURN: Baring Unknown Rogue Networks

Global view

Page 60: BURN: Baring Unknown Rogue Networks

AS view

Page 61: BURN: Baring Unknown Rogue Networks

AS view

De

tails HistoryMigra

tion

Longevity

Page 62: BURN: Baring Unknown Rogue Networks

AS view

De

tails HistoryMigra

tion

Longevity

Page 63: BURN: Baring Unknown Rogue Networks

History Chart

Page 64: BURN: Baring Unknown Rogue Networks

History Chart

Page 65: BURN: Baring Unknown Rogue Networks

History Chart

Page 66: BURN: Baring Unknown Rogue Networks
Page 67: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 68: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 69: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 70: BURN: Baring Unknown Rogue Networks

Service Longevity Chart

Page 71: BURN: Baring Unknown Rogue Networks
Page 72: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 73: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 74: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 75: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 76: BURN: Baring Unknown Rogue Networks

Service Migration Screen

Page 77: BURN: Baring Unknown Rogue Networks

De

tails HistoryMigra

tion

Longevity

AS view

Page 78: BURN: Baring Unknown Rogue Networks

Rogue behavior analysis

Page 79: BURN: Baring Unknown Rogue Networks

Service Migration

Page 80: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

Page 81: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$

!"#$%&"'("

)*$"+,"-%

Shutdowns

Page 82: BURN: Baring Unknown Rogue Networks

Service Migration

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$%$&'()*+,-+,().)/$0+

12)3&-45)3&-16)*+7

85

455

!"#$

!"#$%&"'("

)*$"+,"-%

!"#$

!"#$%&"'("

)*$"+,"-%

Shutdowns

Possible Migrations

Page 83: BURN: Baring Unknown Rogue Networks

Service Migration - Details

Page 84: BURN: Baring Unknown Rogue Networks

Service Migration - Details

!"#$

!"#$%&"'("

)*$"+,"-%

!"#$

!"#$%&"'("

)*$"+,"-%Shutdowns

!"#$

!"#$%&"'("

)*$"+,"-%

Possible Migrations

Page 85: BURN: Baring Unknown Rogue Networks

Compatibility Score

Page 86: BURN: Baring Unknown Rogue Networks

Compatibility Score

Source AS Destination AS

Page 87: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

Page 88: BURN: Baring Unknown Rogue Networks

Compatibility Score

High compatibility

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Page 89: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Page 90: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

j 2 {C&C, Malware, Spam, Phishing}

Page 91: BURN: Baring Unknown Rogue Networks

Compatibility Score

C&C

Malware

Phishing

Spam

Source AS Destination AS

!"#$%&'(')'&*+,+- !"#$%&'(')'&*+,+./-0

!"#$%&%'()$$#'*+,-#.%/%$%.0

12

13

14

154

>

>

>

>

637

64

687

65

137

14

187

15

>

>

>

>

637

64

687

65

!"#$

1234562782

Low compatibility

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

j 2 {C&C, Malware, Spam, Phishing}

Mi C(j) : Si�AS ⌅⇥ [0, 1]

j ⇤ J =

{phishing,malware, spam, bot}

C(j)(s, d) :=mina�{s,d} �

(j)(a)

maxa�{s,d} �(j)(a),

�(j)min �(j)max �(j)(·)

j

J

Cs,d :=

�j�J C(j)(s, d) · �(j)(s)

�j�J �(j)(s)

Si

Page 92: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 93: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 94: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 95: BURN: Baring Unknown Rogue Networks

Tolerance to long-living rogue hosts

Page 96: BURN: Baring Unknown Rogue Networks
Page 97: BURN: Baring Unknown Rogue Networks

AS view

Global viewTimeline

Activ

ity fil

ter

AS Tracking List

Country filter

Page 98: BURN: Baring Unknown Rogue Networks
Page 99: BURN: Baring Unknown Rogue Networks

Timeline and Time Range selection

Page 100: BURN: Baring Unknown Rogue Networks

Timeline and Time Range selection

Page 101: BURN: Baring Unknown Rogue Networks
Page 102: BURN: Baring Unknown Rogue Networks

Activity Filter

Page 103: BURN: Baring Unknown Rogue Networks

Activity Filter

Page 104: BURN: Baring Unknown Rogue Networks
Page 105: BURN: Baring Unknown Rogue Networks

Country Filter

Page 106: BURN: Baring Unknown Rogue Networks

Country Filter

Page 107: BURN: Baring Unknown Rogue Networks
Page 108: BURN: Baring Unknown Rogue Networks

Autonomous System Tracking List

Page 109: BURN: Baring Unknown Rogue Networks

Autonomous System Tracking List

Page 110: BURN: Baring Unknown Rogue Networks

Conclusions

Limitations

Future Work

Page 111: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Limitations

Future Work

Page 112: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Migrations are difficult to validate

Stress feature to avoid cluttered bubble map

Limitations

Future Work

Page 113: BURN: Baring Unknown Rogue Networks

BURN improves FIRE

Knowledge discovery through data exploration

Academics / Practitioners / Internet users

Conclusions

Migrations are difficult to validate

Stress feature to avoid cluttered bubble map

Limitations

BURN is in private beta — DEMO available

Future Work

Bot meta-data from Anubis for migration analysis

Usability study with three target users

Page 114: BURN: Baring Unknown Rogue Networks

Francesco [email protected]

Politecnico di Milano

Luca Di [email protected]

Politecnico di Milano

Federico [email protected] di Milano

Giorgio [email protected]

Politecnico di Milano

Stefano [email protected] di Milano

Paolo [email protected]

Politecnico di Milano

BURNBARING UNKNOWN ROGUE NETWORKS

La visualizzazione come strumento per analizzareil comportamento dei network malevoli