Detecting Targeted Attacks Using Shadow Honeypots K. G. Anagnostakis†, S. Sidiroglou‡, P. Akritidis?, K. Xinidis?, E. Markatos?,A.D.Keromytis‡ †CIS Department, Univ. of Pennsylvania ? Institute of Computer Science - FORTH [email protected] {akritid,xinidis,markatos}@ics.forth.gr ‡ Department of Computer Science, Columbia University {stelios,angelos}@cs.columbia.edu Abstract 1 Introduction Due to the increasing level of malicious activity seen on today’s Internet, organizations are beginning to de- ploy mechanisms for detecting and responding to new at- tacks or suspicious activity, called Intrusion Prevention We present Shadow Honeypots, a novel hybrid archi- Systems (IPS). Since current IPS’s use rule-based intru- tecture that combines the best features of honeypots and sion detection systems (IDS) such as Snort [32] to detect anomaly detection. At a high level, we use a variety of attacks, they are limited to protecting, for the most part, anomaly detectors to monitor all traffic to a protected net- against already known attacks. As a result, new detection work/service. Traffic that is considered anomalous is pro- mechanisms are being developed for use in more pow- cessed by a “shadow honeypot” to determine the accuracy erful reactive-defense systems. The two primary such of the anomaly prediction. The shadow is an instance of mechanisms are honeypots [28, 13, 58, 40, 20, 9] and the protected software that shares all internal state with a anomaly detection systems (ADS) [49, 53, 48, 10, 19]. In regular (“production”) instance of the application, and is contrast with IDS’s, honeypots and ADS’s offer the pos- instrumented to detect potential attacks. Attacks against sibility of detecting (and thus responding to) previously the shadow are caught, and any incurred state changes unknown attacks, also referred to as zero-day attacks. are discarded. Legitimate traffic that was misclassified Honeypots and anomaly detection systems offer differ- will be validated by the shadow and will be handled cor- ent tradeoffs between accuracy and scope of attacks that rectly by the system transparently to the end user. The can be detected, as shown in Figure 1. Honeypots can be outcome of processing a request by the shadow is used to heavily instrumented to accurately detect attacks, but de- filter future attack instances and could be used to update pend on an attacker attempting to exploit a vulnerability the anomaly detector. against them. This makes them good for detecting scan- ning worms [3, 5, 13], but ineffective against manual di- Our architecture allows system designers to fine-tune rected attacks or topological and hit-list worms [43, 42]. systems for performance, since false positives will be fil- Furthermore, honeypots can typically only be used for tered by the shadow. Contrary to regular honeypots, our server-type applications. Anomaly detection systems can architecture can be used both for server and client appli- theoretically detect both types of attacks, but are usually cations. We demonstrate the feasibility of our approach in much less accurate. Most such systems offer a tradeoff a proof-of-concept implementation of the Shadow Hon- between false positive (FP) and false negative (FN) rates. eypot architecture for the Apache web server and the For example, it is often possible to tune the system to Mozilla Firefox browser. We show that despite a con- detect more potential attacks, at an increased risk of mis- siderable overhead in the instrumentation of the shadow classifying legitimate traffic (low FN, high FP); alterna- honeypot (up to 20% for Apache), the overall impact on tively, it is possible to make an anomaly detection system the system is diminished by the ability to minimize the more insensitive to attacks, at the risk of missing some rate of false-positives. real attacks (high FN, low FP). Because an ADS-based USENIX Association 14th USENIX Security Symposium 129 IPS can adversely affect legitimate traffic (e.g., drop a le- imizing the risk of misclassifying a real attack as gitimate request), system designers often tune the system legitimate traffic, since any false positives will be for low false positive rates, potentially misclassifying at- weeded out by the shadow honeypot. tacks as legitimate traffic. • Second, and in contrast to typical honeypots, our ap- Accuracy proach can defend against attacks that are tailored against a specific site with a particular internal state. Honeypots may be blind to such attacks, since they Shadow are not typically mirror images of the protected ap- Honeypot plication. Honeypot • Third, shadow honeypots can also be instantiated in a form that is particularly well-suited for protect- ing against client-side attacks, such as those directed Anomaly Detection against web browsers and P2P file sharing clients. • Finally, our system architecture facilitates easy inte- Scan/Random All Attacks Scope gration of additional detection mechanisms. Attacks Only (Random + Targeted) We apply the concept of shadow honeypots to a proof- of-concept prototype implementation tailored against memory-violation attacks. Specifically, we developed a Figure 1: A simple classification of honeypots and anomaly tool that allows for automatic transformation of existing detection systems, based on attack detection accuracy and code into its “shadow version”. The resulting code al- scope of detected attacks. Targeted attacks may use lists of lows for traffic handling to happen through the regular known (potentially) vulnerable servers, while scan-based at- or shadow version of the code, contingent on input de- tacks will target any system that is believed to run a vulner- rived from an array of anomaly detection sensors. When able service. AD systems can detect both types of attacks, an attack is detected by the shadow version of the code, but with lower accuracy than a specially instrumented sys- state changes effected by the malicious request are rolled tem (honeypot). However, honeypots are blind to targeted back. Legitimate traffic handled by the shadow is pro- attacks, and may not see a scanning attack until after it has cessed successfully, albeit at higher latency. succeeded against the real server. In addition to the server-side scenario, we also investi- We propose a novel hybrid approach that combines the gate a client-targeting attack-detection scenario, unique best features of honeypots and anomaly detection, named to shadow honeypots, where we apply the detection Shadow Honeypots. At a high level, we use a variety of heuristics to content retrieved by protected clients and anomaly detectors to monitor all traffic to a protected net- feed any positives to shadow honeypots for further anal- work. Traffic that is considered anomalous is processed ysis. Unlike traditional honeypots, which are idle whilst by a shadow honeypot. The shadow version is an instance waiting for active attackers to probe them, this scenario of the protected application (e.g., a web server or client) enables the detection of passive attacks, where the at- that shares all internal state with a “normal” instance of tacker lures a victim user to download malicious data. libpng the application, but is instrumented to detect potential at- We use the recent vulnerability of Mozilla [7] tacks. Attacks against the shadow honeypot are caught (which is similar to the buffer overflow vulnerability in and any incurred state changes are discarded. Legitimate the Internet Explorer’s JPEG-handling logic) to demon- traffic that was misclassified by the anomaly detector will strate the ability of our system to protect client-side ap- be validated by the shadow honeypot and will be trans- plications. parently handled correctly by the system (i.e., an HTTP Our shadow honeypot prototype consists of several request that was mistakenly flagged as suspicious will be components. At the front-end of our system, we use a served correctly). Our approach offers several advantages high-performance intrusion-prevention system based on over stand-alone ADS’s or honeypots: the Intel IXP network processor and a set of modified snort sensors running on normal PCs. The network pro- • First, it allows system designers to tune the anomaly cessor is used as a smart load-balancer, distributing the detection system for low false negative rates, min- workload to the sensors. The sensors are responsible for 130 14th USENIX Security Symposium USENIX Association testing the traffic against a variety of anomaly detection such as web browsers, P2P clients, etc. As illustrated heuristics, and coordinating with the IXP to tag traffic that in Figure 2, the architecture is composed of three main needs to be inspected by shadow honeypots. This design components: a filtering engine, an array of anomaly de- leads to the scalability needed in high-end environments tection sensors and the shadow honeypot, which validates such as web server farms, as only a fraction of the servers the predictions of the anomaly detectors. The processing need to incur the penalty of providing shadow honeypot logic of the system is shown graphically in Figure 3. functionality. The filtering component blocks known attacks. Such In our implementation, we have used a variety of filtering is done based either on payload content [52, 2] anomaly detection techniques, including Abstract Pay- or on the source of the attack, if it can be identified load Execution (APE) [48], and the Earlybird algorithm with reasonable confidence (e.g., confirmed traffic bi- [36]. The feasibility of our approach is demonstrated directionality). Effectively, the filtering component short- by examining both false-positive and true attack scenar- circuits the detection heuristics or shadow testing results ios. We show that our system has the capacity to process by immediately dropping specific types of requests before all false-positives generated by APE and EarlyBird and any further processing is done. successfully detect attacks. We also show that when the Traffic passing the first stage is processed by one or anomaly detection techniques are tuned to increase detec- more anomaly detectors.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages16 Page
-
File Size-