SlideShare a Scribd company logo
1 of 44
White list
Black list
References
1. Tae-Hyung Kim,Young-Sik Choi,Jong Kim, Sung Je Hong, “Annulling
SYN Flooding Attacks with Whitelist”, 22nd International Conference on
Advanced Information Networking and Applications - Workshops, 2008.
(AINAW 2008). 25-28 March 2008 Page(s):371 – 376.
2. He, Peizhou; Wen, Xiangming; Zheng, Wei; “A Novel Method for Filtering
Group Sending Short Message Spam”,International Conference on
Convergence and Hybrid Information Technology, 2008. (ICHIT '08). 28-
30 Aug. 2008 Page(s):60 – 65.
3. Hui-Jun Lu; Shu-Zhen Leng; “Log-Based Recovery Scheme for
Executing Untrusted Programs”, Machine Learning and Cybernetics,
2007 International Conference on Volume 4, 19-22 Aug. 2007 Page(s):
2136 – 2139.
4. Phua, C.; Gayler, R.; Smith-Miles, K.; Lee, V.; “Communal Detection of
Implicit Personal Identity Streams”,Data Mining Workshops, 2006. ICDM
Workshops 2006. Sixth IEEE International Conference on Dec. 2006
Page(s):620 - 625
5. Jian Zhang, Phillip Porras, and Johannes Ullrich, “Highly Predictive
Blacklisting”, Usenix Security, August 2008.
Whitelists Blacklists
• Whitelist contains sources and software
that is deemed to be acceptable.
• Blacklist contains sources and software
that is harmful.
Whitelist Applications
• IP address classification
• SPAM reduction: approved sender list
• SMS
• Software execution
Review of [1]
Tae-Hyung Kim,Young-Sik Choi,Jong Kim, Sung Je Hong,
“Annulling SYN Flooding Attacks with Whitelist”,
22nd International Conference on Advanced Information
Networking and Applications - Workshops, 2008. (AINAW 2008).
25-28 March 2008 Page(s):371 – 376.
SYN Flooding attack
• Attacker sends many SYN (synchronize) requests to a
target system.
• Exploits the 3-way handshake used to set up a TCP
connection.
• Results in Denial of Service.
Client Server
SYN
SYN-ACK
ACK
TCP three – way handshake.
What if ACK never issued.
• Malicious client.
• Spoofed source IP address.
Incomplete connection .
• Waiting for network delayed ACK.
Large queues at the server.
Legit clients cannot connect.
[1]
Potential Defenses
• Bigger buffer queues: postpones the inevitable.
• SYN Cache
– Typically different buffers for each port
– SYN Cache uses one buffer for several ports
– Fails for aggressive SYN flooding attack
• Random Drop
– Randomly substitute an element in the buffer with a
new request
– Increases probability of successful connection
– Disrupts pending connections
[1]
Possible Defense - 2
• SYN Cookies
– Stores the source IP and port number in packet sent
back to the client
– ACK must contain the information
– No buffer needed at server
– In normal operations a backlog buffer queue is
maintained. When buffer is full then Cookies are
activated.
– If ACK info network delayed, then connection info is
lost.
• Preferred solution – how to improve it!
[1]
SYN handshakes
• Under SYN flooding attack
– SYN is lost, then it is
retransmitted
– What if ACK lost, server
cannot retransmit if SYN
Cookies is used.
• PSH/ACK has data
(a) Server can extract ACK from
PSH/ACK
(b) Cannot respond to packet loss
[1]
Features of Defense
• Service Continuity
– Service should not be disrupted during SYN
flooding attack
• Service Separation
– Legitimate connections from unknown
connection request
• Service differentiation
– Robust connection to legitimate connections
[1]
Whitelisting Defense
• Whitelist maintains IP addresses of trusted
clients.
• These IPs can make a successful
connection in spite of SYN flooding
attacks.
• Facilitate searches by using a hash
function.
[1]
Proposed Approach
• Normal state
– Conventional approach - use backlog queue
buffer.
• Attack response state
– Detecting attack state
• Buffer has many half connections
– Separate requests into legitimate (WL
consistent) and unknown.
• Legitimate use backlog queue
• Unknown handled with SYN Cookie
[1]
Managing Whitelists
• Initialization
– Sys admin collects trusted clients using logs for
services like SMTP and SSH. May include trusted
subnets.
• Additions
– Trusted clients based on policy
– Successful connection under SYN Flooding attack -
Completed SYN Cookie connection
• Removals
– IP has too many half open connections
[1]
Experimental Results
• Connection success % increases from 64%
(SYN cookie) to 90% (WL approach)
– Under attack client to server ACK and other
messages are lost.
• Fatal for SYN cookie – no recovery
• WL approach – retransmission possible
• WL approach requires less time for connection
establishment
• Backlog Queue usage is lower for WL approach
[1]
Hui-Jun Lu; Shu-Zhen Leng; “Log-Based
Recovery Scheme for Executing
Untrusted Programs”.
Machine Learning and Cybernetics, 2007 International
Conference on Volume 4, 19-22 Aug. 2007 Page(s):
2136 – 2139
Programs
• Whitelist (trusted programs)
• Blacklist
• Uncertified
– All programs cannot be white or black listed
– Safe execution of uncertified (untrusted)
programs is often required
[3]
Uncertified Program
• Detection
– Virus scanning
– Signature verification
• Protection
– Confine execution to sandbox or isolated environment
– More realistic the environment, the higher the penalty
• Recovery
– Should not interfere with the program execution
– Monitoring and recording to return to known good
state
[3]
Detection and Verification
• Virus checking: run anti-virus software
– Only detect known virus
• Digital signature and hash function
– Access a remote trusted site
• For new software
– Safe policy that guarantees safe behavior
[3]
Prevention and Isolation
• Untrusted programs can access limited
resources
– Predetermined security policy
• Realistic environment requires replication
of entire file system
• Virtual machines can isolate the untrusted
program
[3]
Log Based Recovery
• Checkpoints
– Save the state at regular time intervals
– In case of “fault” rollback to a checkpoint
• Logs are maintained
– Rollback as close to the event
• Effective recovery improves dependability
– Does not avoid failure (fault)
– Sort of a power UNDO
[3]
System Integrity
• Ensure file system integrity
• Other operations
• Untrusted systems operations that lead to
state change should be prevented
• Log based recovery
– Monitors the process
– No change to program or context
– Backs up the file modification
[3]
Approach
• Check if the program is in whitelist or
blacklist
– Label other programs as suspicious
• Log and back up system
– Roll back to the check point
[3]
System Requirements
• Application transparency
– No changes to the untrusted program or its context
– No restrictions on the file system access
• Easy recovery
– Rollback to an initial state
– Restore the file system
• Ease of use
– System provides summary
– Detect a failure
[3]
[3]
Highly Predictive Blacklisting
[5]
Zhang, Porras, Ullrich
Network Address Blacklist
• Addresses that are undesirable
– Previous illicit activity
• Members of the volunteer DShield org
identify potential blacklist entries
• Blacklist
– Global Worst Offender List (GWOL)
• Broad based contributions
– Local Worst Offender List (LWOL)
• Historical patterns for the local networks
[5]
Global/Local Worst Offender List
• GWOL
– Prolific attack sources
– Too many – firewall may not be able to handle this list
– Miss targeted attacks
• Low global profile
• Maybe more dangerous
• LWOL
– Local behavior and defensive reaction
– Not useful for broader dissemination
• Offender must cross a threshold of attacks
[5]
High Quality Black List
Requirements
• Need to ready for insertion in firewalls early –
before an attack
– Lists should be updated in timely fashion
– High accuracy
– Typically number of attacks must pass a threshold
before list insertion
• Problems
– Contributors from a small part of the internet
– Directed attacks may not have enough global visibility
[5]
Highly Predictive Blacklist
• Pre-filter to remove unreliable alerts
• Relevance – based attack source ranking
• Severity analysis: modulate the analysis
to reflect the malware propagation
patterns
• Leads to individualized lists
[5]
HPB architecture
[5]
Prefiltering
• Reduce errors (noise) in the data set
– Data may include log entries from non-hostile (benign
causes) activity
• Prefiltering involves
– Remove logs regarding unassigned or invalid IPs e.g.
192.168.x.x or 10.x.x.x
– Apply a white list of known addresses of web
crawlers, measurement service, common software
update sources
– Logs from source ports TCP 53 (DNS), 80 (HTTP), 25
(SMTP), 443 (secure web) and destination ports TCP
53 and 25.
[5]
Relevance Ranking
• Helps to specialize the blacklist to a specific
consumer
• Assess the closeness of the attacker to the
consumer: a measure of the likelihood of the
attacker targeting this consumer
• Does not assess the severity of the attack(er)
• Pairs of consumers share several attackers, i.e.
consumers have experience of attacks from a
common source IP
– This is not random, but a long term phenomenon
[5]
Relevance Ranking - 2
• Intuitive
underpinnings of
relevance.
• Relevance wrt v1
– s5 is more than s6.
– s5 is more than s7.
– s4 is more than s5, s6,
and s7
1 2
3
4 5
2
1
1
1
1
Correlation Graph [5]
Relevance Ranking - 3
• mi = # of attackers for vi
• mj = # of attackers for vj
• mij = # of attackers for vij
• Wij = strength of connection
between vi and vj = mi / mij
1 2
3
4 5
2
1
1
1
1
[5]
Relevance Ranking - 4
• Source relevance to victim
rs = W bs
• Calculation based only on observations
• Sample is very small fraction of the
internet
• Need to add “look ahead” capability
[5]
Relevance Ranking - 5
• Attack (star) on 2.
• How to assess the
relevance of this attack
to 1?
• Traverse the relevance
paths; assess link
weights
= 0.5*0.2+0.3*0.2 = 0.16
• Relevance propogation
[5]
Relevance Ranking - 6
• Which attack is more relevant to 1?
• Propagate the relevance
• More propagation possibilities the
completely connected sub-graph – more
paths [5]
• Relevance vector W bs
• After one more hop W W bs
• Total Relevance value = W bs + W2 bs
• Eventually Relevance vector will be
Σ∞
i = 1 (αW)I bs
• Similarity to Page Rank
Relevance Ranking - 7
[5]
Attack Severity
• Model based on 3 components
– Malicious behavior, number of IPs targeted, geographic metric
• Model of malicious behavior
– Identify typical scan-and-infect software
– Conduct IP sweep of small sets of ports
– Let MP be the set of malware associated ports
[5]
Attack Severity - 2
• Compute malware port score (PS) for
attacker s
• PS(s) ={(wu x cu)+(wm x cm)}/ cu
• cm= total number of malware ports
connected by s
• cu = total number of ports connected by s
• wu and wm are the respective weights
• wm > wu: authors use wm = 4 wu
[5]
Attack Severity - 3
• Second measure
– Number of unique IPs connected by s {TC(s)}
– Typically TC(s) is the prioritization metric used by
GWOL
• Third measure
– Ratio of national to international IPs targeted by
attacker s. {IR(s)}
• Overall measure =
PS(s)+ log (TC(s)) + δ log(IR(s))
• Log reduces the impact of the last two terms
[5]
Final Blacklist
• For each attacker relevance ranking and
severity score are used.
• Assume that the target is a list of L.
• First use attacker relevance ranking to
reduce the list. Produce a list of size cL.
• Next use severity to prune the list to L.
[5]
Final Blacklist - 2
• Final score is computed with k being relevance
rank of the attacker s.
[5]
[5]

More Related Content

Similar to Whitelist.ppt

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 

Similar to Whitelist.ppt (20)

CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
FireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slidesFireSIGHT Management Center (FMC) slides
FireSIGHT Management Center (FMC) slides
 
Introduction to Distributed Systems
Introduction to Distributed SystemsIntroduction to Distributed Systems
Introduction to Distributed Systems
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo -  Guide to Building Secure InfrastructuresPLNOG 8: Merike Kaeo -  Guide to Building Secure Infrastructures
PLNOG 8: Merike Kaeo - Guide to Building Secure Infrastructures
 
INTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEMINTERNET SECURITY SYSTEM
INTERNET SECURITY SYSTEM
 
intrusion detection system (IDS)
intrusion detection system (IDS)intrusion detection system (IDS)
intrusion detection system (IDS)
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 
ch18 ABCD.pdf
ch18 ABCD.pdfch18 ABCD.pdf
ch18 ABCD.pdf
 

More from ssuserec53e73

Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
ssuserec53e73
 
Lsn21_NumPy in data science using python
Lsn21_NumPy in data science using pythonLsn21_NumPy in data science using python
Lsn21_NumPy in data science using python
ssuserec53e73
 
OpenSecure socket layerin cyber security
OpenSecure socket layerin cyber securityOpenSecure socket layerin cyber security
OpenSecure socket layerin cyber security
ssuserec53e73
 
Hash functions, digital signatures and hmac
Hash functions, digital signatures and hmacHash functions, digital signatures and hmac
Hash functions, digital signatures and hmac
ssuserec53e73
 
50134147-Knowledge-Representation-Using-Rules.ppt
50134147-Knowledge-Representation-Using-Rules.ppt50134147-Knowledge-Representation-Using-Rules.ppt
50134147-Knowledge-Representation-Using-Rules.ppt
ssuserec53e73
 

More from ssuserec53e73 (20)

Threats in network that can be noted in security
Threats in network that can be noted in securityThreats in network that can be noted in security
Threats in network that can be noted in security
 
Lsn21_NumPy in data science using python
Lsn21_NumPy in data science using pythonLsn21_NumPy in data science using python
Lsn21_NumPy in data science using python
 
OpenSecure socket layerin cyber security
OpenSecure socket layerin cyber securityOpenSecure socket layerin cyber security
OpenSecure socket layerin cyber security
 
Hash functions, digital signatures and hmac
Hash functions, digital signatures and hmacHash functions, digital signatures and hmac
Hash functions, digital signatures and hmac
 
Asian Elephant Adaptations - Chelsea P..pptx
Asian Elephant Adaptations - Chelsea P..pptxAsian Elephant Adaptations - Chelsea P..pptx
Asian Elephant Adaptations - Chelsea P..pptx
 
Module 10-Introduction to OOP.pptx
Module 10-Introduction to OOP.pptxModule 10-Introduction to OOP.pptx
Module 10-Introduction to OOP.pptx
 
unit-1-l3.ppt
unit-1-l3.pptunit-1-l3.ppt
unit-1-l3.ppt
 
AI.ppt
AI.pptAI.ppt
AI.ppt
 
50134147-Knowledge-Representation-Using-Rules.ppt
50134147-Knowledge-Representation-Using-Rules.ppt50134147-Knowledge-Representation-Using-Rules.ppt
50134147-Knowledge-Representation-Using-Rules.ppt
 
Dr Jose Reena K.pdf
Dr Jose Reena K.pdfDr Jose Reena K.pdf
Dr Jose Reena K.pdf
 
Enumeration.pptx
Enumeration.pptxEnumeration.pptx
Enumeration.pptx
 
footscan.PPT
footscan.PPTfootscan.PPT
footscan.PPT
 
UNIT II.pptx
UNIT II.pptxUNIT II.pptx
UNIT II.pptx
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
IoT Reference Architecture.pptx
IoT Reference Architecture.pptxIoT Reference Architecture.pptx
IoT Reference Architecture.pptx
 
patent ppt.pptx
patent ppt.pptxpatent ppt.pptx
patent ppt.pptx
 
Introduction to measurement.pptx
Introduction to measurement.pptxIntroduction to measurement.pptx
Introduction to measurement.pptx
 
ML-DecisionTrees.ppt
ML-DecisionTrees.pptML-DecisionTrees.ppt
ML-DecisionTrees.ppt
 
ML_Lecture_7.ppt
ML_Lecture_7.pptML_Lecture_7.ppt
ML_Lecture_7.ppt
 
070308-simmons.ppt
070308-simmons.ppt070308-simmons.ppt
070308-simmons.ppt
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Whitelist.ppt

  • 2. References 1. Tae-Hyung Kim,Young-Sik Choi,Jong Kim, Sung Je Hong, “Annulling SYN Flooding Attacks with Whitelist”, 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008. (AINAW 2008). 25-28 March 2008 Page(s):371 – 376. 2. He, Peizhou; Wen, Xiangming; Zheng, Wei; “A Novel Method for Filtering Group Sending Short Message Spam”,International Conference on Convergence and Hybrid Information Technology, 2008. (ICHIT '08). 28- 30 Aug. 2008 Page(s):60 – 65. 3. Hui-Jun Lu; Shu-Zhen Leng; “Log-Based Recovery Scheme for Executing Untrusted Programs”, Machine Learning and Cybernetics, 2007 International Conference on Volume 4, 19-22 Aug. 2007 Page(s): 2136 – 2139. 4. Phua, C.; Gayler, R.; Smith-Miles, K.; Lee, V.; “Communal Detection of Implicit Personal Identity Streams”,Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on Dec. 2006 Page(s):620 - 625 5. Jian Zhang, Phillip Porras, and Johannes Ullrich, “Highly Predictive Blacklisting”, Usenix Security, August 2008.
  • 3. Whitelists Blacklists • Whitelist contains sources and software that is deemed to be acceptable. • Blacklist contains sources and software that is harmful.
  • 4. Whitelist Applications • IP address classification • SPAM reduction: approved sender list • SMS • Software execution
  • 5. Review of [1] Tae-Hyung Kim,Young-Sik Choi,Jong Kim, Sung Je Hong, “Annulling SYN Flooding Attacks with Whitelist”, 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008. (AINAW 2008). 25-28 March 2008 Page(s):371 – 376.
  • 6. SYN Flooding attack • Attacker sends many SYN (synchronize) requests to a target system. • Exploits the 3-way handshake used to set up a TCP connection. • Results in Denial of Service. Client Server SYN SYN-ACK ACK TCP three – way handshake. What if ACK never issued. • Malicious client. • Spoofed source IP address. Incomplete connection . • Waiting for network delayed ACK. Large queues at the server. Legit clients cannot connect. [1]
  • 7. Potential Defenses • Bigger buffer queues: postpones the inevitable. • SYN Cache – Typically different buffers for each port – SYN Cache uses one buffer for several ports – Fails for aggressive SYN flooding attack • Random Drop – Randomly substitute an element in the buffer with a new request – Increases probability of successful connection – Disrupts pending connections [1]
  • 8. Possible Defense - 2 • SYN Cookies – Stores the source IP and port number in packet sent back to the client – ACK must contain the information – No buffer needed at server – In normal operations a backlog buffer queue is maintained. When buffer is full then Cookies are activated. – If ACK info network delayed, then connection info is lost. • Preferred solution – how to improve it! [1]
  • 9. SYN handshakes • Under SYN flooding attack – SYN is lost, then it is retransmitted – What if ACK lost, server cannot retransmit if SYN Cookies is used. • PSH/ACK has data (a) Server can extract ACK from PSH/ACK (b) Cannot respond to packet loss [1]
  • 10. Features of Defense • Service Continuity – Service should not be disrupted during SYN flooding attack • Service Separation – Legitimate connections from unknown connection request • Service differentiation – Robust connection to legitimate connections [1]
  • 11. Whitelisting Defense • Whitelist maintains IP addresses of trusted clients. • These IPs can make a successful connection in spite of SYN flooding attacks. • Facilitate searches by using a hash function. [1]
  • 12. Proposed Approach • Normal state – Conventional approach - use backlog queue buffer. • Attack response state – Detecting attack state • Buffer has many half connections – Separate requests into legitimate (WL consistent) and unknown. • Legitimate use backlog queue • Unknown handled with SYN Cookie [1]
  • 13. Managing Whitelists • Initialization – Sys admin collects trusted clients using logs for services like SMTP and SSH. May include trusted subnets. • Additions – Trusted clients based on policy – Successful connection under SYN Flooding attack - Completed SYN Cookie connection • Removals – IP has too many half open connections [1]
  • 14. Experimental Results • Connection success % increases from 64% (SYN cookie) to 90% (WL approach) – Under attack client to server ACK and other messages are lost. • Fatal for SYN cookie – no recovery • WL approach – retransmission possible • WL approach requires less time for connection establishment • Backlog Queue usage is lower for WL approach [1]
  • 15. Hui-Jun Lu; Shu-Zhen Leng; “Log-Based Recovery Scheme for Executing Untrusted Programs”. Machine Learning and Cybernetics, 2007 International Conference on Volume 4, 19-22 Aug. 2007 Page(s): 2136 – 2139
  • 16. Programs • Whitelist (trusted programs) • Blacklist • Uncertified – All programs cannot be white or black listed – Safe execution of uncertified (untrusted) programs is often required [3]
  • 17. Uncertified Program • Detection – Virus scanning – Signature verification • Protection – Confine execution to sandbox or isolated environment – More realistic the environment, the higher the penalty • Recovery – Should not interfere with the program execution – Monitoring and recording to return to known good state [3]
  • 18. Detection and Verification • Virus checking: run anti-virus software – Only detect known virus • Digital signature and hash function – Access a remote trusted site • For new software – Safe policy that guarantees safe behavior [3]
  • 19. Prevention and Isolation • Untrusted programs can access limited resources – Predetermined security policy • Realistic environment requires replication of entire file system • Virtual machines can isolate the untrusted program [3]
  • 20. Log Based Recovery • Checkpoints – Save the state at regular time intervals – In case of “fault” rollback to a checkpoint • Logs are maintained – Rollback as close to the event • Effective recovery improves dependability – Does not avoid failure (fault) – Sort of a power UNDO [3]
  • 21. System Integrity • Ensure file system integrity • Other operations • Untrusted systems operations that lead to state change should be prevented • Log based recovery – Monitors the process – No change to program or context – Backs up the file modification [3]
  • 22. Approach • Check if the program is in whitelist or blacklist – Label other programs as suspicious • Log and back up system – Roll back to the check point [3]
  • 23. System Requirements • Application transparency – No changes to the untrusted program or its context – No restrictions on the file system access • Easy recovery – Rollback to an initial state – Restore the file system • Ease of use – System provides summary – Detect a failure [3]
  • 24. [3]
  • 26. Network Address Blacklist • Addresses that are undesirable – Previous illicit activity • Members of the volunteer DShield org identify potential blacklist entries • Blacklist – Global Worst Offender List (GWOL) • Broad based contributions – Local Worst Offender List (LWOL) • Historical patterns for the local networks [5]
  • 27. Global/Local Worst Offender List • GWOL – Prolific attack sources – Too many – firewall may not be able to handle this list – Miss targeted attacks • Low global profile • Maybe more dangerous • LWOL – Local behavior and defensive reaction – Not useful for broader dissemination • Offender must cross a threshold of attacks [5]
  • 28. High Quality Black List Requirements • Need to ready for insertion in firewalls early – before an attack – Lists should be updated in timely fashion – High accuracy – Typically number of attacks must pass a threshold before list insertion • Problems – Contributors from a small part of the internet – Directed attacks may not have enough global visibility [5]
  • 29. Highly Predictive Blacklist • Pre-filter to remove unreliable alerts • Relevance – based attack source ranking • Severity analysis: modulate the analysis to reflect the malware propagation patterns • Leads to individualized lists [5]
  • 31. Prefiltering • Reduce errors (noise) in the data set – Data may include log entries from non-hostile (benign causes) activity • Prefiltering involves – Remove logs regarding unassigned or invalid IPs e.g. 192.168.x.x or 10.x.x.x – Apply a white list of known addresses of web crawlers, measurement service, common software update sources – Logs from source ports TCP 53 (DNS), 80 (HTTP), 25 (SMTP), 443 (secure web) and destination ports TCP 53 and 25. [5]
  • 32. Relevance Ranking • Helps to specialize the blacklist to a specific consumer • Assess the closeness of the attacker to the consumer: a measure of the likelihood of the attacker targeting this consumer • Does not assess the severity of the attack(er) • Pairs of consumers share several attackers, i.e. consumers have experience of attacks from a common source IP – This is not random, but a long term phenomenon [5]
  • 33. Relevance Ranking - 2 • Intuitive underpinnings of relevance. • Relevance wrt v1 – s5 is more than s6. – s5 is more than s7. – s4 is more than s5, s6, and s7 1 2 3 4 5 2 1 1 1 1 Correlation Graph [5]
  • 34. Relevance Ranking - 3 • mi = # of attackers for vi • mj = # of attackers for vj • mij = # of attackers for vij • Wij = strength of connection between vi and vj = mi / mij 1 2 3 4 5 2 1 1 1 1 [5]
  • 35. Relevance Ranking - 4 • Source relevance to victim rs = W bs • Calculation based only on observations • Sample is very small fraction of the internet • Need to add “look ahead” capability [5]
  • 36. Relevance Ranking - 5 • Attack (star) on 2. • How to assess the relevance of this attack to 1? • Traverse the relevance paths; assess link weights = 0.5*0.2+0.3*0.2 = 0.16 • Relevance propogation [5]
  • 37. Relevance Ranking - 6 • Which attack is more relevant to 1? • Propagate the relevance • More propagation possibilities the completely connected sub-graph – more paths [5]
  • 38. • Relevance vector W bs • After one more hop W W bs • Total Relevance value = W bs + W2 bs • Eventually Relevance vector will be Σ∞ i = 1 (αW)I bs • Similarity to Page Rank Relevance Ranking - 7 [5]
  • 39. Attack Severity • Model based on 3 components – Malicious behavior, number of IPs targeted, geographic metric • Model of malicious behavior – Identify typical scan-and-infect software – Conduct IP sweep of small sets of ports – Let MP be the set of malware associated ports [5]
  • 40. Attack Severity - 2 • Compute malware port score (PS) for attacker s • PS(s) ={(wu x cu)+(wm x cm)}/ cu • cm= total number of malware ports connected by s • cu = total number of ports connected by s • wu and wm are the respective weights • wm > wu: authors use wm = 4 wu [5]
  • 41. Attack Severity - 3 • Second measure – Number of unique IPs connected by s {TC(s)} – Typically TC(s) is the prioritization metric used by GWOL • Third measure – Ratio of national to international IPs targeted by attacker s. {IR(s)} • Overall measure = PS(s)+ log (TC(s)) + δ log(IR(s)) • Log reduces the impact of the last two terms [5]
  • 42. Final Blacklist • For each attacker relevance ranking and severity score are used. • Assume that the target is a list of L. • First use attacker relevance ranking to reduce the list. Produce a list of size cL. • Next use severity to prune the list to L. [5]
  • 43. Final Blacklist - 2 • Final score is computed with k being relevance rank of the attacker s. [5]
  • 44. [5]