SlideShare a Scribd company logo
1 of 58
Toru Shimanaka & Ryusuke Masuoka
Fujitsu System Integration Laboratories
Brian Hay
Hume Center, Virginia Tech
Cyber Deception Architecture:
Covert Attack Reconnaissance
Using a Safe SDN Approach
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED0
Textbooks dictate …
When a compromised PC is discovered, it should be
disconnected from the network to prevent further damages
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
That is a reasonable and safe practice.
But …
1
Obtaining valuable intelligence
• Adversary’s TTPs, purposes, and intentions
Denying the adversary to learn from his failure
• Or allows the adversary to learn from his failure, and the adversary may
come back again using more sophisticated tools and techniques
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Missed opportunities
2
We want both
Safety by disconnection
Preventing further damage
Intelligence by attack continuation
Observing adversary’s behavior and getting valuable information
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED3
Our idea
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
 Prepare a “Deception Network” as a safe observation
environment
 Switch communications between the compromised PC and
the Operational Network to the Deception Network
 Let communication between the compromised PC and the
C2 server continue
4
Our idea
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
 Prepare a “Deception Network” as a safe observation
environment
 Switch communications between the compromised PC and
the Operational Network to the Deception Network
 Let communication between the compromised PC and the
C2 server continue
Cyber deception after detection
5
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED6
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
“Direct an adversary’s
attention from real assets
toward bogus ones.”
7
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
・・・
・・・
・・・
“Waste an adversary’s time
and energy on obtaining and
analyzing false information.”
8
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
“Cause the adversary to
doubt the veracity of a
discovered vulnerability
or stolen information.”
9
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
“Monitor and analyze
adversary behavior
during intrusion
attempts
to inform future
defense efforts.”
10
What is Cyber Deception?
“the planned actions taken to mislead hackers and to thereby
cause them to take (or not take) specific actions that aid computer-
security defenses.” (J. J. Yuill, 2006)※1
Deception Purposes (MITRE, 2015) ※2
Diversion
Resource Depletion
Uncertainty
Intelligence
Proactivity
※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
※2 Cyber Denial, Deception and Counter Deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
“Use deception
techniques to detect
previously unknown
attacks.”
11
Our idea
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
 Prepare a “Deception Network” as a safe observation
environment to protect the Operational network
 Switch communications between the compromised PC and
the Operational Network to the Deception Network
 Let communication between the compromised PC and the
C2 server continue
Isolate the compromised PC
safe
Cyber deception after detection
12
Deception Network (D-Net)
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
PC-44 PC-43 PC-42
Log
Fowarder-4PC-41
PC-34 PC-33 PC-32 PC-31
PC-24 PC-23 PC-22
Log
Fowarder-2PC-21
Log
Fowarder-3
PC-11PC-12PC-13
Log
Fowarder-1PC-14
Domain
Controller
Log
Fowarder-0
Mail
Server
Business
Server
DHCP
Server
Network-1
Network-0
Network-2
Network-3
Network-4
Router-1
Operational Network (O-Net)
PC-44 PC-43 PC-42
Log
Fowarder-4PC-41
PC-34 PC-33 PC-32 PC-31
PC-24 PC-23 PC-22
Log
Fowarder-2PC-21
Log
Fowarder-3
PC-11PC-12PC-13
Log
Fowarder-1PC-14
Domain
Controller
Log
Fowarder-0
Mail
Server
Business
Server
DHCP
Server
Network-1
Network-0
Network-2
Network-3
Network-4
Router-1
Deception Network (D-Net)
 Configured identically to O-Net
 Same network topology
 Hosts with same hostnames
& ip addresses
(except MAC addresses)
13
Deception Network (D-Net)
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Operational Network (O-Net)
PC-44 PC-43 PC-42
Log
Fowarder-4PC-41
PC-34 PC-33 PC-32 PC-31
PC-24 PC-23 PC-22
Log
Fowarder-2PC-21
Log
Fowarder-3
PC-11PC-12PC-13
Log
Fowarder-1PC-14
Domain
Controller
Log
Fowarder-0
Mail
Server
Business
Server
DHCP
Server
Network-1
Network-0
Network-2
Network-3
Network-4
Router-1
Deception Network (D-Net)
 Configured identically to O-Net
 Same network topology
 Hosts with same hostnames
& ip addresses
(except MAC addresses)
 SDN technology
 Transfer control by OpenFlow
Domain
Controller
Log
Fowarder-0
Mail
Server
Business
Server
DHCP
Server
PC-11PC-12PC-13
Log
Fowarder-1
PC-24 PC-23 PC-22
Log
Fowarder-2PC-21
Network-1
PC-14
PC-34 PC-33 PC-32
Log
Fowarder-3PC-31
PC-44 PC-43 PC-42
Log
Fowarder-4PC-41
Network-0
Network-2
Network-3
Network-4
OpenFlow
Switch-01
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-31
OpenFlow
Switch-41
OpenFlow
Switch-02
OpenFlow
Switch-12
OpenFlow
Switch-22
OpenFlow
Switch-32
OpenFlow
Switch-42
Router-1
14
Deception Network (D-Net)
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
 Configured identically to O-Net
 Same network topology
 Hosts with same hostnames
& ip addresses
(except MAC addresses)
 SDN technology
 Transfer control by OpenFlow
 Safe observation environment
 Delete sensitive information
 Insert fake information
 Observe behavior
15
 Prepare a “Deception Network” as a safe environment to
protect the Operational network
 Switch communications between the compromised PC and
the O-Net to the D-Net
 Let communication between the compromised PC and the
C2 server continue
Our idea
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Cyber deception after detection
16
Continued communication with C2 server
Transferring communication with O-Net
Transferred communication with D-Net
Our idea
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Cyber deception after detection
17
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED18
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Detect a compromise
[out of scope of this paper]
19
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
{
"networks": [
{
"deception_node_sw": "ovs-s-002",
"deception_node_sw_id": "0000000000000121",
"hosts": [
{
"deception_mac_address": "00:50:56:a5:43:83",
"ip_address": "10.10.10.201",
"mac_address": "00:50:56:a5:34:32",
"name": "logfwd002",
"net_mask": "255.255.255.0",
"status": "normal",
"sw_port": "2"
},
{
"deception_mac_address": "00:50:56:a5:66:9a",
"ip_address": "10.10.10.10",
"mac_address": "00:50:56:a5:0c:72",
"name": "AD",
"net_mask": "255.255.255.0",
"status": "normal",
"sw_port": "3"
},
{
"deception_mac_address": "00:50:56:a5:ba:0f",
"ip_address": "10.10.10.20",
……………….
config.json
20
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
$ poffvmbyip.sh shadow 10.10.22.103 config.json
21
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
$ python ./mkdeceptflow-group.py 10.10.22.103 config .json >
tmp_deception.sh
22
Attack Transfer Mechanism
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
# Open ovs-s-005 from ki201
curl -X POST -d '{"in_port": "1", "dl_src": "00:50:56:a5:20:29", "actions":
"PORT2", "priority": "3300" }'
http://10.1.1.2:8080/deception/rules/0000000000000124 | python -m
json.tool
# ovs-r-005 ARP from ki201(00:50:56:a5:20:29) to
logfwd005(00:50:56:a5:0d:69) -> rewrite eth_dst and arp_tha to Shadow-
logfwd005(00:50:56:a5:2c:90) and out PORT1
curl -X POST -d '{"dl_type": "ARP", "dl_src": "00:50:56:a5:20:29", "dl_dst":
"00:50:56:a5:0d:69", "arp_tha": "00:50:56:a5:0d:69", "actions": "PORT1",
"set_eth_dst": "00:50:56:a5:2c:90","set_arp_tha": "00:50:56:a5:2c:90",
"priority": "3999"}' http://10.1.1.2:8080/deception/rules/0000000000000224 |
python -m json.tool
# ovs-r-005 ARP from ki201(00:50:56:a5:20:29) to
logfwd005[10.10.22.201](ff:ff:ff:ff:ff:ff) -> out PORT1
curl -X POST -d '{"dl_type": "ARP", "dl_src": "00:50:56:a5:20:29", "dl_dst":
"ff:ff:ff:ff:ff:ff", "arp_tpa": "10.10.22.201", "actions": "PORT1", "priority":
"3998"}' http://10.1.1.2:8080/deception/rules/0000000000000224 | python -
m json.tool
# ovs-r-005 ARP from Shadow-logfwd005(00:50:56:a5:2c:90) to
ki201(10.10.22.103) from PORT1 -> rewrite eth_src and arp_sha to
logfwd005(00:50:56:a5:0d:69) and out PORT3
……………
Script to set FlowTable
23
Packet Manipulation
Using OpenFlow “Flow Table”
Flow Table consists of Flow entries
• Match Field: Rule to match against the packet
• Priority: Matching precedence of the flow entry
• Instructions: Set of instructions for the packet
Match Field Priority Counters Instructions Timeouts CookieMatch Field Priority Counters Instructions Timeouts Cookie
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED24
Match Field Priority Instructions
Using OpenFlow “Flow Table”
Flow Table consists of Flow entries
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
if a packet comes in on port1
Then output packet via
port3 and port4
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
If dst_IP = 192.168.10.10 200 Rewrite dst_IP to
192.168.20.30
output:6
If a packet has destination IP address 192.168.10.10
then rewrite the address to 192.168.20.30
and output via port6
Port1 Port2 Port3 Port4 Port5 Port6
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Packet Manipulation by SDN
OpenFlow Switch
if a packet comes in on port1
Then output packet via
port3 and port4
25
Match Field Priority Instructions
Using OpenFlow “Flow Table”
Flow Table consists of Flow entries
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
if a packet comes in on port1
Then output packet via
port3 and port4
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
If dst_IP = 192.168.10.10 200 Rewrite dst_IP to
192.168.20.30
output:6
Port1 Port2 Port3 Port4 Port5 Port6
To 172.127.25.100 To 172.127.25.100
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Packet Manipulation by SDN
OpenFlow Switch
26
Match Field Priority Instructions
Using OpenFlow “Flow Table”
Flow Table consists of Flow entries
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
if a packet comes in on port1
Then output packet via
port3 and port4
Match Field Priority Instructions
if in_port = 1 100 output:3,output:4
If dst_IP = 192.168.10.10 200 Rewrite dst_IP to
192.168.20.30
output:6
Port1 Port2 Port3 Port4 Port5 Port6
To 192.168.10.10 To 192.168.20.30
Highest priority
Instruction is applied
Matches both rules
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Packet Manipulation by SDN
OpenFlow Switch
27
Strategy Description Result
#1 Match Field IP address works only for UDP packets
Instructions rewrite MAC address
switch port accordingly
#2 Match Field MAC address
(including ARP packet)
internal communication works, but communication
with the C2 server fails
Instructions rewrite MAC information
(including ARP packet)
switch port accordingly
#3 strategy #2
+
works for all internal and external communications
Match Field addressed to intra-net
Instructions switch port accordingly
Packet rewriting strategies
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
ARP: Address Resolution Protocol
28
Strategy Description Result
#1 Match Field IP address works only for UDP packets
Instructions rewrite MAC address
switch port accordingly
#2 Match Field MAC address
(including ARP packet)
internal communication works, but communication
with the C2 server fails
Instructions rewrite MAC information
(including ARP packet)
switch port accordingly
#3 strategy #2
+
works for all internal and external communications
Match Field addressed to intra-net
Instructions switch port accordingly
Packet rewriting strategies
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
ARP: Address Resolution Protocol
29
TCP communication: PC-22→PC-21 PC-22→PC21(shadow)
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Transfer
Rewrite Dst MAC address
Change output port
PC-22 MAC
PC-21shadow MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy #2
Matched MAC address
Packet from PC-22 to PC-21
PC-21 MAC
PC-22 MAC
30
ARP communication: PC21(shadow) →PC-22 PC-21→PC-22
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Rewrite Src MAC address
to PC-21
Change output port
PC-21 IP
PC-22 IP
PC-21 MAC
PC-21 MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy #2
Matched ARP request for PC-22
PC-21shadow MAC
PC-21 IP
PC-22 IP
PC-21shadow MAC
31
TCP communication: PC-22→PC-14 PC-22→PC14(shadow)
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Matched MAC address
Packet from PC-22 to PC-14
via Router-1
PC-22 MAC
Router-1 MAC
Transfer
Rewrite Dst MAC address
To Router-1 shadow
Change output port
PC-22 MAC
Router-1 shadow MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy #2
32
TCP communication: PC-22→PC-14 PC-22→PC14(shadow)
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Matched MAC address
Packet from PC-14 shadow
To PC-22 via Router-1
Router-1 shadow MAC
PC-22 MAC
Transfer
Rewrite Src MAC address
To Router-1
Change output port
PC-22 MAC
Router-1 MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy #2
33
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Matched MAC address
Packet from PC-22 to C2 Server
via Router-1
PC-22 MAC
Router-1 MAC
Transfer
Rewrite Dst MAC address
To Router-1 shadow
Change output port
PC-22 MAC
Router-1 shadow MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy #2
TCP communication: PC-22→C2 server continue
34
Packet rewriting strategies
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Strategy Description Result
#1 Match Field IP address works only for UDP packets
Instructions rewrite MAC address
switch port accordingly
#2 Match Field MAC address
(including ARP packet)
internal communication works, but communication
with the C2 server fails
Instructions rewrite MAC information
(including ARP packet)
switch port accordingly
#3 strategy #2
+
works for all internal and external communications
Match Field addressed to intra-net
Instructions switch port accordingly
35
Strategy #3
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Matched MAC address
Packet from PC-22 to PC-14
via Router-1
Rouer-1 MAC
PC-22 MAC
Intra-net address
Transfer
Rewrite Dst MAC address
To Router-1 shadow
Change output port
PC-22 MAC
Intra-net address
Router-1 shadow MAC
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
TCP communication: PC-22→PC-14 PC-22→PC14(shadow)
36
Strategy #3
PC-11PC-12PC-13
PC-24 PC-23
Network-1
PC-14
Network-2
OpenFlow
Switch-11
OpenFlow
Switch-21
OpenFlow
Switch-12
OpenFlow
Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)
PC-11
(shadow)
PC-12
(shadow)
PC-13
(shadow)
Network-1
Network-2
PC-21
Operational Network (O-Net) Deception Network (D-Net)
PC-22
PC-14
(shadow)
C2
Server
compromised
Router-1
Router-1
(shadow)
Unmatched packet
To Internet Network address
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
TCP communication: PC-22→C2 server continue
Matched MAC address
Packet from PC-22 to PC-14
via Router-1
Rouer-1 MAC
PC-22 MAC
Internet address
37
Flow Tables
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Low
PC-24 PC-23 PC-22 PC-21
Network-2
OpenFlow Switch-21 OpenFlow Switch-22
PC-24
(shadow)
PC-23
(shadow)
PC-21
(shadow)PC-11C2
Operational Network (O-Net) Deception Network (D-Net)
Router-1
Router-1
(shadow)
PC-11
(shadow) Originated packet
Changed packet
(rewrite, port change)
High
Initial State
Comm. between
the O-Net and the D-Net
FlowTablePriority
ARP Request from PC-22
ARP Reply From PC-22
Rewrite dstMAC addr in Ethe Header
Rewrite dstMAC addr in ARP Protocol
ARP Request from PC-22
ARP Reply From PC-22
ARP Request from PC-22
ARP Reply From PC-22
Rewrite dstMAC addr in Ethe Header
Rewrite dstMAC addr in ARP Protocol
Rewrite dstMAC addr in Ethe Header
Rewrite dstMAC addr in ARP Protocol
ARP Request from PC-22
ARP Reply From PC-22
Rewrite dstMAC addr in Ethe Header
Rewrite dstMAC addr in ARP Protocol
Copy Packet
ARP from
the Compromised PC-22
Rewrite srcMAC addr in Ethe Header
Rewrite srcMAC addr in ARP Protocol
Rewrite srcMAC addr in Ethe Header
Rewrite srcMAC addr in ARP Protocol
ARP Request to PC-22
ARP Reply to PC-22
ARP Request to PC-22
ARP Reply to PC-22
Rewrite srcMAC addr in Ethe Header
Rewrite srcMAC addr in ARP Protocol
ARP Request to PC-22
ARP Reply to PC-22
Rewrite srcMAC addr in Ethe Header
Rewrite srcMAC addr in ARP Protocol
ARP Request to PC-22
ARP Reply to PC-22
ARP to
the Compromised PC-22
Keep connection with
the C2 Server
Packet from PC-22 to Other Sub-network Rewrite Router s dstMAC addr in Ethe Header
Packet from Other Sub-network to PC-22Rewrite Router s srcMAC addr in Ethe Header
There is no Flow Table preventing communication
Communication is continued
Packet from PC-22 Rewrite dstMAC addr in Ethe Header
Packet from
the Compromised PC-22
Packet from PC-22 Rewrite dstMAC addr in Ethe Header
Packet from PC-22 Rewrite dstMAC addr in Ethe Header
Flooding packet from PC-22 Forward Port in Group Flooding
Rewrite srcMAC addr in Ethe Header Packet to PC-22
Packet to
the Compromised PC-22
Rewrite srcMAC addr in Ethe Header Packet to PC-22
Rewrite srcMAC addr in Ethe Header Packet to PC-22
Forward Port in Group Flooding packet
38
Flow Tables
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
[
{
"access_control_list": [
{
"rules": [
{
"actions": [
"SET_FIELD: {eth_dst:00:50:56:a5:47:e4}",
"SET_FIELD: {arp_tha:00:50:56:a5:47:e4}",
"OUTPUT:2"
],
"arp_tha": "00:50:56:a5:72:73",
"dl_dst": "00:50:56:a5:72:73",
"dl_src": "00:50:56:a5:20:29",
"dl_type": "ARP",
"priority": 3992,
"rule_id": 8
},
{
"actions": [
"OUTPUT:2"
],
"dl_src": "00:50:56:a5:20:29",
"in_port": 1,
"priority": 3300,
"rule_id": 7
},
39
Evaluation
What: Keep adversary unaware of cyber deception
Maintaining control of the compromised PC on the O-Net from their C2
server
Transferring the network activities of the compromised PC from the O-Net
the D-Net
How: Observation from the adversary’s point of view (i.e. from the
C2 server)
Created a script of post-compromise activities selected from common attacks
Executed the script from the C2 server's console before and after deception
and compared the results
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED40
Script of post-compromise activities
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
1) sysinfo : Get System and User information
2) idletime : Get the time interval at which the user did not operate
3) getpid : Get the Process ID used for attack
4) ps : Get the Process List
5) post/windows/gather/enum_services : Get name and configuration info for
each returned service
6) getproxy : Get Information about proxy
7) post/windows/gather/credentials/enum_cred _store : Get Credentials of IE
8) post/multi/gather/thunderbird_creds : Get Credentials of Thunderbird
9) ls -lR C:¥¥Users¥¥ : Get File List of the User
10) post/windows/gather/enum_ie : Get Browser history
41
Script of post-compromise activities
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
11) post/windows/gather/dumplinks2 : Get Files recently used
12) post/windows/gather/enum_applications : Get Application list
13) net user / net localgroup : Get Information about Local account, group
and administrator
14) Net share list : Get shared folder Information
15) show_mount : Get the currently attached “mounts”
16) ifconfig : Get Network interface information (MAC address, IP address)
17) arp : Get ARP Table
18) route : Get Routing Table
19) netstat : Get Connection information for each process
20) net use : Get SMB remote connection Information
21) post/windows/recon/computer_browser_disc overy : Get Neighbor
Computers
42
Evaluation environment
Two servers connected by
switch
For O-Net, Internet, C2 Server
For D-Net, Deception Management
Network
Deception Network and
Deception Management Network
(Virtual Machine)
Operational Network,
Internet, C2 Server
(Virtual Machine)
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED43
Evaluation results
The automated attack script produced exactly the same results
before and after deception
The session between the compromised PC and the C2 server
remained uninterrupted during and after deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED44
[*] show_mount
Mounts / Drives
===============
Name Type Size (Total) Size (Free) Mapped to
---- ---- ------------ ----------- ---------
A:¥ removable 0.00 B 0.00 B
C:¥ fixed 31.90 GiB 17.33 GiB
D:¥ remote 0.00 B 0.00 B ¥¥sh201¥share¥
E:¥ cdrom 0.00 B 0.00 B
M:¥ remote 0.00 B 0.00 B ¥¥file¥share¥???¥
Total mounts/drives: 5
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED45
Attack log
[*] ifconfig
Interface 12
============
Name : vmxnet3 Ethernet Adapter
Hardware MAC : 00:50:56:a5:04:e7
MTU : 1500
IPv4 Address : 10.10.22.102
IPv4 Netmask : 255.255.255.0
IPv6 Address : fe80::84f4:5832:cee4:1469
IPv6 Netmask : ffff:ffff:ffff:ffff::
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED46
[*] arp
ARP cache
=========
IP address MAC address Interface
---------- ----------- ---------
10.10.22.1 00:50:56:a5:72:73 12
10.10.22.101 00:50:56:a5:61:6c 12
10.10.22.103 00:50:56:a5:20:29 12
10.10.22.104 00:50:56:a5:2c:a7 12
10.10.22.201 00:50:56:a5:0d:69 12
10.10.22.255 ff:ff:ff:ff:ff:ff 12
224.0.0.22 00:00:00:00:00:00 1
224.0.0.22 01:00:5e:00:00:16 12
224.0.0.252 01:00:5e:00:00:fc 12
239.255.255.250 00:00:00:00:00:00 1
239.255.255.250 01:00:5e:7f:ff:fa 12
255.255.255.255 ff:ff:ff:ff:ff:ff 12
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED47
[*] route
IPv4 network routes
===================
Subnet Netmask Gateway Metric Interface
------ ------- ------- ------ ---------
0.0.0.0 0.0.0.0 10.10.22.1 5 12
10.10.22.0 255.255.255.0 10.10.22.102 261 12
10.10.22.102 255.255.255.255 10.10.22.102 261 12
10.10.22.255 255.255.255.255 10.10.22.102 261 12
127.0.0.0 255.0.0.0 127.0.0.1 306 1
127.0.0.1 255.255.255.255 127.0.0.1 306 1
127.255.255.255 255.255.255.255 127.0.0.1 306 1
224.0.0.0 240.0.0.0 127.0.0.1 306 1
224.0.0.0 240.0.0.0 10.10.22.102 261 12
255.255.255.255 255.255.255.255 127.0.0.1 306 1
255.255.255.255 255.255.255.255 10.10.22.102 261 12
No IPv6 routes were found.
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED48
[*] netstat
Connection list
===============
Proto Local address Remote address State User Inode PID/Program name
----- ------------- -------------- ----- ---- ----- ----------------
tcp 0.0.0.0:135 0.0.0.0:* LISTEN 0 0 684/svchost.exe
tcp 0.0.0.0:445 0.0.0.0:* LISTEN 0 0 4/System
tcp 0.0.0.0:5357 0.0.0.0:* LISTEN 0 0 4/System
tcp 0.0.0.0:8089 0.0.0.0:* LISTEN 0 0 1476/splunkd.exe
tcp 0.0.0.0:49152 0.0.0.0:* LISTEN 0 0 392/wininit.exe
tcp 0.0.0.0:49153 0.0.0.0:* LISTEN 0 0 772/svchost.exe
tcp 0.0.0.0:49154 0.0.0.0:* LISTEN 0 0 856/svchost.exe
tcp 0.0.0.0:49155 0.0.0.0:* LISTEN 0 0 508/lsass.exe
tcp 0.0.0.0:49170 0.0.0.0:* LISTEN 0 0 500/services.exe
tcp 10.10.22.102:139 0.0.0.0:* LISTEN 0 0 4/System
tcp 10.10.22.102:49227 10.10.22.201:9997 ESTABLISHED 0 0 1476/splunkd.exe
tcp 10.10.22.102:49230 10.10.10.10:49155 ESTABLISHED 0 0 2576/splunk-winevtlog.exe
tcp 10.10.22.102:49251 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process]
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED49
tcp 10.10.22.102:49252 10.10.22.201:8089 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49253 10.10.22.101:139 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49254 10.10.22.101:139 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49255 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49256 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49257 10.10.10.30:80 CLOSE_WAIT 0 0 2744/powershell.exe
tcp 10.10.22.102:49260 172.16.0.10:443 ESTABLISHED 0 0 2744/powershell.exe
tcp 10.10.22.102:49261 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process]
tcp 10.10.22.102:49263 10.10.10.60:445 ESTABLISHED 0 0 4/System
tcp6 :::135 :::* LISTEN 0 0 684/svchost.exe
tcp6 :::445 :::* LISTEN 0 0 4/System
tcp6 :::5357 :::* LISTEN 0 0 4/System
tcp6 :::49152 :::* LISTEN 0 0 392/wininit.exe
tcp6 :::49153 :::* LISTEN 0 0 772/svchost.exe
tcp6 :::49154 :::* LISTEN 0 0 856/svchost.exe
tcp6 :::49155 :::* LISTEN 0 0 508/lsass.exe
tcp6 :::49170 :::* LISTEN 0 0 500/services.exe
udp 0.0.0.0:123 0.0.0.0:* 0 0 968/svchost.exe
udp 0.0.0.0:3702 0.0.0.0:* 0 0 1184/svchost.exe
udp 0.0.0.0:3702 0.0.0.0:* 0 0 1184/svchost.exe
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED50
udp 0.0.0.0:5355 0.0.0.0:* 0 0 332/svchost.exe
udp 0.0.0.0:51205 0.0.0.0:* 0 0 1184/svchost.exe
udp 0.0.0.0:52092 0.0.0.0:* 0 0 1352/ossec-agent.exe
udp 0.0.0.0:54628 0.0.0.0:* 0 0 1220/intercepter.exe
udp 10.10.22.102:137 0.0.0.0:* 0 0 4/System
udp 10.10.22.102:138 0.0.0.0:* 0 0 4/System
udp 127.0.0.1:56398 0.0.0.0:* 0 0 508/lsass.exe
udp 127.0.0.1:56400 0.0.0.0:* 0 0 332/svchost.exe
udp 127.0.0.1:59787 0.0.0.0:* 0 0 856/svchost.exe
udp 127.0.0.1:65485 0.0.0.0:* 0 0 1728/WmiPrvSE.exe
udp6 :::123 :::* 0 0 968/svchost.exe
udp6 :::3702 :::* 0 0 1184/svchost.exe
udp6 :::3702 :::* 0 0 1184/svchost.exe
udp6 :::5355 :::* 0 0 332/svchost.exe
udp6 :::51206 :::* 0 0 1184/svchost.exe
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED51
[*] getproxy
Auto-detect : No
Auto config URL : http://www.system.skyblue.test/proxy.pac
Proxy URL :
Proxy Bypass :
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED52
### SMB Remote Connection
~~~
[*] net use
[+] Net use list
Status Local Remote
------ ----- ------
D: ¥¥sh201¥share
OK M: ¥¥file¥share¥secret
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED53
### Neighbor Computer(NBT)
~~~
[*] post/windows/recon/computer_browser_discovery
[+] Found 4 systems.
....
[*] Netdiscovery Results
====================
TYPE IP COMPUTER NAME VERSION COMMENT
---- -- ------------- ------- -------
0x11003 10.10.22.102 KG201 6.1
0x11003 10.10.22.104 YM201 6.3
0x31003 10.10.22.103 KI201 6.3
0x51003 10.10.22.101 UN201 6.1
~~~
meterpreter >
Attack log
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED54
Conclusion
Objective
Observe the adversary’s attack safely and covertly through keeping the
adversary unaware of deception
Technique
Creating a Deception Network
Using OpenFlow's Flow Tables for manipulating packets
Evaluation
The adversary can not observe any difference before, during, and after the
cyber deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED55
Future research
Cyber deception architecture for IPv6
Realism of Deception Network
Content continuity before and after deception
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED56
Any Questions?
Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED
Thank you.
Toru Shimanaka
shimanaka.tohru@fujitsu.com
57

More Related Content

What's hot

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixFrode Hommedal
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)Emil Tan
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
 
Cyber Security Trends for 2020 to Keep an Eye On
Cyber Security Trends for 2020 to Keep an Eye OnCyber Security Trends for 2020 to Keep an Eye On
Cyber Security Trends for 2020 to Keep an Eye OnTyrone Systems
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackDan Gunter
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011Mousselmal Tarik
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesamit kumar
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9UISGCON
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Agora Group
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 

What's hot (20)

Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Honeypot 101 (slide share)
Honeypot 101 (slide share)Honeypot 101 (slide share)
Honeypot 101 (slide share)
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
TiC
TiCTiC
TiC
 
Bilge12 zero day
Bilge12 zero dayBilge12 zero day
Bilge12 zero day
 
Cyber Security Trends for 2020 to Keep an Eye On
Cyber Security Trends for 2020 to Keep an Eye OnCyber Security Trends for 2020 to Keep an Eye On
Cyber Security Trends for 2020 to Keep an Eye On
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Quantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic ModulesQuantum Safety in Certified Cryptographic Modules
Quantum Safety in Certified Cryptographic Modules
 
HONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantagesHONEYPOTS: Definition, working, advantages, disadvantages
HONEYPOTS: Definition, working, advantages, disadvantages
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Honeypot
HoneypotHoneypot
Honeypot
 
Virtual honeypot
Virtual honeypotVirtual honeypot
Virtual honeypot
 
Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010Symantec_2-4-5 nov 2010
Symantec_2-4-5 nov 2010
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 

Similar to Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach

IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET Journal
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on HoneypotsIRJET Journal
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET Journal
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applicationsijtsrd
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An OverviewIRJET Journal
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointLancope, Inc.
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 

Similar to Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach (20)

IRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using HoneypotIRJET-Detecting Hacker Activities using Honeypot
IRJET-Detecting Hacker Activities using Honeypot
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
IRJET- A Review on Honeypots
IRJET-  	  A Review on HoneypotsIRJET-  	  A Review on Honeypots
IRJET- A Review on Honeypots
 
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET-  	  Ethical Hacking Techniques and its Preventive Measures for NewbiesIRJET-  	  Ethical Hacking Techniques and its Preventive Measures for Newbies
IRJET- Ethical Hacking Techniques and its Preventive Measures for Newbies
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Honeypot Methods and Applications
Honeypot Methods and ApplicationsHoneypot Methods and Applications
Honeypot Methods and Applications
 
Honeypot- An Overview
Honeypot- An OverviewHoneypot- An Overview
Honeypot- An Overview
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
CA_Module_1.pptx
CA_Module_1.pptxCA_Module_1.pptx
CA_Module_1.pptx
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
APT & What we can do TODAY
APT & What we can do TODAYAPT & What we can do TODAY
APT & What we can do TODAY
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach

  • 1. Toru Shimanaka & Ryusuke Masuoka Fujitsu System Integration Laboratories Brian Hay Hume Center, Virginia Tech Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN Approach Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED0
  • 2. Textbooks dictate … When a compromised PC is discovered, it should be disconnected from the network to prevent further damages Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED That is a reasonable and safe practice. But … 1
  • 3. Obtaining valuable intelligence • Adversary’s TTPs, purposes, and intentions Denying the adversary to learn from his failure • Or allows the adversary to learn from his failure, and the adversary may come back again using more sophisticated tools and techniques Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Missed opportunities 2
  • 4. We want both Safety by disconnection Preventing further damage Intelligence by attack continuation Observing adversary’s behavior and getting valuable information Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED3
  • 5. Our idea Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED  Prepare a “Deception Network” as a safe observation environment  Switch communications between the compromised PC and the Operational Network to the Deception Network  Let communication between the compromised PC and the C2 server continue 4
  • 6. Our idea Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED  Prepare a “Deception Network” as a safe observation environment  Switch communications between the compromised PC and the Operational Network to the Deception Network  Let communication between the compromised PC and the C2 server continue Cyber deception after detection 5
  • 7. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED6
  • 8. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED “Direct an adversary’s attention from real assets toward bogus ones.” 7
  • 9. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED ・・・ ・・・ ・・・ “Waste an adversary’s time and energy on obtaining and analyzing false information.” 8
  • 10. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED “Cause the adversary to doubt the veracity of a discovered vulnerability or stolen information.” 9
  • 11. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED “Monitor and analyze adversary behavior during intrusion attempts to inform future defense efforts.” 10
  • 12. What is Cyber Deception? “the planned actions taken to mislead hackers and to thereby cause them to take (or not take) specific actions that aid computer- security defenses.” (J. J. Yuill, 2006)※1 Deception Purposes (MITRE, 2015) ※2 Diversion Resource Depletion Uncertainty Intelligence Proactivity ※1 Defensive Computer-Security Deception Operations: Processes, Principles and Techniques. ※2 Cyber Denial, Deception and Counter Deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED “Use deception techniques to detect previously unknown attacks.” 11
  • 13. Our idea Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED  Prepare a “Deception Network” as a safe observation environment to protect the Operational network  Switch communications between the compromised PC and the Operational Network to the Deception Network  Let communication between the compromised PC and the C2 server continue Isolate the compromised PC safe Cyber deception after detection 12
  • 14. Deception Network (D-Net) Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED PC-44 PC-43 PC-42 Log Fowarder-4PC-41 PC-34 PC-33 PC-32 PC-31 PC-24 PC-23 PC-22 Log Fowarder-2PC-21 Log Fowarder-3 PC-11PC-12PC-13 Log Fowarder-1PC-14 Domain Controller Log Fowarder-0 Mail Server Business Server DHCP Server Network-1 Network-0 Network-2 Network-3 Network-4 Router-1 Operational Network (O-Net) PC-44 PC-43 PC-42 Log Fowarder-4PC-41 PC-34 PC-33 PC-32 PC-31 PC-24 PC-23 PC-22 Log Fowarder-2PC-21 Log Fowarder-3 PC-11PC-12PC-13 Log Fowarder-1PC-14 Domain Controller Log Fowarder-0 Mail Server Business Server DHCP Server Network-1 Network-0 Network-2 Network-3 Network-4 Router-1 Deception Network (D-Net)  Configured identically to O-Net  Same network topology  Hosts with same hostnames & ip addresses (except MAC addresses) 13
  • 15. Deception Network (D-Net) Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Operational Network (O-Net) PC-44 PC-43 PC-42 Log Fowarder-4PC-41 PC-34 PC-33 PC-32 PC-31 PC-24 PC-23 PC-22 Log Fowarder-2PC-21 Log Fowarder-3 PC-11PC-12PC-13 Log Fowarder-1PC-14 Domain Controller Log Fowarder-0 Mail Server Business Server DHCP Server Network-1 Network-0 Network-2 Network-3 Network-4 Router-1 Deception Network (D-Net)  Configured identically to O-Net  Same network topology  Hosts with same hostnames & ip addresses (except MAC addresses)  SDN technology  Transfer control by OpenFlow Domain Controller Log Fowarder-0 Mail Server Business Server DHCP Server PC-11PC-12PC-13 Log Fowarder-1 PC-24 PC-23 PC-22 Log Fowarder-2PC-21 Network-1 PC-14 PC-34 PC-33 PC-32 Log Fowarder-3PC-31 PC-44 PC-43 PC-42 Log Fowarder-4PC-41 Network-0 Network-2 Network-3 Network-4 OpenFlow Switch-01 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-31 OpenFlow Switch-41 OpenFlow Switch-02 OpenFlow Switch-12 OpenFlow Switch-22 OpenFlow Switch-32 OpenFlow Switch-42 Router-1 14
  • 16. Deception Network (D-Net) Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED  Configured identically to O-Net  Same network topology  Hosts with same hostnames & ip addresses (except MAC addresses)  SDN technology  Transfer control by OpenFlow  Safe observation environment  Delete sensitive information  Insert fake information  Observe behavior 15
  • 17.  Prepare a “Deception Network” as a safe environment to protect the Operational network  Switch communications between the compromised PC and the O-Net to the D-Net  Let communication between the compromised PC and the C2 server continue Our idea Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Cyber deception after detection 16
  • 18. Continued communication with C2 server Transferring communication with O-Net Transferred communication with D-Net Our idea Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Cyber deception after detection 17
  • 19. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED18
  • 20. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Detect a compromise [out of scope of this paper] 19
  • 21. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED { "networks": [ { "deception_node_sw": "ovs-s-002", "deception_node_sw_id": "0000000000000121", "hosts": [ { "deception_mac_address": "00:50:56:a5:43:83", "ip_address": "10.10.10.201", "mac_address": "00:50:56:a5:34:32", "name": "logfwd002", "net_mask": "255.255.255.0", "status": "normal", "sw_port": "2" }, { "deception_mac_address": "00:50:56:a5:66:9a", "ip_address": "10.10.10.10", "mac_address": "00:50:56:a5:0c:72", "name": "AD", "net_mask": "255.255.255.0", "status": "normal", "sw_port": "3" }, { "deception_mac_address": "00:50:56:a5:ba:0f", "ip_address": "10.10.10.20", ………………. config.json 20
  • 22. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED $ poffvmbyip.sh shadow 10.10.22.103 config.json 21
  • 23. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED $ python ./mkdeceptflow-group.py 10.10.22.103 config .json > tmp_deception.sh 22
  • 24. Attack Transfer Mechanism Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED # Open ovs-s-005 from ki201 curl -X POST -d '{"in_port": "1", "dl_src": "00:50:56:a5:20:29", "actions": "PORT2", "priority": "3300" }' http://10.1.1.2:8080/deception/rules/0000000000000124 | python -m json.tool # ovs-r-005 ARP from ki201(00:50:56:a5:20:29) to logfwd005(00:50:56:a5:0d:69) -> rewrite eth_dst and arp_tha to Shadow- logfwd005(00:50:56:a5:2c:90) and out PORT1 curl -X POST -d '{"dl_type": "ARP", "dl_src": "00:50:56:a5:20:29", "dl_dst": "00:50:56:a5:0d:69", "arp_tha": "00:50:56:a5:0d:69", "actions": "PORT1", "set_eth_dst": "00:50:56:a5:2c:90","set_arp_tha": "00:50:56:a5:2c:90", "priority": "3999"}' http://10.1.1.2:8080/deception/rules/0000000000000224 | python -m json.tool # ovs-r-005 ARP from ki201(00:50:56:a5:20:29) to logfwd005[10.10.22.201](ff:ff:ff:ff:ff:ff) -> out PORT1 curl -X POST -d '{"dl_type": "ARP", "dl_src": "00:50:56:a5:20:29", "dl_dst": "ff:ff:ff:ff:ff:ff", "arp_tpa": "10.10.22.201", "actions": "PORT1", "priority": "3998"}' http://10.1.1.2:8080/deception/rules/0000000000000224 | python - m json.tool # ovs-r-005 ARP from Shadow-logfwd005(00:50:56:a5:2c:90) to ki201(10.10.22.103) from PORT1 -> rewrite eth_src and arp_sha to logfwd005(00:50:56:a5:0d:69) and out PORT3 …………… Script to set FlowTable 23
  • 25. Packet Manipulation Using OpenFlow “Flow Table” Flow Table consists of Flow entries • Match Field: Rule to match against the packet • Priority: Matching precedence of the flow entry • Instructions: Set of instructions for the packet Match Field Priority Counters Instructions Timeouts CookieMatch Field Priority Counters Instructions Timeouts Cookie Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED24
  • 26. Match Field Priority Instructions Using OpenFlow “Flow Table” Flow Table consists of Flow entries Match Field Priority Instructions if in_port = 1 100 output:3,output:4 if a packet comes in on port1 Then output packet via port3 and port4 Match Field Priority Instructions if in_port = 1 100 output:3,output:4 If dst_IP = 192.168.10.10 200 Rewrite dst_IP to 192.168.20.30 output:6 If a packet has destination IP address 192.168.10.10 then rewrite the address to 192.168.20.30 and output via port6 Port1 Port2 Port3 Port4 Port5 Port6 Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Packet Manipulation by SDN OpenFlow Switch if a packet comes in on port1 Then output packet via port3 and port4 25
  • 27. Match Field Priority Instructions Using OpenFlow “Flow Table” Flow Table consists of Flow entries Match Field Priority Instructions if in_port = 1 100 output:3,output:4 if a packet comes in on port1 Then output packet via port3 and port4 Match Field Priority Instructions if in_port = 1 100 output:3,output:4 If dst_IP = 192.168.10.10 200 Rewrite dst_IP to 192.168.20.30 output:6 Port1 Port2 Port3 Port4 Port5 Port6 To 172.127.25.100 To 172.127.25.100 Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Packet Manipulation by SDN OpenFlow Switch 26
  • 28. Match Field Priority Instructions Using OpenFlow “Flow Table” Flow Table consists of Flow entries Match Field Priority Instructions if in_port = 1 100 output:3,output:4 if a packet comes in on port1 Then output packet via port3 and port4 Match Field Priority Instructions if in_port = 1 100 output:3,output:4 If dst_IP = 192.168.10.10 200 Rewrite dst_IP to 192.168.20.30 output:6 Port1 Port2 Port3 Port4 Port5 Port6 To 192.168.10.10 To 192.168.20.30 Highest priority Instruction is applied Matches both rules Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Packet Manipulation by SDN OpenFlow Switch 27
  • 29. Strategy Description Result #1 Match Field IP address works only for UDP packets Instructions rewrite MAC address switch port accordingly #2 Match Field MAC address (including ARP packet) internal communication works, but communication with the C2 server fails Instructions rewrite MAC information (including ARP packet) switch port accordingly #3 strategy #2 + works for all internal and external communications Match Field addressed to intra-net Instructions switch port accordingly Packet rewriting strategies Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED ARP: Address Resolution Protocol 28
  • 30. Strategy Description Result #1 Match Field IP address works only for UDP packets Instructions rewrite MAC address switch port accordingly #2 Match Field MAC address (including ARP packet) internal communication works, but communication with the C2 server fails Instructions rewrite MAC information (including ARP packet) switch port accordingly #3 strategy #2 + works for all internal and external communications Match Field addressed to intra-net Instructions switch port accordingly Packet rewriting strategies Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED ARP: Address Resolution Protocol 29
  • 31. TCP communication: PC-22→PC-21 PC-22→PC21(shadow) PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Transfer Rewrite Dst MAC address Change output port PC-22 MAC PC-21shadow MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy #2 Matched MAC address Packet from PC-22 to PC-21 PC-21 MAC PC-22 MAC 30
  • 32. ARP communication: PC21(shadow) →PC-22 PC-21→PC-22 PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Rewrite Src MAC address to PC-21 Change output port PC-21 IP PC-22 IP PC-21 MAC PC-21 MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy #2 Matched ARP request for PC-22 PC-21shadow MAC PC-21 IP PC-22 IP PC-21shadow MAC 31
  • 33. TCP communication: PC-22→PC-14 PC-22→PC14(shadow) PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Matched MAC address Packet from PC-22 to PC-14 via Router-1 PC-22 MAC Router-1 MAC Transfer Rewrite Dst MAC address To Router-1 shadow Change output port PC-22 MAC Router-1 shadow MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy #2 32
  • 34. TCP communication: PC-22→PC-14 PC-22→PC14(shadow) PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Matched MAC address Packet from PC-14 shadow To PC-22 via Router-1 Router-1 shadow MAC PC-22 MAC Transfer Rewrite Src MAC address To Router-1 Change output port PC-22 MAC Router-1 MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy #2 33
  • 35. PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Matched MAC address Packet from PC-22 to C2 Server via Router-1 PC-22 MAC Router-1 MAC Transfer Rewrite Dst MAC address To Router-1 shadow Change output port PC-22 MAC Router-1 shadow MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy #2 TCP communication: PC-22→C2 server continue 34
  • 36. Packet rewriting strategies Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Strategy Description Result #1 Match Field IP address works only for UDP packets Instructions rewrite MAC address switch port accordingly #2 Match Field MAC address (including ARP packet) internal communication works, but communication with the C2 server fails Instructions rewrite MAC information (including ARP packet) switch port accordingly #3 strategy #2 + works for all internal and external communications Match Field addressed to intra-net Instructions switch port accordingly 35
  • 37. Strategy #3 PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Matched MAC address Packet from PC-22 to PC-14 via Router-1 Rouer-1 MAC PC-22 MAC Intra-net address Transfer Rewrite Dst MAC address To Router-1 shadow Change output port PC-22 MAC Intra-net address Router-1 shadow MAC Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED TCP communication: PC-22→PC-14 PC-22→PC14(shadow) 36
  • 38. Strategy #3 PC-11PC-12PC-13 PC-24 PC-23 Network-1 PC-14 Network-2 OpenFlow Switch-11 OpenFlow Switch-21 OpenFlow Switch-12 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow) PC-11 (shadow) PC-12 (shadow) PC-13 (shadow) Network-1 Network-2 PC-21 Operational Network (O-Net) Deception Network (D-Net) PC-22 PC-14 (shadow) C2 Server compromised Router-1 Router-1 (shadow) Unmatched packet To Internet Network address Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED TCP communication: PC-22→C2 server continue Matched MAC address Packet from PC-22 to PC-14 via Router-1 Rouer-1 MAC PC-22 MAC Internet address 37
  • 39. Flow Tables Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Low PC-24 PC-23 PC-22 PC-21 Network-2 OpenFlow Switch-21 OpenFlow Switch-22 PC-24 (shadow) PC-23 (shadow) PC-21 (shadow)PC-11C2 Operational Network (O-Net) Deception Network (D-Net) Router-1 Router-1 (shadow) PC-11 (shadow) Originated packet Changed packet (rewrite, port change) High Initial State Comm. between the O-Net and the D-Net FlowTablePriority ARP Request from PC-22 ARP Reply From PC-22 Rewrite dstMAC addr in Ethe Header Rewrite dstMAC addr in ARP Protocol ARP Request from PC-22 ARP Reply From PC-22 ARP Request from PC-22 ARP Reply From PC-22 Rewrite dstMAC addr in Ethe Header Rewrite dstMAC addr in ARP Protocol Rewrite dstMAC addr in Ethe Header Rewrite dstMAC addr in ARP Protocol ARP Request from PC-22 ARP Reply From PC-22 Rewrite dstMAC addr in Ethe Header Rewrite dstMAC addr in ARP Protocol Copy Packet ARP from the Compromised PC-22 Rewrite srcMAC addr in Ethe Header Rewrite srcMAC addr in ARP Protocol Rewrite srcMAC addr in Ethe Header Rewrite srcMAC addr in ARP Protocol ARP Request to PC-22 ARP Reply to PC-22 ARP Request to PC-22 ARP Reply to PC-22 Rewrite srcMAC addr in Ethe Header Rewrite srcMAC addr in ARP Protocol ARP Request to PC-22 ARP Reply to PC-22 Rewrite srcMAC addr in Ethe Header Rewrite srcMAC addr in ARP Protocol ARP Request to PC-22 ARP Reply to PC-22 ARP to the Compromised PC-22 Keep connection with the C2 Server Packet from PC-22 to Other Sub-network Rewrite Router s dstMAC addr in Ethe Header Packet from Other Sub-network to PC-22Rewrite Router s srcMAC addr in Ethe Header There is no Flow Table preventing communication Communication is continued Packet from PC-22 Rewrite dstMAC addr in Ethe Header Packet from the Compromised PC-22 Packet from PC-22 Rewrite dstMAC addr in Ethe Header Packet from PC-22 Rewrite dstMAC addr in Ethe Header Flooding packet from PC-22 Forward Port in Group Flooding Rewrite srcMAC addr in Ethe Header Packet to PC-22 Packet to the Compromised PC-22 Rewrite srcMAC addr in Ethe Header Packet to PC-22 Rewrite srcMAC addr in Ethe Header Packet to PC-22 Forward Port in Group Flooding packet 38
  • 40. Flow Tables Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED [ { "access_control_list": [ { "rules": [ { "actions": [ "SET_FIELD: {eth_dst:00:50:56:a5:47:e4}", "SET_FIELD: {arp_tha:00:50:56:a5:47:e4}", "OUTPUT:2" ], "arp_tha": "00:50:56:a5:72:73", "dl_dst": "00:50:56:a5:72:73", "dl_src": "00:50:56:a5:20:29", "dl_type": "ARP", "priority": 3992, "rule_id": 8 }, { "actions": [ "OUTPUT:2" ], "dl_src": "00:50:56:a5:20:29", "in_port": 1, "priority": 3300, "rule_id": 7 }, 39
  • 41. Evaluation What: Keep adversary unaware of cyber deception Maintaining control of the compromised PC on the O-Net from their C2 server Transferring the network activities of the compromised PC from the O-Net the D-Net How: Observation from the adversary’s point of view (i.e. from the C2 server) Created a script of post-compromise activities selected from common attacks Executed the script from the C2 server's console before and after deception and compared the results Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED40
  • 42. Script of post-compromise activities Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 1) sysinfo : Get System and User information 2) idletime : Get the time interval at which the user did not operate 3) getpid : Get the Process ID used for attack 4) ps : Get the Process List 5) post/windows/gather/enum_services : Get name and configuration info for each returned service 6) getproxy : Get Information about proxy 7) post/windows/gather/credentials/enum_cred _store : Get Credentials of IE 8) post/multi/gather/thunderbird_creds : Get Credentials of Thunderbird 9) ls -lR C:¥¥Users¥¥ : Get File List of the User 10) post/windows/gather/enum_ie : Get Browser history 41
  • 43. Script of post-compromise activities Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED 11) post/windows/gather/dumplinks2 : Get Files recently used 12) post/windows/gather/enum_applications : Get Application list 13) net user / net localgroup : Get Information about Local account, group and administrator 14) Net share list : Get shared folder Information 15) show_mount : Get the currently attached “mounts” 16) ifconfig : Get Network interface information (MAC address, IP address) 17) arp : Get ARP Table 18) route : Get Routing Table 19) netstat : Get Connection information for each process 20) net use : Get SMB remote connection Information 21) post/windows/recon/computer_browser_disc overy : Get Neighbor Computers 42
  • 44. Evaluation environment Two servers connected by switch For O-Net, Internet, C2 Server For D-Net, Deception Management Network Deception Network and Deception Management Network (Virtual Machine) Operational Network, Internet, C2 Server (Virtual Machine) Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED43
  • 45. Evaluation results The automated attack script produced exactly the same results before and after deception The session between the compromised PC and the C2 server remained uninterrupted during and after deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED44
  • 46. [*] show_mount Mounts / Drives =============== Name Type Size (Total) Size (Free) Mapped to ---- ---- ------------ ----------- --------- A:¥ removable 0.00 B 0.00 B C:¥ fixed 31.90 GiB 17.33 GiB D:¥ remote 0.00 B 0.00 B ¥¥sh201¥share¥ E:¥ cdrom 0.00 B 0.00 B M:¥ remote 0.00 B 0.00 B ¥¥file¥share¥???¥ Total mounts/drives: 5 Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED45
  • 47. Attack log [*] ifconfig Interface 12 ============ Name : vmxnet3 Ethernet Adapter Hardware MAC : 00:50:56:a5:04:e7 MTU : 1500 IPv4 Address : 10.10.22.102 IPv4 Netmask : 255.255.255.0 IPv6 Address : fe80::84f4:5832:cee4:1469 IPv6 Netmask : ffff:ffff:ffff:ffff:: Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED46
  • 48. [*] arp ARP cache ========= IP address MAC address Interface ---------- ----------- --------- 10.10.22.1 00:50:56:a5:72:73 12 10.10.22.101 00:50:56:a5:61:6c 12 10.10.22.103 00:50:56:a5:20:29 12 10.10.22.104 00:50:56:a5:2c:a7 12 10.10.22.201 00:50:56:a5:0d:69 12 10.10.22.255 ff:ff:ff:ff:ff:ff 12 224.0.0.22 00:00:00:00:00:00 1 224.0.0.22 01:00:5e:00:00:16 12 224.0.0.252 01:00:5e:00:00:fc 12 239.255.255.250 00:00:00:00:00:00 1 239.255.255.250 01:00:5e:7f:ff:fa 12 255.255.255.255 ff:ff:ff:ff:ff:ff 12 Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED47
  • 49. [*] route IPv4 network routes =================== Subnet Netmask Gateway Metric Interface ------ ------- ------- ------ --------- 0.0.0.0 0.0.0.0 10.10.22.1 5 12 10.10.22.0 255.255.255.0 10.10.22.102 261 12 10.10.22.102 255.255.255.255 10.10.22.102 261 12 10.10.22.255 255.255.255.255 10.10.22.102 261 12 127.0.0.0 255.0.0.0 127.0.0.1 306 1 127.0.0.1 255.255.255.255 127.0.0.1 306 1 127.255.255.255 255.255.255.255 127.0.0.1 306 1 224.0.0.0 240.0.0.0 127.0.0.1 306 1 224.0.0.0 240.0.0.0 10.10.22.102 261 12 255.255.255.255 255.255.255.255 127.0.0.1 306 1 255.255.255.255 255.255.255.255 10.10.22.102 261 12 No IPv6 routes were found. Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED48
  • 50. [*] netstat Connection list =============== Proto Local address Remote address State User Inode PID/Program name ----- ------------- -------------- ----- ---- ----- ---------------- tcp 0.0.0.0:135 0.0.0.0:* LISTEN 0 0 684/svchost.exe tcp 0.0.0.0:445 0.0.0.0:* LISTEN 0 0 4/System tcp 0.0.0.0:5357 0.0.0.0:* LISTEN 0 0 4/System tcp 0.0.0.0:8089 0.0.0.0:* LISTEN 0 0 1476/splunkd.exe tcp 0.0.0.0:49152 0.0.0.0:* LISTEN 0 0 392/wininit.exe tcp 0.0.0.0:49153 0.0.0.0:* LISTEN 0 0 772/svchost.exe tcp 0.0.0.0:49154 0.0.0.0:* LISTEN 0 0 856/svchost.exe tcp 0.0.0.0:49155 0.0.0.0:* LISTEN 0 0 508/lsass.exe tcp 0.0.0.0:49170 0.0.0.0:* LISTEN 0 0 500/services.exe tcp 10.10.22.102:139 0.0.0.0:* LISTEN 0 0 4/System tcp 10.10.22.102:49227 10.10.22.201:9997 ESTABLISHED 0 0 1476/splunkd.exe tcp 10.10.22.102:49230 10.10.10.10:49155 ESTABLISHED 0 0 2576/splunk-winevtlog.exe tcp 10.10.22.102:49251 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process] Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED49
  • 51. tcp 10.10.22.102:49252 10.10.22.201:8089 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49253 10.10.22.101:139 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49254 10.10.22.101:139 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49255 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49256 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49257 10.10.10.30:80 CLOSE_WAIT 0 0 2744/powershell.exe tcp 10.10.22.102:49260 172.16.0.10:443 ESTABLISHED 0 0 2744/powershell.exe tcp 10.10.22.102:49261 10.10.22.201:9997 TIME_WAIT 0 0 0/[System Process] tcp 10.10.22.102:49263 10.10.10.60:445 ESTABLISHED 0 0 4/System tcp6 :::135 :::* LISTEN 0 0 684/svchost.exe tcp6 :::445 :::* LISTEN 0 0 4/System tcp6 :::5357 :::* LISTEN 0 0 4/System tcp6 :::49152 :::* LISTEN 0 0 392/wininit.exe tcp6 :::49153 :::* LISTEN 0 0 772/svchost.exe tcp6 :::49154 :::* LISTEN 0 0 856/svchost.exe tcp6 :::49155 :::* LISTEN 0 0 508/lsass.exe tcp6 :::49170 :::* LISTEN 0 0 500/services.exe udp 0.0.0.0:123 0.0.0.0:* 0 0 968/svchost.exe udp 0.0.0.0:3702 0.0.0.0:* 0 0 1184/svchost.exe udp 0.0.0.0:3702 0.0.0.0:* 0 0 1184/svchost.exe Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED50
  • 52. udp 0.0.0.0:5355 0.0.0.0:* 0 0 332/svchost.exe udp 0.0.0.0:51205 0.0.0.0:* 0 0 1184/svchost.exe udp 0.0.0.0:52092 0.0.0.0:* 0 0 1352/ossec-agent.exe udp 0.0.0.0:54628 0.0.0.0:* 0 0 1220/intercepter.exe udp 10.10.22.102:137 0.0.0.0:* 0 0 4/System udp 10.10.22.102:138 0.0.0.0:* 0 0 4/System udp 127.0.0.1:56398 0.0.0.0:* 0 0 508/lsass.exe udp 127.0.0.1:56400 0.0.0.0:* 0 0 332/svchost.exe udp 127.0.0.1:59787 0.0.0.0:* 0 0 856/svchost.exe udp 127.0.0.1:65485 0.0.0.0:* 0 0 1728/WmiPrvSE.exe udp6 :::123 :::* 0 0 968/svchost.exe udp6 :::3702 :::* 0 0 1184/svchost.exe udp6 :::3702 :::* 0 0 1184/svchost.exe udp6 :::5355 :::* 0 0 332/svchost.exe udp6 :::51206 :::* 0 0 1184/svchost.exe Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED51
  • 53. [*] getproxy Auto-detect : No Auto config URL : http://www.system.skyblue.test/proxy.pac Proxy URL : Proxy Bypass : Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED52
  • 54. ### SMB Remote Connection ~~~ [*] net use [+] Net use list Status Local Remote ------ ----- ------ D: ¥¥sh201¥share OK M: ¥¥file¥share¥secret Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED53
  • 55. ### Neighbor Computer(NBT) ~~~ [*] post/windows/recon/computer_browser_discovery [+] Found 4 systems. .... [*] Netdiscovery Results ==================== TYPE IP COMPUTER NAME VERSION COMMENT ---- -- ------------- ------- ------- 0x11003 10.10.22.102 KG201 6.1 0x11003 10.10.22.104 YM201 6.3 0x31003 10.10.22.103 KI201 6.3 0x51003 10.10.22.101 UN201 6.1 ~~~ meterpreter > Attack log Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED54
  • 56. Conclusion Objective Observe the adversary’s attack safely and covertly through keeping the adversary unaware of deception Technique Creating a Deception Network Using OpenFlow's Flow Tables for manipulating packets Evaluation The adversary can not observe any difference before, during, and after the cyber deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED55
  • 57. Future research Cyber deception architecture for IPv6 Realism of Deception Network Content continuity before and after deception Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED56
  • 58. Any Questions? Copyright 2019 FUJITSU SYSTEM INTEGRATION LABORATORIES LIMITED Thank you. Toru Shimanaka shimanaka.tohru@fujitsu.com 57