+ All Categories
Home > Documents > Countering Denial of

Countering Denial of

Date post: 07-Jan-2022
Category:
Upload: others
View: 7 times
Download: 0 times
Share this document with a friend
88
Countering Denial of Information Attacks Gregory Conti www.cc.gatech.edu/~conti [email protected] Original Photos: National Geographic, Photoshopper: Unknown
Transcript
Page 1: Countering Denial of

Countering Denial of Information Attacks

Gregory Contiwww.cc.gatech.edu/[email protected]

Original Photos: National Geographic, Photoshopper: Unknown

Page 2: Countering Denial of

Disclaimer

The views expressed in this presentation are those of the author and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense or the U.S. Government.

image: http://www.leavenworth.army.mil/usdb/standard%20products/vtdefault.htm

Page 3: Countering Denial of

Denial of Information Attacks:

Intentional Attacks that overwhelm the human or otherwise alter their decision making

http://circadianshift.net/images/Virginia_Tech_1920s_NS5423_Y_small.jpg

Page 4: Countering Denial of

http://blogs.msdn.com/michkap/archive/2005/05/07/415335.aspx

Page 5: Countering Denial of

from Slashdot…

I have a little PHP script that I use whenever I get a phishing email. The script generates fake credit card numbers, expiration dates, etc. and repeatedly hits the phishing site's form dumping in random info.

Any halfway intelligent phisher would record the IP address of each submission and just dump all of mine when he saw there were bogus, but it makes me feel good that I at least wasted some of his time ;)

http://yro.slashdot.org/comments.pl?sid=150848&cid=12651434

Page 6: Countering Denial of

The Problem of Information Growth

• The surface WWW contains ~170TB (17xLOC) • IM generates five billion messages a day (750GB),

or 274 terabytes a year. • Email generates about 400,000 TB/year. • P2P file exchange on the Internet is growing

rapidly. The largest files exchanged are video files larger than 100 MB, but the most frequently exchanged files contain music (MP3 files).

http://www.sims.berkeley.edu/research/projects/how-much-info-2003/

Page 7: Countering Denial of

http://cagle.slate.msn.com/news/EvilEmailHackers/main.asp

Page 8: Countering Denial of

Source: http://www.advantage.msn.it/images/gallery/popup.gif

Page 9: Countering Denial of

Source: http://www.knockmail.com/Graphics/inbox.gif

Page 10: Countering Denial of
Page 11: Countering Denial of

In the end, all the power of the IDS is ultimately controlled by a single judgment call on whether or not to take action.

- from Hack Proofing Your Network

Page 12: Countering Denial of

DoI Attack Scenarios

Scenario Signal (s) Noise (n) s/n Impact

#1 Low Low Parity Marginal to good ability to find information

#2 High Low Parity Good to excellent ability to find information

#3 Low High Good DoI

#4 Very High Very High Bad DoI, processing, I/O or storage capability exceeded (akaDoS)

Page 13: Countering Denial of

DoI Attack Scenarios

Scenario Signal (s) Noise (n) s/n Impact

#1 Low Low Parity Marginal to good ability to find information

#2 High Low Parity Good to excellent ability to find information

#3 Low High Good DoI

#4 Very High Very High Bad DoI, processing, I/O or storage capability exceeded (akaDoS)

Page 14: Countering Denial of

DoI Attack Scenarios

Scenario Signal (s) Noise (n) s/n Impact

#1 Low Low Parity Marginal to good ability to find information

#2 High Low Parity Good to excellent ability to find information

#3 Low High Good DoI

#4 Very High Very High Bad DoI, processing, I/O or storage capability exceeded (akaDoS)

Page 15: Countering Denial of

DoI Attack Scenarios

Scenario Signal (s) Noise (n) s/n Impact

#1 Low Low Parity Marginal to good ability to find information

#2 High Low Parity Good to excellent ability to find information

#3 Low High Good DoI

#4 Very High Very High Bad DoI, processing, I/O or storage capability exceeded (akaDoS)

Page 16: Countering Denial of

Microsoft, AOL, Earthlink and Yahoo file 6 antispamlawsuits (Mar 04)

Defense Taxonomy (Big Picture)

Lawsuits Legal

New Laws

Regulatory Government Regulation

PR Campaign Moral

Code of Ethics

Cultural Communities

Organizational Topical counter-DoI groups

Financial Increasing cost of DoI operations

Violence Violence against DoI perpetrators

Technology (see next slide)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 17: Countering Denial of

Microsoft, AOL, Earthlink and Yahoo file 6 antispamlawsuits (Mar 04)

Defense Taxonomy (Big Picture)

Lawsuits Legal

New Laws

Regulatory Government Regulation

PR Campaign Moral

Code of Ethics

Cultural Communities

Organizational Topical counter-DoI groups

Financial Increasing cost of DoI operations

Violence Violence against DoI perpetrators

Technology (see next slide)

Federal Can Spam Legislation (Jan 04)

California Business and Professions Code, prohibits the sending of unsolicited commercial email (September 98)

http://www.metroactive.com/papers/metro/12.04.03/booher-0349.html

First Spam Conference (Jan 03)

Page 18: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

System Model

Producer

Page 19: Countering Denial of

Human Consumer

Human Producer

Consumer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

very small text

Producer

exploit round off algorithm

trigger many alerts

misleadingadvertisements

spoof browser

ExampleDoI

Attacks

Page 20: Countering Denial of

Consumer

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Producer

TCP Damping

UsableSecurity

ExampleDoI

Defenses

Eliza Spam Responder

ComputationalPuzzle Solving

Decompression Bombs

Page 21: Countering Denial of

Orient

Observe

Act

Decide

Scan Subject Line

SpamDelete

Confirm DeletionSuccessful

Not Spam

No Observation

No Action

OverheadNumber of Email

x Time to Decide

OverheadNumber of Spam x Time to Delete

OverheadNumber of Spam

x Time to Observe

Total Overhead= (Number of Spam x (Time to Delete + Time to Observe))+(Number of Email X (Time to Decide + Time to Scan))

OverheadNumber of Email

x Time to Scan

Page 22: Countering Denial of

Pull Example: Web Search

FormulateQuery

Scan 2 Pages of Results

Search for “Grace”

Goal: Find “Grace”Visualization Tool

Reform Query

Scan Top 2 Results

PerformsDatabaseSearchReturn 13,100,000 Results

Search for “Grace Visualization”

Return 31,900 Results

Return 404 File Not Found

Get http://www.site.edu/grace.html

Click 2nd Visualization Group Grace

Support Page Link

Return grace.html

Get http://www.site.edu/grace/grace.html

Click 1st Visualization Group Grace

Support Page Link

Scan page for Grace Download

(not found)Click Grace

Home Page Link

Bookmark PageReturn index.html

Get http://www.homepage.org

PerformsDatabaseSearch

Returns 404 Error Page

Returnsgrace.html

Returnsindex.html

Page 23: Countering Denial of

Pull Example: Latency & Processing

HumanProcessing

Query

Result

ChannelLatency

HumanIdle Nodal

Processing

ChannelLatency

HumanProcessing

Page 24: Countering Denial of

Pull Example: Human Processing

Result

GET index.html

HumanProcessing

1. Observe

2. Orient

3. Decide

4. Act

Page 25: Countering Denial of

Pull Example: Nodal Processing

Query

Result

NodalProcessing

1. Receive Query

2. Parse

3. Process

4. Access Database

5 C t HTML R lt

HumanIdle

Page 26: Countering Denial of

For more information…

G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. (to be published)

email me…

Page 27: Countering Denial of

Information Firewall

Page 28: Countering Denial of
Page 29: Countering Denial of

parser

data sources

informationfirewall

analyst views

filter all but headlines

filtering

fusion

rules engine

transformdatabase

filter all but today’s weather

transform processing

engine

Page 30: Countering Denial of

For more information…

G. Conti, M. Ahamad and R.Norback; "Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall;" IEEE International Conference on Intelligence and Security Informatics (IEEE-ISI); May 2005.

see www.cc.gatech.edu/~conti

Page 31: Countering Denial of

DoI Countermeasures in the Network Security Domain

Page 32: Countering Denial of

information visualization is the use of interactive, sensory representations, typically visual, of abstract data to reinforce cognition.

http://en.wikipedia.org/wiki/Information_visualization

Page 33: Countering Denial of

rumint security PVR

Page 34: Countering Denial of

Net

wor

k pa

cket

s ove

r tim

e

Bit 0, Bit 1, Bit 2 Length of packet - 1

Page 35: Countering Denial of

rumint 1.15 tool overview

network monitoring mode (left), clicking the small pane brings up the detailed analysis view for that visualization.

Page 36: Countering Denial of

For more information…G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004.

--Talk PPT Slides --Classical InfoVis

Survey PPT Slides--Security InfoVis

Survey PPT Slides

G. Conti and K. Abdullah; " Passive Visual Fingerprinting of Network Attack Tools;" ACM Conference on Computer and Communications Security's Workshop on Visualization and Data Mining for Computer Security (VizSEC); October 2004.

--Talk PPT Slides

see www.cc.gatech.edu/~conti and www.rumint.org for the tool

Page 37: Countering Denial of

Last year at DEFCON

First question…

How do we attack it?

Page 38: Countering Denial of

Malicious Visualizations…

Page 39: Countering Denial of

Pokemon

http://www.miowebitalia.com/desktop/cartoni/pokemon.jpg

Page 40: Countering Denial of

Basic Notion

Denial of Information vs. InfoVis

A malicious entity can attack humans throughinformation visualization systems by:

– Inserting malicious data into data stream– Altering timing of data

Note that we do not assume any alteration or modification of data, such as that provided from legitimate sources or stored in databases.

Page 41: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

System Model

Producer

Page 42: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Timing Vector

Timing Attack

Producer

Page 43: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Data Generation Vector

Data InsertionAttack

Page 44: Countering Denial of

Attack Manifestations

Page 45: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Target (Human User)

Producer

Page 46: Countering Denial of

Displacement Attack(memory)

Page 47: Countering Denial of

Attack Fading(memory)

http://etherape.sourceforge.net/Image: http://www.inf.uct.cl/~amellado/gestion_en_linux/etherape.jpg

Page 48: Countering Denial of

Comparing Hidden Information(Memory)

Page 49: Countering Denial of

Comparing Side-by-Side Information(Memory)

Page 50: Countering Denial of

Color Mapping Attack(perception)

Page 51: Countering Denial of

Motion Induced Blindness(perception)

http://www.keck.ucsf.edu/~yoram/mib-basic.html

Page 52: Countering Denial of

Optical Illusions (perception)

http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html

Page 53: Countering Denial of

Optical Illusions (2)

http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html

Page 54: Countering Denial of

Optical Illusions (1)

http://www.ritsumei.ac.jp.nyud.net:8090/~akitaoka/index-e.html

Page 55: Countering Denial of

Spatial Orientation Attack(Descent 3)

http://www.3dgw.com/game/preview/descent3/d307.jpg

Page 56: Countering Denial of

Trust Attack (defacement)

http://www.attrition.org/

Page 57: Countering Denial of

Visual Information Overload (perception)

p ( )

Page 58: Countering Denial of

Crying Wolf…(cognitive/motor)

• Snot vs. Snort

Page 59: Countering Denial of

Force User to Rotate(motor)

http://www.cc.gatech.edu/classes/AY2003/cs7450_spring/Students/a1/sumier.phalake/

Page 60: Countering Denial of

Human Attention Attack

• how long (and how well) can a human sustain attention

• how easily can the human be distracted

http://www.bobandtom.com/gen3/index.htm

Page 61: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Targets (User’s Computer)

Producer

Page 62: Countering Denial of

Labeling Attack (algorithm)

• 100 elements• X = 1..100• Y = rand() x 10

Page 63: Countering Denial of

CDX 2003 DatasetX = TimeY = Destination IPZ = Destination Port

Labeling Attack (algorithm)

Page 64: Countering Denial of

SANS Internet Storm Center: World Map

http://isc.sans.org/large_map.php

Page 65: Countering Denial of

GUI Widget Attack(interface)

Any attempt to further zoom forces scroll off screen

Page 66: Countering Denial of

AutoScale Attack/Force User to Zoom(algorithm)

Page 67: Countering Denial of

Precision Attack(algorithm)

http://developers.slashdot.org/article.pl?sid=04/06/01/1747223&mode=thread&tid=126&tid=172

http://www.nersc.gov/nusers/security/Cube.jpg

Page 68: Countering Denial of

Data Threshold Attack

Michael Gastner, Cosma Shalizi, and Mark NewmanUniversity of Michigan http://www-personal.umich.edu/~mejn/election/

Page 69: Countering Denial of

Occlusion(visualization design)

Page 70: Countering Denial of

Occlusion Attack(visualization design)

Detail using jitter

30 77.31 TCP30 77.31 TCP30 77.31 TCP30 77.31 TCP30 77.31 ICMP30 77.31 TCP30 77.31 TCP30 77.31 TCP30 77.31 TCP30 77.31 TCP30 77.31 TCP

Detail data table

Page 71: Countering Denial of

Jitter Attack

• Same Data

Page 72: Countering Denial of

Jitter Attack

• Same Data

Page 73: Countering Denial of

Jamming (visualization design)

Page 74: Countering Denial of

Trust Attack (phishing)

http://www.antiphishing.org/phishing_archive/ebay_phishing.jpg

Page 75: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

Producer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Target (Data Generation & Communication)

Data InsertionAttack

Page 76: Countering Denial of

Data Generation and Communication

• sensor blindness • selective blindness • spoof source identity• sampling rate• poisoned data • channel timing

Page 77: Countering Denial of

Human Consumer

Human Producer

CommunicationChannel

ConsumerNode

RAM

HardDrive

CPU

ProducerNode

STM

LTM

Cognition

Consumer

RAM

HardDrive

CPUSTM

LTM

Cognition

Vision

Hearing

Speech

Motor

Vision

Hearing

Speech

Motor

Targets (User’s Environment)Targets (User’s Environment)

Producer

Page 78: Countering Denial of

Get you fired Attack

Got some slick, nobody's foolsysadmin you need to get past?

Well, cook up a portscan that will look like a giant <snip>

Boss walks past, geek gets fired, replaced by bosses moron nephew who is more than happy to give you the keys to the server when you call and identify yourself as the Hamburglar.

http://www.toonopedia.com/dilbert.htmhttp://developers.slashdot.org/developers/04/06/01/1747223.shtml

Page 79: Countering Denial of

Countermeasures• Assume an intelligent and well informed adversary• Design system with malicious data in mind• Assume your tool (and source) are in the hands of

an attacker• Train users to be alert for manipulation• Validate data• Assume your infrastructure will be attacked• In worst case, assume your attacker has knowledge

about specific users• Design visualizations/vis systems that are resistant

to attack• If you can’t defeat attack, at least facilitate

detection• Use intelligent defaults• Provide adequate customization

Page 80: Countering Denial of

For more information…

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.

See also www.rumint.orgfor the tool.

on the con CD…

Page 81: Countering Denial of

Other Attack Vectors…

• Usenet• Blogs• Web Forms• Websites• What else?

• Imagine a large blinking red gif

Page 82: Countering Denial of

Other Sources of Information…

• Guarding the Next Internet Frontier: Countering Denial of Information Attacks by Ahamad, et al– http://portal.acm.org/citation.cfm?id=844126

• Denial of Service via Algorithmic Complexity Attacks by Crosby– http://www.cs.rice.edu/~scrosby/hash/

• A Killer Adversary for Quicksort by McIlroy– http://www.cs.dartmouth.edu/~doug/mdmspe.pdf

• Semantic Hacking– http://www.ists.dartmouth.edu/cstrc/projects/semantic-

hacking.php

Page 83: Countering Denial of

Demo

Page 84: Countering Denial of

On the CD…• Code

– rumint – secvis– rumint file conversion tool

(pcap to rumint)

• Papers– SOUPS Malicious

Visualization paper– Hacker conventions article

• Data– SOTM 21 .rum

See also: www.cc.gatech.edu/~conti and www.rumint.orghttp://www.silverballard.co.nz/content/images/shop/accessories/cd/blank%20stock/41827.jpg

Page 85: Countering Denial of

rumint feedback requested…• Tasks• Usage

– provide feedback on GUI– needed improvements– multiple monitor machines– bug reports

• Data – interesting packet traces– screenshots

• with supporting capture file, if possible• Pointers to interesting related tools (viz or not)• New viz and other analysis ideas

Volunteers to participate in user study

Page 86: Countering Denial of

Acknowledgements

404.se2600, Kulsoom Abdullah, Sandip Agarwala, Mustaque Ahamad, Bill Cheswick, Chad, Clint, Tom Cross, David Dagon, DEFCON, Ron Dodge, EliO, Emma, Mr. Fuzzy, Jeff Gribschaw, Julian Grizzard, GTISC, Hacker Japan, Mike Hamelin, Hendrick, Honeynet Project, Interz0ne, Jinsuk Jun, Kenshoto, Oleg Kolesnikov, Sven Krasser, Chris Lee, Wenke Lee, John Levine, David Maynor, Jeff Moss, NETI@home, Henry Owen, Dan Ragsdale, Rockit, Byung-Uk Roho, Charles Robert Simpson, Ashish Soni, SOUPS, Jason Spence, John Stasko, StricK, Susan, USMA ITOC, IEEE IAW, VizSEC 2004, Grant Wagner and the Yak.

Page 87: Countering Denial of

GTISC

• 100+ Graduate Level InfoSec Researchers• Multiple InfoSec degree and certificate programs• Representative Research

– User-centric Security– Adaptive Intrusion Detection Models– Defensive Measures Against Network Denial of Service

Attacks– Exploring the Power of Safe Areas of Computation– Denial of Information Attacks (Semantic Hacking)– Enterprise Information Security

• Looking for new strategic partners, particularly in industry and government

www.gtisc.gatech.edu

Page 88: Countering Denial of

http://www.museumofhoaxes.com/tests/hoaxphototest.html

Greg Conti

[email protected]

www.cc.gatech.edu/~contiwww.rumint.org

Questions?


Recommended