name-anomaly detection in icn · 2017-05-17 · name-anomaly detection in icn information-leakage...

26
Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo 1,2 , Thomas Silverston 3 , Hideki Tode 4 , Tohru Asami 5 and Olivier Perrin 1,2 1 Université de Lorraine, LORIA (CNRS UMR 7503) 2 Inria Nancy – Grand Est 3 National Institute for information and Communication Technology 4 Graduate School of Engineering, Osaka Prefecture University 5 Graduate School of Information Science & Technology, University of Tokyo 3 rd FRA-JPN meeting, April 24-26 2017, Tokyo

Upload: others

Post on 06-Apr-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Name-AnomalyDetectioninICNInformation-leakageinNDN

DaishiKondo1,2,ThomasSilverston3,HidekiTode4,Tohru Asami5 andOlivierPerrin1,2

1UniversitédeLorraine,LORIA(CNRSUMR7503)2InriaNancy– GrandEst

3NationalInstituteforinformationandCommunicationTechnology4GraduateSchoolofEngineering,OsakaPrefectureUniversity

5GraduateSchoolofInformationScience&Technology,UniversityofTokyo

3rd FRA-JPNmeeting,April24-262017,Tokyo

Page 2: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Information-leakage

• OneofthemainsecuritythreatinInternet– ITSecurityRisksSurvey2014:ABusinessApproachtoManaginghttp://media.kaspersky.com/en/IT_Security_Risks_Survey_2014_Global_report.pdf

• CyberEspionage– TargetedAttacks(malware,website,externalmemorydevice)

• Examples:Sony,Target– $100Mupgradingsystems– 46%dropinbenefits

[UnderstandingTargetedAttacks:TheImpactofTargetedAttacks]

2

Page 3: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

TargetedAttacks

3

Source:ITSecurityCenterIPA:ITPromotionAgencyhttp://www.ipa.go.jp/security/english/newattack_en.html

• InfectsPCviaemails• Probesnetwork• Steals Information

CountermeasuresTrainemployees?Humanerrors

Page 4: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Information-Centric Networking• Internetismostlyusedtoaccesscontent

– Video:80%ofglobalconsumertrafficby2019• [CiscoVNI2015]

– TCP/IP:host-to-host communicationparadigm• Usersareinterestedwithcontentnotlocation• Information-CentricNetworking

– Named-DataNetworking(NDN)[CoNext 2009]– Host-to-content communication

• Packetaddressrefers tocontentnameandnotlocation(host)• New« Networklayer »

forFutureInternet– Dataatthecore ofthe

communication

4

67% of Internet trafficwas video traffic in 2014

Video traffic will accountfor 80% of Internet traffic

Page 5: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

NDNOverview• Packetaddressrefers tocontentnamenotlocation

– Named-DataNetworking• Twoprimitives

– Interest,userrequestscontentbyissuinganInterestmessage

– Data,anodehavingthecontentanswerwithaDatamessage

• In-NetworkCaching• Dataatthecore ofthecommunication• New ‘NetworkLayer’forContentDelivery

5

Page 6: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Publisher

User2User1

RouterB

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom-- --

RouterAafterreceivingDataFIB

PIT

CachedcopiesinCS/doctor/index.htm

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom/doctor/index.htm User1

RouterAafterreceivingInterestFIB

PIT

CachedcopiesinCS--

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom-- --

RouterBafterreceivingDataFIB

PIT

CachedcopiesinCS/doctor/index.htm

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom/doctor/index.htm RouterA

RouterBafterreceivingInterestFIB

PIT

CachedcopiesinCS--

FIB PIT

ContentStore

RouterA

FIB PIT

ContentStore

1

2

3

4

5

8

7

6NDN/CCN packetInterest: Request for contentData/Content Object: Data to userNDN/CCN componentFIB: Forwarding Information BasePIT: Pending Interest TableCS: Content Store

[2] http://www.doctor-project.org/outcome/deliverable/DOCTOR-D1.1.pdf

OverviewofNamed-DataNetworking(NDN)

Page 7: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

OverviewofNamed-DataNetworking(NDN)

7

Publisher

User2User1

RouterB

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom-- --

RouterAafterreceivingDataFIB

PIT

CachedcopiesinCS/doctor/index.htm

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom/doctor/index.htm User1

RouterAafterreceivingInterestFIB

PIT

CachedcopiesinCS--

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom-- --

RouterBafterreceivingDataFIB

PIT

CachedcopiesinCS/doctor/index.htm

Name Forwardto/doctor RouterB/doctor/obj RouterC

Name Comingfrom/doctor/index.htm RouterA

RouterBafterreceivingInterestFIB

PIT

CachedcopiesinCS--

FIB PIT

ContentStore

RouterA

FIB PIT

ContentStore

1

2

3

4

5

8

7

6

ICN messagesInterest: request for a contentData: Data message to user

Two kinds of packets that can leak information

ICN componentsFIB: Fwd. Info. BasePIT: Pending Interest TableCS: Content Store

http://www.doctor-project.org/outcome/deliverable/DOCTOR-D1.1.pdf

Page 8: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Information-leakagewithDataPackets

8

Enterprise Network

The Internet

Gatekeeper(Network Administrator)

Attacker

Malware

Normal Agent

Employee A

Comp1/Pub/Info1

Comp1/Priv/Info1

Firewall

1) Gatekeeper has white list ofpublic contents

2) Every new content is checkedby gatekeeper to register it intowhite list

3) Any content cannot be accessedunless it is listed in white list

Rules to Publish Content

Gatekeeper can prevent information leakagethrough Data packet (reply messages)

Page 9: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

§ DatapacketincludesØData,contentname,etc.

§ CharacteristicofDatapacketØDatapacketcannotbesentifnotareplyfromInterestpacket

9

Information-LeakagethroughDataPacket

Only Interest packets can leak information from network

Page 10: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Information-leakagewithInterest

Enterprise Network

Outside Network

Malware

C&C Server

Firewall

Bot

Interest Packet

Data Packet

Interest/Data Packet

Preparation for Attack1. C&C server

(Control malware via bots)2. Bot3. Malware

Interest Name can be used to leak information through Targeted Attacks (request messages)

Page 11: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Summary:Information-leakagethroughNDNpackets

11

• Interest/Data packetsare“Request/Reply”- Contentname,etc.

• Data packetscanbefiltered out outbyadmin.- White/Blacklistsof(un)authorizedcontentnames

• CustomerList,BankingInfo,etc.

• Interestpacketsaresentoutthenetworktoexternalpublishersasrequests(“free”names)- MalwarescanuseInterest toleakInformationthroughTargetedAttacks(steganography-embedded)

Page 12: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

RiskAnalysisofInformation-LeakagethroughInterestPacketsinNDN

• Performing information-leakage with names in NDN Interest packets

• Preventinformation-leakageinNDN(Interest)– MajorthreatintheInternet– Named-DataNetworking:architectureforFutureInternet

• Proposal– Interest(Packet)filteringbasedonanomalousnames

• firewall• Methodology

– StudyNamesintheInternetwithURLs• Assumption

– NDNNameswillbebasedonURLs• EasytotranslatecurrentURLNamesintoNDNnames

Page 13: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

AttackModelandCountermeasure§ Attackmodel

ØMalwarebuildsanomalousnamestoleakinformationØsteganography-embedded

§ Countermeasures1. Name-basedfiltersusingNamestatistics2. Name-basedfilterusingone-classSVM

§ Assumption§ NDNnameswillbeextensionofURLsinthecurrentInternet

13

Page 14: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

URLs Dataset

• WebCrawlingof7mainorganizations– Amazon,Ask,Stackoverflow,BBC,CNN,Google,Yahoo

• 1millionURLsforeachorganization/(Organization)/(Directory 1)/…/(Directory n)/(File)?(Query)#(Fragment)

<path><net_loc> <query> <fragment>

Directory Part File Part

URLs Parameters(RFC1808)Lengthof<PATH> Numberof‘/’in<path>

Lengthof<QUERY> Similarityofcharactersin<PATH>

Lengthof<FRAGMENT> Similarityofcharactersin<QUERY>

LengthofDirectory Similarity ofcharactersin<FRAGMENT>

LengthofFile

Page 15: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

CharacterFrequenciesinURLs

19/5/16

URLs <PATH>

URLs <QUERY>

URLs <FRAGMENT>

Page 16: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

URLsStatistics

100 162 23

21 57 5

0.95 0.95 0.95

0.950.950.95

Legitimate names: 95th percentile

Page 17: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

URLsStatistics§ URLattributesandcomputedpercentiles

§ similarityofaveragedfrequenciesofalphabetsinPathandQuerycomparedtotypicalEnglishtext[6]

ØHighsimilaritywithtypicalEnglishtext=>UsingWordNet[7]forsteganography

17

[6] Frequency analysis, https://en.wikipedia.org/wiki/Frequency_analysis

[7] G. A. Miller, “WordNet: A Lexical Database for English," Commun. ACM, vol. 38, no. 11, pp. 39–41, Nov. 1995.

Page 18: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

URLsSimilarity

Legitimate names exceed average similarity

Page 19: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

NamesFilteringHeuristics§ FilterbasedonmeasuredURLparameters

§ Length(Path,Query,Fragment,Direction,File),#/§ 95th percentile

§ 33%anomalousURLs(67%arelegitimatenames)§ FilterwithSimilaritymeasure

§ Previousextendedfilter§ Characterfrequenciesw.r.t.averagefrequenciesinURLsdataset(Path,Query,Fragment)

§ 15%anomalousURLs(85%legitimatenames)

Page 20: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Attacker20

§ LeakeddataØ 3.4MBZipfilecompressing3Pdffilesfrom

latestITU-Trecommendations[9]§ Thresholdforeachattributeinanomalous

§ Dictionarycodingwith65,536dictionarywordsfromWordNet[7]Ø Tablewitheachdictionarywordand4

hexadecimaldigitstoeachword(onewordisequalto2Bytes)

[9] ITU-T, http://www.itu.int/en/ITU-T/publications/Pages/latest.aspx

Flow to create anomalous names with dictionary coding(i.e., steganography) in “com” domain

comnetorginfojpfruk

Attacker exploits one-class SVMto extract legitimate URLs

E.g.,ndn://attacker.com/info-leak/apple

ndn://attacker.com/info-leak/apple?

ndn://attacker.com/info-leak/apple?key1=banana

ndn://attacker.com/info-leak/apple?key1=bananandn://attacker.com/info-leak/……

Page 21: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Name-BasedFilterUsingOne-ClassSVM

§ One-classSVM[4]isunsupervisedmethodtoperformanomalydetectionØAdaptedifnotmanysamples

§ RegardingNDNarchitecture,therearecurrentlynotanomaloustrafficnornamesavailableØExtractingURLpropertiesascharacteristicsoflegitimatenamesandapplyingthemforone-classSVMfilter

21

[4] B. Scholkopf, et al., “Estimating the Support of a High-Dimensional Distribution,” Neural Comput., vol. 13, no. 7, pp. 1443–1471, Jul. 2001.

Filter using one-class SVM inspects namesdropped by filter using search engine

information

Page 22: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

PerformanceEvaluation§ Performancemetric

ØPer-packetthroughputofinformation-leakage(Bytes/Interest_packet)

§ EachTLDdatasetisseparatedintotwosetstocreatename-basedfilterusingone-classSVMØTrainingsetforeachTLD:800,000URLsØTestingsetforeachTLD:200,000URLs

§ AssumptionØDefendingknowsattackmethod(i.e.,steganography-embedded Interestpackets)butnotitsparameters

ØAttackerknowscountermeasurebutnotitsparametersØThiscaseisofbenefittoattacker

22

Page 23: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

PerformanceEvaluation

By using filter, malware has to send 264 times (2.06 KB/ 7.79B) more Interest packets

to the attacker than without using filter

• WithoutSVMfilter• Attackerbuildsnamesandleakinformation(steganography)• 2.06Kbytes/Interest_packets

• WithSVMfilter(tunedparameters)• 7.79Bytes/Interest_packets

Page 24: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

ProjectANRDoctor(2014-2017)http://www.doctor-project.org/

• Deploymentofnewnetworkfunctionsandprotocols(e.g.:NDN)inavirtualizednetworkingenvironment(e.g.:NFV)

– Monitoring,managingandsecuring(usingSDNforreconfiguration)

• Partners:Orange,Thlaes,Montimage,UTT,LORIA/CNRS(900k€)

24

Page 25: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

Conclusion• Information-leakageismainInternetSecuritythreat

– TargetedAttacks

• NDNasFutureInternetarchitecture– Preventleakageinformationfromnames(InterestPackets)

• Steganography-embeddedattacksinNames

• NDNNamesfilteringheuristics– BasedonURLsstatistics– Upto15%ofanomalousURLs– FirewallforNDN

• SVM-basedfilteringheuristics– Chokethroughputofinformation-leakage– Upto264moreInterestpacketstoleakthesameamountofinformation

• DesigningNamingSchemeforNamed-DataNetworking(NDN)– PrivacyinNDN

Page 26: Name-Anomaly Detection in ICN · 2017-05-17 · Name-Anomaly Detection in ICN Information-leakage in NDN Daishi Kondo1,2, Thomas Silverston3, Hideki Tode4, Tohru Asami5and Olivier

ThankYou

• Questions?

[email protected]