Sei sulla pagina 1di 6

Article reprinted from IA Newsletter Volume 3, No.

3, Summer 2010 - a publication of


Defense Technical Information Center, U.S. Department of Defense. http://iac.dtic.mil

Anatomy of Upstream
Intelligence
(Article 2 of 3)
by Tyson Macaulay

Introduction
In a world where threats can change minute to
T his article reviews the anatomy of
Upstream Intelligence (UI) and
security. It provides a description of the minute, and security posture changes at the same
major elements and activities within a
carrier or service-provider network that rate, open source information ranging in age from
generate UI. UI is not something that is
discovered intact. It is often seeded from hours to days or weeks only begins to address the
disjointed threat intelligence fragments
that evolve and grow in clarity through enterprise needs for cyber threat intelligence.
the combination and correlation of
quantitative indicators (a more detailed domain name system [DNS] servers, or Closed-Source
discussion of this process will be web-hosting sites) are published by Closed-source information is not
available in article 4 of this series). various security vendors, as well as publicly available and is associated with
UI may be seeded from open source unaffiliated/not-for-profit sites information security operations,
information, closed-source information, dedicated to security, such as the Spam intelligence gathering, “softer” business,
or developed “from scratch.” The and Open Relay Blocking System and professional relationships,
scratch approach requires more effort (SORBS) or SpamHaus. [1, 2] Open particularly among carriers and service
and resources and is usually a source intelligence also includes the providers, of which there are
by-product of an investigation into signatures and profiles of known approximately 1600 worldwide. [4]
active, but unrecognized attacks and malware, available from a source like These carriers and service-providers
zero-day exploits. the US Computer Emergency Readiness share intelligence about compromised
This article begins with a Team (US-CERT). [3] The quality of open devices and networks on a practical and
discussion on the usual seed sources of source security information is as diverse symbiotic basis at the engineering level,
UI, as well as the application of the as the available suppliers. In the end, a even while they may be harsh
network elements that husband and lot of excellent information is available competitors at the management level.
nurture the seed base into usable UI. on an open source basis, but one thing Customer complaints are another
can also be generally counted on—the form of closed-source information;
Open-Source best and most up-to-date security and persons or businesses attempting to
Open-source threat intelligence threat information reaches open- cope with degraded network service will
information is freely available on the sources last. In a world where threats usually contact carrier or service
Internet through groups with open can change minute to minute, and provider because they figure (wrongly)
memberships or simply posted to security posture changes at the same that the degradation they are
websites. Lists of suspected “bad” rate, open source information ranging in experiencing is related to a network
Internet protocol (IPs) addresses age from hours to days or weeks only problem. Such support calls frequently
(such as spammers, distributed denial- begins to address the enterprise needs reveal severely compromised machines,
of-service [DDOS] attackers, nefarious for cyber threat intelligence. much to the surprise of their owners

26 IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac


who are frequently running some form identification of the device suspected Traffic Flows
of reputable anti-virus or intrusion of compromise. The network Most, if not all, large carriers and service
detection software. communication patterns and protocols provider networks will employ systems
Information fusion among open of these devices are closely observed for for monitoring the flow of traffic through
and closed sources occurs now, without relatively simple criteria, such as the network junction points, both
the cost of complex information sharing outbound destination, port and internally and at borders with other
methodologies or large teams in fortified protocols, and especially the timing and providers. A typical means of doing this
24/7 operations centers. These are traffic characteristics. Some of the most is with a proprietary, but widely
mostly unfunded systems using ad hoc popularized UI investigations have supported protocol from Cisco called
or improvised tools, frequently within started from scratch sources, such as NetFlow. [6] NetFlow allows providers to
carrier operations centers—the last line the recent GhostNet research. [5] maintain a picture of traffic flows and
of defense against cyber attacks. These volumes—basic tools for managing
ad hoc tools and processes are effective Network Elements network quality and assurance. This
for their stakeholders by providing a Open-source, closed-source, and information is also useful for
primordial form of UI, by applying open scratch seed information needs to be understanding the threats posed by
and closed-source threat intelligence aggregated, correlated, and combined entities using the network for illicit and
within network elements, such as with observations from various network malicious purposes. Basic information
switches and routers. The discussion to elements to form UI and tools like “heat supported by NetFlow includes source
follow will seek to build up from these maps” of compromised internal and IP address, destination IP address,
initial approaches for UI creation. external devices, as revealed by what source port, destination port, IP
they are doing on the Internet at protocol, ingress interface to the
Cooking from Scratch large—not through signature based network, and some information about
Rather than harvesting a bulk list of file inspection. the type or quality of service associated
suspect IPs, domains and autonomous At a minimum, four major with the traffic. NetFlow does not
system numbers (ASNs) from open and information sources can be combined capture packets or payloads, and is not a
closed-sources, seed intelligence can be with seed information within carrier content/media interception technology.
“cooked from scratch” through forensic and service provider networks. This Analysis on large carrier traffic flow
processes where a degraded device is process generates much richer statistics (via NetFlow) is like a satellite
diagnosed and traced to external information about the activities, view of road conditions—taking in an
sources. Scratch sources often start with intentions, and operating modes of the entire region or country at once with the
a single device exposing an external compromised devices and threat agents. ability to zoom down to very granular
malicious entity, which under These information sources are: traffic activities. Traffic flows can show
observation at the enterprise or flows, DNSs, messaging infrastructure ambiguous devices talking to suspicious
optimally, the carrier-level, exposes its and peer-to-peer (P2P) infrastructure. destinations, and devices being scanned
relationships with other malicious or and probed from suspicious locations.
compromised entities. The typical However, traffic flow alone can be
approach would begin with the inconclusive because the Internet is

IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac 27


the compromised devices, who is
Internet launching attacks against specific
Bot
Master assets, and where are they maliciously
redirecting users (typically a
AS 666 compromised server). [8] Typically, the
Malicious Hosting Peer W Peer X Peer Y Peer Z
Network Peer W
worst forms of malware encode a DNS
name as the “call-home” command-
Border Routers
and-control (C&C) address once a device
has been compromised. Using a DNS
Core Router
Targeted Device/ name rather than an IP address provides
Consumer Access User Connect to
Enterprise WAN Malicious Network the botmaster (controller of the
malware) with the ability to change C&C
Compromised
Compromised Server servers to avoid detection and for
Netflow
Device Information redundancy. Awareness of DNS names
being used for C&C operations allows
Open/Closed Traffic Flow Analytics Alerts DNS operators to set alerts whenever the
Source Seed Intel
C&C domain name is queried, and then
commence response operations. DNS
Attack/Command and Control Traffic Benign Traffic
records may reveal useful information,
such as the IP address of the victim, the
Figure 1 Traffic Flow Intelligence machine’s operating system, the time
the malware was installed, the variant of
made up of many independent carriers infrastructure. Similarly, many malware active, and of course the C&C
and service providers that do not share indicators from traffic flow analysis will address itself. Alternately, DNS lookup
traffic flow data (for competitive and be inconclusive without examining the statistics can reveal incongruous
proprietary reasons) - therefore entire packet or data stream, a capability matches between IP addresses and
rendering observations incomplete. substantially beyond traffic flow analysis domain names, or where a legitimate
Figure 1 illustrates where traffic infrastructure. website has its users redirected to
flow data for UI might be derived from a malicious servers masquerading as a
carrier or large service provider network. Domain Name Service legitimate site (an attack form known as
If intelligence about a malicious or Domain name service (DNS) is one of the ‘pharming’) in an effort to steal identity
compromised device or network can be Internet’s most critical workhorses. It is a information and/or infect devices.
seeded, centralized traffic flow analytics part of all IP infrastructure and essential Figure 2 illustrates DNS
can reveal the devices communicating plumbing. DNS translates human infrastructure designs that provide
with the seeded IPs, domains, and ASNs readable addresses (Ex. www.address.com) substantial UI through the queries made
and flag them as suspicious. into a machine readable and routable by both consumers and businesses. This
address (Ex. 123.255.255.255). If DNS fails diagram shows enterprises routing their
Traffic Flow Caveats we all know about it very quickly because DNS queries through a carrier or service
There are challenges to gathering traffic most or all IP-based communication will provider, where logs can be aggregated
flow information. For instance, logically, slow down or come to a stop. DNS is also a for common benefit—however, this is
it is an expensive process because it key infrastructure to threat agents who not a mandatory design.
burdens the routers. Traffic flow rely upon like everyone else, and
statistics gathered for typical operational frequently seek to compromise it. DNS DNS Caveats
purposes may only sample packets at service compromise can result in a Gathering DNS intelligence is greatly
rates of anywhere from 1:100 to 1:10,000. wholesale fraud of dependent users. [7] facilitated by large, centralized DNS
This provides sufficient information for DNS infrastructure in carrier and services with large user bases. While
network management, but can also service provider networks is large, and consumer based ISPs often have this
result in lost or incomplete intelligence. supports millions of users and queries at infrastructure design in place, many
Capturing traffic flow statistics on a 1:1 a scale beyond most enterprises. enterprises do not. Instead, they have DNS
basis (receiving information for roughly Through this scale, DNS can provide services scattered throughout network
every packet) is not practical for most valuable forms of UI, for instance: which domains without centralized logs.
operations oriented infrastructure. devices have been compromised by Similarly, internal users might be pointing
Requiring a specialized security malware, who is attempting to control their computers to external DNS services,

28 IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac


malicious. Entities that elect to host
Rogue DNS Internet and manage independent messaging
Compromised DNS infrastructure must dedicate more
resources to deal with the illicit messaging
AS 666
arriving at their perimeter, including:
Malicious Hosting Peer W Peer X Peer Y Peer Z
Network Peer W
1) more bandwidth to carry bad messages
to the perimeter; 2) more filtering
software and servers; and 3) more people
Carrier DNS to keep the servers running. This situation
Consumer Access
Infrastructure represents an efficiency opportunity in
Compromised
Enterprise WAN Device Looks Up the trend towards outsourcing message
C&C Server
cleaning. A significant by-product of large-
Compromised scale message cleaning is the intelligence
Device Looks Up DNS Logs available as illicit or malicious messages
C&C Server
are being filtered.
Open/Closed DNS Analytics
Source Seed Intell
Alerts Messaging infrastructure will usually
support a variety of filters. It is useful to
understand the nature of these filters
Victim DNS Query Benign Traffic DNS Server
because the intelligence reports they
generate can be applied to proactive
Figure 2 DNS Intelligence (versus purely reactive) threat and risk
management. The first distinction among
different filters involves “inbound” and
Compromised Internet “outbound” message filtering. Inbound
Rogue Messaging Server Messaging Server
filtering relates to messages arriving at the
Compromised messaging aggregation point from
Device Sends
AS 666 Spam or Malware domains external to the destination
Malicious Hosting Peer W Peer X Peer Y Peer Z
Network
domain. Inbound filtering metrics
Peer W
indicate threats to the organization,
enterprise, or user base. Outbound
Carrier Messaging filtering relates to messages from an
Consumer Access
Infrastructure organization destined for external
Compromised
Enterprise WAN Device Sends domains. Outbound filter reports are of
Spam or Malware
particular interest because they can
Compromised Messaging indicate compromised internal devices,
Device Sends Server Logs which often manifest their degraded state
Spam or Malware
through the illicit e-mail messages they
Open/Closed Messaging Analytics start producing. [9]
Alerts
Source Seed Intell
Figure 3 illustrates messaging
intelligence sources, as they may be
Spam/Malware Message Benign Message DNS Server
available from service providers hosting
centralized cleansing infrastructure.
Figure 3 Messaging Intelligence Inbound messages sent to protected
domains can provide information about
where the lookup transactions are simply maintained for weeks or months, a targeted attacks on branded assets and
not seen. To maximize DNS intelligence, resource intensive and expensive demand. help identify machines that may have
organizations would need to centralize been compromised as sending sources.
logs and disallow external lookups, for Messaging (E-mail) Infrastructure Filtered outbound messages may
instance by denying most systems access Messaging infrastructure for filtering indicate that an internal device has been
to port 53 (the default DNS query port) viruses, phish and spam is increasingly compromised and is attempting to use
on firewalls. Similarly, to maximize deployed in the core carrier and service preconfigured messaging services for
diagnostic and forensic capabilities, DNS provider networks, as more than 95% illicit purposes.
logs need to be both extensive and of e-mail on the Internet is illicit, junk, or

IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac 29


Like DNS queries, messaging intelligence is most efficiently derived from
large, centralized infrastructures. While some enterprises have shifted or
are shifting to upstream/outsourced infrastructure, many continue to support
internal and dispersed infrastructure.
Messaging Caveats In considering traffic shaping evidence of many queries related to
Like DNS queries, messaging infrastructure for UI, both proactive and espionage and identity theft. [12]
intelligence is most efficiently derived reactive capabilities become apparent. Figure 4 illustrates centralized
from large, centralized infrastructures. Proactively, traffic shaping can function traffic shaping infrastructure managed
While some enterprises have shifted or as detection infrastructure—monitoring by most large carriers. This
are shifting to upstream/outsourced and issuing alerts when P2P sessions are infrastructure will detect and cap the
infrastructure, many continue to initiated from within a domain, gateway bandwidth consumption of individual
support internal and dispersed or specific IP address. P2P protocols are IP addresses.
infrastructure. Gathering messaging frequently used for command and
cleansing logs from dispersed enterprise control signaling by malware and Traffic Shaping Caveats
assets, possibly from a variety of vendor botnets. Similarly, many P2P clients are Like the other large UI sources, P2P
solutions, is a significant challenge to embedded with malware, which will intelligence has challenges. This
message intelligence. Similarly, as with support file sharing according to user infrastructure, as it typically operates
traffic flow and DNS, log management expectations, but will also index and today, can manage vast amounts of
and archiving is an expensive operation. surreptitiously expose everything on the traffic, but logging and reporting on
host computer and any available dozens of gigabits per second and
Traffic Shaping Infrastructure network drives. In this way, personal or thousands of terabits per day is
Traffic shaping infrastructure is widely corporate information residing on the computationally very expensive,
used to manage huge traffic volumes system or local network will become requiring major investments given
associated with the mostly illicit exposed to the P2P network. Analysis of normal traffic-shaping infrastructure
activities of P2P systems that threaten P2P search strings cascading through does not log anything. Another
the overall network. [10] Traffic shaping the file sharing networks shows weakness in traffic shaping UI is that the
infrastructure is another key network
element used in the generation of UI.
Traffic shaping analysis involves Bot Master Internet
real-time inspection of Internet traffic
streams looking for telltale signs of P2P Peer W
applications such as Kazaa, eMule, AS 666
Malicious Hosting Peer X Peer Y Peer Z
bitTorrent, and a range of similar tools. Network Peer W
These applications distinguish
themselves not just by large bandwidth
consumption, but also by the ports and Traffic Shaping
protocols they use, the format of the Infrastructure Enterprise
Consumer WAN
payload, and the P2P coordination Access
server addresses they communicate
with. Traffic shaping infrastructure has Traffic Shaping
become critical to carriers, and is Logs

credited with reclaiming a substantial


Open/Closed Traffic Shaping Analytics
part of the Internet from activities that Alerts
Source Seed Intell
threaten the assurance of the whole
system, not just copyrights on music Botnet C&C Traffic
and movies. [11] File Sharing Traffic Compromised Device (Moderately Bad) File Sharing Device

Figure 4 P2P Intelligence

30 IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac


payloads can also be encrypted (a smaller incremental improvements logical), asset role, asset interdependencies, asset
simple configuration option for most in each infrastructure element to do valuation, and business impact assessments. This
client packages), which can make P2P a little more can add up to the sort of threat-to information is rare, never in the
traffic harder to distinguish. needed capabilities. public domain and highly sought-after by industry; it
The UI sources discussed in this is highly tactical and can support detailed response
Web Proxy Intelligence article will generate vast amounts of and remediation, especially when combined with
An additional source of UI typically information that must be efficiently detailed threat-from information.
available at the corporate rather than managed to be viable and valuable. UI 9. For a more detailed discussion of messaging filter-
carrier level is the web proxy server logs. will change, decay, and expire very types see: Macaulay, Tyson, Upstream Security,
Most large organizations will implement quickly. Article 3 of this series will July 2009 http://www.tysonmacaulay.com
web proxy servers for internal users discuss potential business models to 10. See Census of Files Available via BitTorrent
accessing external resources on the web, effectively support UI management, http://www.freedom-to-tinker.com/blog/felten/
but also for other services like FTP. while subsequent articles will present census-files-available-bittorrent
These proxy servers have a variety of technical options and discuss privacy 11. Bell Canada internal findings related to
useful security purposes, from issue concerns associated with this scale return on investment for P2P analysis and
managing traffic consumption of information collection, correlation, management infrastructure.
internally to limiting the types and and generation. n 12. Lili Shue, Peer-to-peer networking security and
content of web pages that users access. controls, IT Governance Institute, 2003;
Web proxy settings are generally part of References http://www.enhyper.com/content/p2psecandcontrol.pdf
the corporate browser configuration and 1. http://www.us.sorbs.net
read by any desktop/local software 2. http://www.spamhaus.org
Read other articles by Tyson Macaulay
needing access to Internet resources, 3. http://www.us-cert.gov/
in the same issue of this newsletter:
including malware. Therefore, web 4. A “major” carrier can be large in terms of
proxy logs can be a good source for customers, coverage or simple dominance in a
Upstream Intelligence: A New Layer of
intelligence when seeded with market (IE, a national monopoly or duopoly)
Cybersecurity
information about known, harmful IPs, 5. http://www.scribd.com/doc/13731776/Tracking-
domains, and ASN where malware GhostNet-Investigating-a-Cyber-Espionage-Network Business Models of Upstream Intelligence
would communicate for command and 6. http://www.cisco.com/en/US/technologies/ Management and Distribution
control purposes. To the extent that web tk648/tk362/technologies_white_
proxy traffic logs are available, they are paper09186a00800a3db9.pdf
an excellent source of intelligence 7. Nominum, Layered defenses to prevent DNS
especially when combined with seed cache poisoning; Whitepaper 2009,
information and correlated with traffic http://www.nominum.com/
flow, messaging, DNS, and P2P 8. At the highest level, there are two distinct variants
intelligence at the carrier level. of threat: “threat-from” and “threat-to.”Threat-from
is about the threat agent and the resources and
Conclusion characteristics of a given agent. At the coarsest
No single network infrastructure level, some threat-from information is free and
element can identify all compromised widely available from sources like CERT, MacAfee,
devices, even if deliberately configured Symantec, Counterpane and plenty of others.
and deployed for this purpose. The Like threat-from information, coarse threat-to
combined and correlated security information is also publicly available from sources
capabilities of several infrastructures such as the Department of Homeland Security /
seeded with quality threat information Public Safety Canada, Information Sharing and
(open-source, closed-source, or scratch) Analysis Centers (ISACs) and a variety of other open
is required. This approach is more sources. These sources may provide information
practical considering that dramatic about which industries or sectors appear to be
reconfiguration and investment in of experiencing generalized threats. This type of public
existing infrastructure, such as traffic domain threat-to information is of limited value
flow, DNS, messaging, traffic shaping or because it does not contain specifically actionable
web proxies, may not be possible as intelligence either. Ideally, threat-to information
costs in processing power and storage will contain detailed metrics such as asset
could be prohibitive. However, ownership, asset names and locations (physical and

IAnewsletter Vol 13 No 3 Summer 2010 • http://iac.dtic.mil/iatac 31

Potrebbero piacerti anche