Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection
<p>Global IP traffic forecast for up to 2021—Compound Annual Growth Rate (CAGR) [<a href="#B25-applsci-07-01082" class="html-bibr">25</a>].</p> "> Figure 2
<p>Cumulative annual security alert totals [<a href="#B27-applsci-07-01082" class="html-bibr">27</a>].</p> "> Figure 3
<p>Honeynet architecture. [<a href="#B67-applsci-07-01082" class="html-bibr">67</a>].</p> "> Figure 4
<p>Sample lines of the exported csv file. Reticence is used to suppress the repetition of empty fields.</p> "> Figure 5
<p>Numbers of packets sent to the Honeynet per day.</p> "> Figure 6
<p>Classification of traffic according to its source, from August 2016 to December 2016. (<b>a</b>) indicates source country of the attacks; (<b>b</b>) indicates IP source, in the inner chart, and their respective service attacked type represented in the outer chart.</p> "> Figure 7
<p>Most attacked honeypots.</p> "> Figure 8
<p>Classification of traffic according to its destination port.</p> "> Figure 9
<p>Some of the IP addresses that sent four packets to the Honeynet (inner chart); protocol used (middle chart) and their corresponding TCP flags (outer chart).</p> "> Figure 10
<p>Users (<b>a</b>) and passwords (<b>b</b>) guessed by the Mirai botnet.</p> "> Figure 11
<p>Evidenced <span class="html-italic">modus operandi</span> of Mirai botnet.</p> "> Figure 12
<p>Users (<b>a</b>) and passwords (<b>b</b>) guessed in the FTP brute force.</p> "> Figure 13
<p>NTP Analysis. Most frequent NTP request codes (<b>a</b>); and NTP transmit timestamp (inner chart) and the respective IP source believed to be spoofed (outer chart) (<b>b</b>).</p> ">
Abstract
:1. Introduction
2. Review of the State of the Art about Packet Analysis and Related Work
2.1. Deep Packet Inspection
2.2. DPI Common Challenges and Requirements
2.3. Network Forensics and the Cybersecurity Market
2.4. Related Research about Deep Packet Inspection
2.5. Network Forensics
Investigation Procedures
- No action taken by any insider should change the evidence.
- In circumstances where accessing original data is required, an explanation of the relevance and implications of such actions must be provided.
- An audit trail, or similar record, of all events should be generated, collected and preserved. An independent third party should be able to examine those events and achieve the same conclusion.
- The person in charge of the investigation must ensure the application of these principles.
3. Network Anomaly Detection
3.1. String Matching
3.2. Header and Payload Analysis
3.2.1. Data Link Layer
3.2.2. Network Layer
3.2.3. Transport Layer
3.2.4. Application Layer
4. DPI Applied to Honeynet Traffic and Attacks
4.1. Description of the Architecture
4.2. Layer 3 Header Analysis
4.2.1. Classification of Traffic by Its Geoinformation
4.2.2. Classification of Traffic towards Its Destination in the Honeynet
4.3. Layer 4 Header Analysis
4.3.1. Classification of Traffic by Its Destination Port
4.3.2. TCP Flag Anomalies
4.4. Layer 5 to 7 Payload Analysis
4.4.1. Traffic Analysis of Port 23
{username} and {password}, then enable or system or shell, or sh, then /bin/busybox MIRAI,where {username} and {password} are those present in the Mirai dictionary, and the following commands are used to detect if the target is not a router or common honeypot, like Cowrie.
’busybox tftp’ -r [MalwareFileName] -g [IPsource] ’busybox tftp’ -g -l ’dvrHelper’ -r [MalwareFileName] [IPsource].
4.4.2. Evaluating Mirai Details
4.4.3. Traffic Analysis of Ports 445 and 139
SEQ 1
523379 <-> 9x.4x.53.209 TCP 1963 - 172.30.20.36 TCP 139 [SYN, SYN, ACK]
523380 -> SMB Negotiate Protocol Request
523385 <- SMB Negotiate Protocol Response
523387 -> SMB Session Setup AndX Request, NTLMSSP_NEGOTIATE
523388 <- SMB Session Setup AndX Response, NTLMSSP_CHALLENGE, Error: STATUS_MORE_PROCESSING_REQUIRED
523389 -> SMB Session Setup AndX Request, NTLMSSP_AUTH, User: \
523390 <- SMB Session Setup AndX Response
523391 -> SMB Tree Connect AndX Request, Path: \\<honeypot-public-Ip>\IPC$
523392 <- SMB Tree Connect AndX Response
523393 -> SMB NT Create AndX Request, Path: \srvsvc
523394 <- SMB NT Create AndX Response, FID: 0x0000, Error: STATUS_ACCESS_DENIED
523394 <- SMB NT Create AndX Response, FID: 0x0000, Error: STATUS_ACCESS_DENIED
523397 <- SMB NT Create AndX Response, FID: 0x800e
523398 -> DCERPC Bind: call_id: 1, UUID: SRVSVC
523399 <- SMB Write AndX Response, FID: 0x800e, 116 bytes
523401 -> SMB Read AndX Request, FID: 0x800e, 1024 bytes at offset 0
523402 <- SMB Bind_ack: call_id: 1, result: Provider rejection
SEQ 2
6 <-> <infector-ip> TCP 2971 - <honey-ip> 445 [SYN, SYN, ACK]
13 -> SMB Negotiate Protocol Request
14 <- SMB Negotiate Protocol Response
17 -> SMB Session Setup AndX Request, NTLMSSP_AUTH, User: \
18 <- SMB Session Setup AndX Response
19 -> SMB Tree Connect AndX Request, Path: \\<honey-ip>\IPC\$
20 <- SMB Tree Connect AndX Response
21 -> SMB NT Create AndX Request, Path: \browser
22 <- SMB NT Create AndX Response, FID: 0x4000
23 -> DCERPC Bind: call_id: 0 UUID: SRVSVC
24 <- SMB Write AndX Response, FID: 0x4000, 72 bytes
25 -> SMB Read AndX Request, FID: 0x4000, 4292 bytes at offset 0
26 <- DCERPC Bind_ack
27 -> SRVSVC NetrpPathCanonicalize request
28 <- SMB Write AndX Response, FID: 0x4000, 1152 bytes
29 -> SMB Read AndX Request, FID: 0x4000, 4292 bytes at offset 0
Initiating Egg download
30 <-> <honey-ip> TCP 1028 - <infector-ip> 8295 [SYN, SYNACK]
34-170 114572 byte egg download ...
Connecting to IRC server on port 8080
174 <-> <honey-ip> TCP 1030 - 66.25.XXX.XXX 8080 [SYN, SYNACK]
176 <- NICK [2K|USA|P|00|eOpOgkIc]\r\nUSER 2K-USA
177 -> :server016.z3nnet.net NOTICE AUTH
:*** Looking up your hostname...\r\n’’ ...
179 -> ... PING :B203CFB7
180 <- PONG :B203CFB7
182 -> Welcome to the z3net IRC network ...
Joining channels and setting mode to hidden
183 -> MODE [2K|USA|P|00|eOpOgkIc] +x\r\nJOIN ##RWN irt3hrwn\r\n
Start scanning 203.0.0.0/8
185 -> ....scan.stop -s; .scan.start NETAPI 40 -b -s;
.scan.start NETAPI 203.x.x.x 20 -s;
.scan.start NETAPI 20 -a -s;.scan.start SYM 40 -b -s;
.scan.start MSSQL 40 -b -s\r\n...
191 -> 203.7.223.231 TCP 1072 > 139 [SYN]
192 -> 203.199.174.117 TCP 1073 > 139 [SYN] scan, scan...
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Network Bridge <System>\netadp.exe
4.4.4. Traffic Analysis of Port 80
4.4.5. Traffic Analysis of Port 21
4.4.6. Traffic Analysis of Port 123
5. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
Abbreviations
CAGR | Compound Annual Growth Rate |
CoC | Chain of Custody |
DDoS | Distributed Denial of Service |
DoS | Denial-of-Service |
DPI | Deep Packet Inspection |
IDS | Intrusion Detection System |
IOC | Indicator Of Compromise |
API | Application Programming Interface |
FTP | File Transfer Protocol |
HTTP | Hypertext Transfer Protocol |
IoT | Internet of Things |
IPS | Intrusion Prevention System |
IRC | Internet Relay Chat |
MAC | Media Access Control |
MIB-II | Management Information Base Version Two |
MITM | Man-In-The-Middle |
MPI | Medium Packet Inspection |
NAT | Network Address Translation |
NTP | Network Time Protocol |
QoS | Quality of Service |
RegEx | Regular Expression |
RPC | Remote Procedure Call |
SDN | Software-Defined Network |
SMB | Server Message Block |
SNMP | Simple Network Management Protocol |
SPI | Shallow Packet Inspection |
SSL | Secure Socket Layer |
TOR | The Onion Router |
TTL | Time To Live |
UDP | User Datagram Protocol |
VAST | Visibility Across Space and Time |
References
- Markets and Markets. Deep Packet Inspection and Processing Market by Application (IDS and IPS, Network Performance Management, and Data Loss/Leak Prevention and Management), by Service, by Organization Size, by Vertical, by End User, & by Region—Global Forecast to 2021. Available online: http://www.marketsandmarkets.com/Market-Reports/deep-packet-inspection-processing-market-252816977.html (accessed on 20 September 2017).
- Parsons, C. Deep Packet Inspection in Perspective: Tracing Its Lineage and Surveillance Potentials; Queen’s University, Surveillance Studies Centre: Kingston, ON, Canada, 2008. [Google Scholar]
- White, T. Hadoop: The Definitive Guide; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2012. [Google Scholar]
- Narkhede, N.; Shapira, G.; Palino, T. Kafka: The Definitive Guide; O’Reilly Media: Sebastopol, CA, USA, 2016. [Google Scholar]
- Parvat, T.J.; Chandra, P. A Novel approach to deep packet inspection for intrusion detection. Procedia Comput. Sci. 2015, 45, 506–513. [Google Scholar] [CrossRef]
- Xu, C.; Chen, S.; Su, J.; Yiu, S.; Hui, L. A Survey on Regular Expression Matching for Deep Packet Inspection: Applications, Algorithms, and Hardware Platforms. IEEE Commun. Surv. Tutor. 2016, 18, 2991–3029. [Google Scholar] [CrossRef]
- Bendrath, R. Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection. In Proceedings of the International Studies Annual Convention, New York, NY, USA, 15–18 February 2009; Volume 15. [Google Scholar]
- Bendrath, R.; Mueller, M. The end of the net as we know it? Deep packet inspection and internet governance. New Media Soc. 2011, 13, 1142–1160. [Google Scholar] [CrossRef]
- Fuchs, C. Implications of Deep Packet Inspection (DPI) Internet Surveillance for Society; The Privacy & Security Research Paper Series 1; PACT: Uppsala, Sweden, 2012. [Google Scholar]
- Lin, Y.S.; Lee, C.L.; Chen, Y.C. Length-bounded hybrid CPU/GPU pattern matching algorithm for deep packet inspection. Algorithms 2017, 10, 16. [Google Scholar] [CrossRef]
- Shankar, S.S.; Lin, P.; Herkersdorf, A.; Wild, T. Hardware acceleration of signature matching through multi-layer transition bit masking. In Proceedings of the 26th IEEE International Telecommunication Networks and Applications Conference, Dunedin, New Zealand, 7–9 December 2016; pp. 217–224. [Google Scholar]
- Su, J.; Chen, S.; Han, B.; Xu, C.; Wang, X. A 60Gbps DPI Prototype based on Memory-Centric FPGA. In Proceedings of the ACM SIGCOMM Conference, Florianópolis, Santa Catarina, Brazil, 22–26 August 2016; pp. 627–628. [Google Scholar]
- Piyachon, P.; Luo, Y. Efficient memory utilization on network processors for deep packet inspection. In Proceedings of the ACM/IEEE Symposium on Architecture for networking and communications systems, San Jose, CA, USA, 3–5 December 2006; pp. 71–80. [Google Scholar]
- Guo, Y.; Gao, Y.; Wang, Y.; Qin, M.; Pu, Y.; Wang, Z.; Liu, D.; Chen, X.; Gao, T.; Lv, T.; Fu, Z. DPI & DFI: A Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection. Procedia Eng. 2017, 174, 1309–1314. [Google Scholar]
- Sherry, J.; Lan, C.; Popa, R.A.; Ratnasamy, S. Blindbox: Deep packet inspection over encrypted traffic. In Proceedings of the ACM SIGCOMM Computer Communication Review, New York, NY, USA, 22 April 2015; Volume 45, pp. 213–226. [Google Scholar]
- Yuan, X.; Wang, X.; Lin, J.; Wang, C. Privacy-preserving deep packet inspection in outsourced middleboxes. In Proceedings of the International Conference on Computer Communications, San Francisco, CA, USA, 10–15 April 2016; pp. 1–9. [Google Scholar]
- Saputra, F.A.; Nadhori, I.U.; Barry, B.F. Detecting and blocking onion router traffic using deep packet inspection. In Proceedings of the International Electronics Symposium, Bali, Indonesia, 29–30 September 2016; pp. 283–288. [Google Scholar]
- Abe, K.; Goto, S. Fingerprinting Attack on Tor Anonymity using Deep Learning. Proc. Asia Pac. Adv. Netw. 2016, 42, 15–20. [Google Scholar]
- Hubballi, N.; Tripathi, N. An event based technique for detecting spoofed IP packets. J. Inf. Secur. Appl. 2017, 35, 32–43. [Google Scholar] [CrossRef]
- Trivedi, U.; Patel, M. A fully automated deep packet inspection verification system with machine learning. In Proceedings of the Advanced Networks and Telecommunications Systems (ANTS), Bangalore, KA, India, 6–9 November 2016; pp. 1–6. [Google Scholar]
- Comar, P.M.; Liu, L.; Saha, S.; Tan, P.N.; Nucci, A. Combining supervised and unsupervised learning for zero-day malware detection. In Proceedings of the 32nd IEEE International Conference on Computer Communications, Turin, Italy, 14–19 April 2013; pp. 2022–2030. [Google Scholar]
- CISCO. 2016 Midyear Cybersecurity Report. Available online: http://www.cisco.com/c/dam/m/en_ca/never-better/assets/files/midyear-security-report-2016.pdf (accessed on 11 July 2017).
- Bouet, M.; Leguay, J.; Conan, V. Cost-based placement of virtualized deep packet inspection functions in sdn. In Proceedings of the Military Communications Conference, San Diego, CA, USA, 18–20 November 2013; pp. 992–997. [Google Scholar]
- Lillard, T.V. Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data; Syngress Publishing: Amsterdam, The Netherlands, 2010; pp. 56–58. [Google Scholar]
- Cisco Systems. The Zettabyte Era: Trends and Analysis. Available online: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/vni-hyperconnectivity-wp.html (accessed on 10 July 2017).
- IBM. Cost of Data Breach Study. Available online: https://www-01.ibm.com/marketing/iwm/dre/signup?source=urx-15763&S_PKG=ov58441 (accessed on 10 September 2017).
- Cisco Systems. 2017 Annual Cybersecurity Report. Available online: http://www.cisco.com/c/dam/m/digital/1198689/Cisco_2017_ACR_PDF.pdf (accessed on 10 July 2017).
- Symantec. Internet Security Threat Report Government. 2017. Available online: https://www.symantec.com/content/dam/symantec/docs/reports/gistr22-government-report.pdf (accessed on 30 September 2017).
- Symantec. Internet Security Threat Report. 2017. Available online: https://s1.q4cdn.com/585930769/files/doc_downloads/lifelock/ISTR22_Main-FINAL-APR24.pdf (accessed on 11 July 2017).
- Berry, A.; Homan, J.; Eitzman, R. WannaCry Malware Profile. Available online: https://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html (accessed on 21 September 2017).
- Morgan, S. Worldwide Cybersecurity Spending Increasing To $170 Billion By 2020. Available online: https://www.forbes.com/sites/stevemorgan/2016/03/09/worldwide-cybersecurity-spending-increasing-to-170-billion-by-2020/#7d8106b06832 (accessed on 11 July 2017).
- Ashraf, M.A.; Jamal, H.; Khan, S.A.; Ahmed, Z.; Baig, M.I. A Heterogeneous Service-Oriented Deep Packet Inspection and Analysis Framework for Traffic-Aware Network Management and Security Systems. IEEE Access 2016, 4, 5918–5936. [Google Scholar] [CrossRef]
- Sommer, R.; Amann, J.; Hall, S. Spicy: A unified deep packet inspection framework for safely dissecting all your data. In Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, 5–9 December 2016; pp. 558–569. [Google Scholar]
- Huang, H.; Li, P.; Guo, S. Traffic scheduling for deep packet inspection in software-defined networks. Concurr. Comput. Pract. Exp. 2016, 29. [Google Scholar] [CrossRef]
- Khan, S.; Gani, A.; Wahab, A.W.A.; Shiraz, M.; Ahmad, I. Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 2016, 66, 214–235. [Google Scholar] [CrossRef]
- Vallentin, M.; Paxson, V.; Sommer, R. VAST: A Unified Platform for Interactive Network Forensics. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, 27–29 March 2016; pp. 345–362. [Google Scholar]
- Khan, S.; Gani, A.; Wahab, A.W.A.; Abdelaziz, A.; Ko, K.; Khan, M.K.; Guizani, M. Software-defined network forensics: Motivation, potential locations, requirements, and challenges. IEEE Netw. 2016, 30, 6–13. [Google Scholar] [CrossRef]
- Prayudi, Y.; Sn, A. Digital chain of custody: State of the art. Int. J. Comput. Appl. 2015, 114, 1–9. [Google Scholar] [CrossRef]
- Ćosić, J.; Ćosić, Z.; Baća, M. An ontological approach to study and manage digital chain of custody of digital evidence. J. Inf. Organ. Sci. 2011, 35, 1–13. [Google Scholar]
- Flores Armas, D.; Jhumka, A. Implementing chain of custody requirements in database audit records for forensic purposes. In Proceedings of the 16th International Conference on Trust, Security and Privacy in Computing and Communications, Sydney, NSW, Australia, 1–4 August 2017. [Google Scholar]
- Dutelle, A.W. An Introduction to Crime Scene Investigation; Jones & Bartlett Publishers: Burlington, MA, USA, 2016. [Google Scholar]
- Spitzner, L. The Honeynet project: Trapping the hackers. IEEE Secur. Privacy 2003, 99, 15–23. [Google Scholar] [CrossRef]
- Roesch, M. Snort: Lightweight intrusion detection for networks. In Proceedings of the 13th USENIX Conference on System Administration, Seattle, WA, USA, 7–12 November 1999; Volume 99, pp. 229–238. [Google Scholar]
- Paxson, V. Detecting Attacks. Available online: https://inst.eecs.berkeley.edu/~cs161/sp11/slides/4.14.intrusion2.pdf (accessed on 11 July 2017).
- Gupta, S.; Gupta, B.B. Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art. Int. J. Syst. Assur. Eng. Manag. 2017, 8, 512–530. [Google Scholar] [CrossRef]
- Sudhodanan, A.; Carbone, R.; Compagna, L.; Dolgin, N.; Armando, A.; Morelli, U. Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy, Paris, France, 26–28 April 2017; pp. 350–365. [Google Scholar]
- Prokhorenko, V.; Choo, K.K.R.; Ashman, H. Web application protection techniques: A taxonomy. J. Netw. Comput. Appl. 2016, 60, 95–112. [Google Scholar] [CrossRef]
- Kim, H.A.; Karp, B. Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the 12th USENIX Security Symposium, San Diego, CA, USA, 9–13 August 2004; Voume 286. [Google Scholar]
- Ellis, D.R.; Aiken, J.G.; Attwood, K.S.; Tenaglia, S.D. A behavioral approach to worm detection. In Proceedings of the ACM workshop on Rapid malcode, Washington, DC, USA, 25–29 October 2004; pp. 43–53. [Google Scholar]
- Li, Z.; Pan, H.; Liu, W.; Xu, F.; Cao, Z.; Xiong, G. A network attack forensic platform against HTTP evasive behavior. J. Supercomput. 2017, 73, 3053–3064. [Google Scholar] [CrossRef]
- Sun, X.; Hou, K.; Li, H.; Hu, C. Towards a fast packet inspection over compressed HTTP traffic. In Proceedings of the 25th International Symposium on Quality of Service, Vilanova i la Geltrú, Spain, 14–16 June 2017; pp. 1–5. [Google Scholar]
- Oberholzer-Gee, F.; Strumpf, K. File sharing and copyright. Innov. Policy Economy 2010, 10, 19–55. [Google Scholar] [CrossRef]
- Dreger, H.; Feldmann, A.; Mai, M.; Paxson, V.; Sommer, R. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, 31 July–4 August 2006; pp. 257–272. [Google Scholar]
- Bujlow, T.; Carela-Español, V.; Barlet-Ros, P. Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification; Technical report; Universitat Politècnica de Catalunya: Barcelona, Spain, 2013. [Google Scholar]
- Kara, A.M.; Binsalleeh, H.; Mannan, M.; Youssef, A.; Debbabi, M. Detection of malicious payload distribution channels in DNS. In Proceedings of the Communication and Information Systems Security Symposium, Sydney, NSW, Australia, 10–14 June 2014; pp. 853–858. [Google Scholar]
- Rossow, C. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. In Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, USA, 23–26 February 2014. [Google Scholar]
- Lotfollahi, M.; Shirali, R.; Siavoshani, M.J.; Saberian, M. Deep Packet: A Novel Approach For Encrypted Traffic Classification Using Deep Learning. arXiv 2017, arXiv:1709.02656. [Google Scholar]
- Sommer, R.; Paxson, V. Enhancing byte-level network intrusion detection signatures with context. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 27–30 October 2003; pp. 262–271. [Google Scholar]
- Dharmapurikar, S.; Krishnamurthy, P.; Sproull, T.; Lockwood, J. Deep packet inspection using parallel bloom filters. In Proceedings of the 11th Symposium on High performance interconnects, Stanfords, CA, USA, 20–22 August 2003; pp. 44–51. [Google Scholar]
- Yu, F.; Chen, Z.; Diao, Y.; Lakshman, T.; Katz, R.H. Fast and memory-efficient regular expression matching for deep packet inspection. In Proceedings of the ACM/IEEE Symposium on Architecture for networking and communications systems, San Jose, CA, USA, 3–5 December 2006; pp. 93–102. [Google Scholar]
- Kumar, S.; Dharmapurikar, S.; Yu, F.; Crowley, P.; Turner, J. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In Proceedings of the ACM SIGCOMM Computer Communication Review, Pisa, Italy, 12–15 September 2006; Volume 36, pp. 339–350. [Google Scholar]
- Becchi, M.; Crowley, P. A hybrid finite automaton for practical deep packet inspection. In Proceedings of the 2007 ACM CoNEXT conference, New York, NY, USA, 11–13 December 2007; pp. 1–12. [Google Scholar]
- Benzaïd, C.; Boulgheraif, A.; Dahmane, F.Z.; Al-Nemrat, A.; Zeraoulia, K. Intelligent detection of mac spoofing attack in 802.11 network. In Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, 4–7 January 2016; p. 47. [Google Scholar]
- Carnut, M.; Gondim, J. ARP spoofing detection on switched Ethernet networks: A feasibility study. In Proceedings of the 5th Simposio Seguranca em Informatica, São José dos Campos, SP, Brazil, 4–6 November 2003. [Google Scholar]
- Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion detection in 802.11 networks: empirical evaluation of threats and a public dataset. IEEE Commun. Surv. Tutor. 2016, 18, 184–208. [Google Scholar] [CrossRef]
- Templeton, S.J.; Levitt, K.E. Detecting spoofed packets. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; Volume 1, pp. 164–175. [Google Scholar]
- Oliveira Júnior, G.A.d.; Sousa Júnior, R.T.d.; Tenório, D.F. Desenvolvimento de um Ambiente Honeynet Virtual para Aplicação Governamental. In Proceedings of the 9th International Conference on Forensic Computer Science, Brasilia, DF, Brazil, 23–25 June 2015; pp. 70–78. [Google Scholar]
- Combs, G. TShark—Dump and Analyze Network Traffic. Available online: https://www.wireshark.org/docs/man-pages/ (accessed on 7 September 2017).
- Elastic. The Open Source Elastic Stack. Available online: https://www.elastic.co/products (accessed on 7 September 2017).
- Oliveira Júnior, G.A.d. Honeyselk: Um Ambiente Para Pesquisa e Visualização de Ataques Cibernéticos em Tempo Real, 2016. xvi, 62 f., il. Dissertation (Masters in Electrical Engineering), University of Brasilia, Brasília, Brazil, 2016. [Google Scholar]
- US-CERT. Alert (TA17-132A) Indicators Associated With WannaCry Ransomware. Available online: https://www.us-cert.gov/ncas/alerts/TA17-132A (accessed on 10 September 2017).
- US-CERT. Alert (TA16-288A): Heightened DDoS Threat Posed by Mirai and Other Botnets. Available online: https://www.us-cert.gov/ncas/alerts/TA16-288A (accessed on 10 September 2017).
- Jerkins, J.A. Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In Proceedings of the 7th Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA, 9–11 January 2017; pp. 1–5. [Google Scholar]
- Nazaryan, G. W32.IRCBot. Available online: https://www.symantec.com/security_response/writeup.jsp?docid=2002-070818-0630-99 (accessed on 30 September 2017).
- Gu, G. Correlation-Based Botnet Detection in Enterprise Networks; Georgia Institute of Technology: Atlanta, GA, USA, 2008. [Google Scholar]
- Furfaro, A.; Malena, G.; Molina, L. A simulation model for the analysis of DDOS amplification attacks. In Proceedings of the 17th International Conference on Computer Modelling and Simulation, Cambridge, UK, 25–27 March 2015; pp. 267–272. [Google Scholar]
- Arukonda, S.; Sinha, S. The innocent perpetrators: reflectors and reflection attacks. Adv. Comput. Sci. 2015, 4, 94–98. [Google Scholar]
Level | SPI | MPI | DPI | OSI Model | TCP/IP Model |
---|---|---|---|---|---|
7 | √ | Application Layer | |||
6 | √ | √ | Presentation Layer | Application Layer | |
5 | √ | √ | Session Layer | ||
4 | √ | √ | Transport Layer | Transport Layer | |
3 | √ | √ | √ | Network Layer | Network Layer |
2 | √ | √ | √ | Data Link Layer | Data Link Layer |
1 | √ | √ | √ | Physical Layer | Physical Layer |
Challenges | Description | Supporting References |
---|---|---|
Performance | When monitoring a network in real time, the device assigned to perform the DPI should be able to process the packets information in the least time possible, for it to be capable of analyzing every packet of the flow, without accumulated delay. Optimizing the use of the memory of the device, for instance, improves the performance. As internet traffic generates a huge amount of data, its processing may require tools specialized for Big Data, such as Hadoop and Kafka. | [3,4,13] |
Encryption | As DPI consists of the analysis of the payload and headers of each packet, encrypting it hinders the detection with DPI, it being possible to analyze only the metadata. In such cases, solutions include the use of proxies which can decrypt the traffic, in cases where it performs Man-In-The-Middle (MITM) transactions on behalf of users, or analyzing packets after they are decrypted. | [14,15,16] |
Anonymity | Cases in which the attacker uses network anonymizers, such as The Onion Router (TOR), will lead the DPI investigation to an inaccurate conclusion regarding the source of the attack. Spoofing packets will also masquerade its source. | [17,18,19] |
Number of attacks | With the increasing number of different attacks, thorougher inspections are necessary to detect their patterns and signatures, and keep the database updated. In addition, as zero-day vulnerabilities may occur at any time, a more detailed investigation is necessary in order to identify and follow the attacker’s trail. To circumvent this, Machine Learning techniques may be applied, to detect known and emerging malware. | [20,21,22] |
Scenario | Description | Supporting References |
---|---|---|
Web application attack detection | Application layer attacks, such as Structured Query Language (SQL) injection, cross-site scripting and cross-site request forgery, are based on commands sent to the server by the attackers through forms and, therefore, regular expression may be used to detect characters that may identify these attacks. | [45,46,47] |
Worms detection | Many worms, such as SQL Slammer and Nimda, have well-known signatures and, therefore, using regular expression to detect their occurrence in the network is effective. | [6,48,49] |
Web inspection | Inspecting Hypertext Transfer Protocol (HTTP) packets for specific web contents or web pages accessed by specific users. | [15,50,51] |
File inspection | Search for specific contents in files transmitted in a File Transfer Protocol (FTP) session. | [52,53,54] |
DNS inspection | Inspecting Domain Name System (DNS) packets for specific accessed domains and possible malicious payload. | [54,55,56] |
E-mail inspection | Search for specific words, in the Multipurpose Internet Mail Extensions (MIME) standard, contained in e-mails, along with attachments. | [32,53,57] |
Flags Set | Response Interpretation |
---|---|
SYN | If a RST is received, the port is closed. |
ACK | If the target does not respond, the port is filtered by a firewall. If a RST is received, it is not filtered. |
FIN, URG & PUSH (Xmas Scan) | If the target does not respond, the port is open. If a RST is received, it is closed. |
FIN | |
No flags set |
Protocol | Description |
---|---|
Telnet | The Data field, that holds the actual sent message, may be searched for brute-force attacks, when an individual tries several different and unsuccessful credentials; and for botnets such as Mirai, when detecting the presence of keywords. |
FTP | The Request Command field shows, among others, the username and password used to connect to the server, allowing the detection of brute-force attacks. |
SMB | The Path and File fields shows, respectively, the path and name of the file the client wants to fetch from the Server Message Block (SMB) server. Specific content in these fields may provide evidence of malicious activity, such as W32.IRCBot. |
HTTP | The Request Uniform Resource Identifier (URI) field shows the URI the client wants to get, and the presence of some characters and/or keywords may provide evidence of the use of probe tools, like Nmap, or other malicious activities. |
NTP | The Request Code field specifies the operation requested by the client. Specific values in this field may be used in a DoS attack. |
HTTPS & SSH | As these protocols are encrypted, their fields cannot be analyzed, but only their metadata, such as the packet’s source, time, etc. |
Source Country | Number of Packets | IP Address (City) | Number of Packets |
---|---|---|---|
China | 4,027,465 | 11x.3x.116.7 (Shenzhen) | 590,553 |
Vietnam | 1,122,658 | 11x.3x.116.26 (Shenzhen) | 467,034 |
Brazil | 836,715 | 11x.3x.116.27 (Shenzhen) | 261,392 |
Taiwan | 596,842 | 11x.3x.116.8 (Shenzhen) | 165 551 |
Republic of Korea | 521,197 | 11x.3x.116.39 (Shenzhen) | 133,976 |
India | 439,838 | 5x.21x.199.181 (Nanjing) | 132,058 |
Turkey | 428,563 | 11x.3x.116.37 (Shenzhen) | 110,694 |
Russia | 417,440 | 11x.3x.116.4 (Shenzhen) | 106,413 |
Ukraine | 358,706 | 5x.21x.199.218 (Nanjing) | 94,049 |
United States | 345,360 | 18x.10x.67.248 (Nanchang) | 70,285 |
Colombia | 225,551 | 21x.6x.30.4 (Nanchang) | 70,285 |
Romania | 197,977 | 21x.6x.30.86 (Nanchang) | 66,535 |
Argentina | 196,200 | 11x.3x.116.28 (Shenzhen) | 58,361 |
Mexico | 187,786 | 11x.3x.116.20 (Shenzhen) | 54,130 |
Poland | 118,792 | 11x.3x.116.21 (Shenzhen) | 52,454 |
Port Number | Number of Packets |
---|---|
23 | 8,209,474 |
22 | 3,474,610 |
445 | 209,689 |
80 | 91,459 |
443 | 53,950 |
139 | 39,934 |
Username Guessed | Number of Packets | Password Guessed | Number of Packets |
---|---|---|---|
root | 257,044 | root | 104,522 |
admin | 91,141 | admin | 50,649 |
support | 16,825 | xc3511 | 32,434 |
user | 11,272 | vizv | 19,825 |
888888 | 8761 | password | 15,087 |
guest | 8076 | 12345 | 14,762 |
666666 | 5160 | 123456 | 12,620 |
service | 3513 | support | 11,493 |
ubnt | 3501 | juantech | 10,897 |
supervisor | 3402 | xmhdipc | 10,880 |
tech | 3360 | default | 10,827 |
Administrator | 2562 | 888888 | 10,689 |
admin1 | 2488 | admin1 | 10,678 |
administrator | 2403 | 1111 | 8673 |
mother | 1320 | pass | 8578 |
HTTP Request | Description |
---|---|
HEAD http://18X.16X.113.82/check_proxy HTTP/1.1 | Scanning what kind of proxy it could be in use |
HEAD /robots.txt HTTP/1.0 | Scanning what bots are blocked or allowed by the server |
GET /muieblackcat HTTP/1.1 | muieblackcat is a bot that scans for PHP vulnerabilities |
GET //pma/scripts/setup.php HTTP/1.1 | |
GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1 | ZmEu is a bot that scans for phpMyAdmin vulnerabilities. It also performs SSH brute-force. |
GET /phpmyadmin/scripts/setup.php HTTP/1.0 | |
GET /dbadmin/scripts/setup.php HTTP/1.1 | |
GET /mysqladmin/scripts/setup.php HTTP/1.1 | |
GET /admin/phpmyadmin/scripts/setup.php HTTP/1.1 | |
GET /admin/pma/scripts/setup.php HTTP/1.10 | |
GET /MyAdmin/scripts/setup.php HTTP/1.1934 | |
GET /nmaplowercheck1487075443 HTTP/1.1 | Nmap probes for information about the server. |
GET /nice%20ports%2C/Tri%6Eity.txt%2ebak HTTP/1.0 |
Username Guessed | Number of Packets | Password Guessed | Number of Packets |
---|---|---|---|
anonymous | 58 | anonymous | 23 |
ftp | 50 | anonymous@ | 17 |
admin | 37 | ftp | 17 |
www-data | 23 | www-data | 15 |
Admin | 19 | admin | 9 |
root | 16 | IEUser@ | 9 |
support | 6 | ect | 7 |
login | 4 | 123456 | 6 |
PlcmSpIp | 3 | 123qwe | 6 |
server | 3 | Admin | 6 |
system | 3 | root | 6 |
user | 3 | PlcmSpIp | 5 |
ect | 2 | [email protected] | 5 |
Alex | 1 | test | 5 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pimenta Rodrigues, G.A.; De Oliveira Albuquerque, R.; Gomes de Deus, F.E.; De Sousa Jr., R.T.; De Oliveira Júnior, G.A.; García Villalba, L.J.; Kim, T.-H. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection. Appl. Sci. 2017, 7, 1082. https://doi.org/10.3390/app7101082
Pimenta Rodrigues GA, De Oliveira Albuquerque R, Gomes de Deus FE, De Sousa Jr. RT, De Oliveira Júnior GA, García Villalba LJ, Kim T-H. Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection. Applied Sciences. 2017; 7(10):1082. https://doi.org/10.3390/app7101082
Chicago/Turabian StylePimenta Rodrigues, Gabriel Arquelau, Robson De Oliveira Albuquerque, Flávio Elias Gomes de Deus, Rafael Timóteo De Sousa Jr., Gildásio Antônio De Oliveira Júnior, Luis Javier García Villalba, and Tai-Hoon Kim. 2017. "Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection" Applied Sciences 7, no. 10: 1082. https://doi.org/10.3390/app7101082
APA StylePimenta Rodrigues, G. A., De Oliveira Albuquerque, R., Gomes de Deus, F. E., De Sousa Jr., R. T., De Oliveira Júnior, G. A., García Villalba, L. J., & Kim, T. -H. (2017). Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection. Applied Sciences, 7(10), 1082. https://doi.org/10.3390/app7101082