Internet DRAFT - draft-suzuki-mile-darknet

draft-suzuki-mile-darknet







MILE Working Group                                             M. Suzuki
Internet-Draft                                                  D. Inoue
Intended status: Informational                                    M. Eto
Expires: January 5, 2015                                        K. Nakao
                                                                    NICT
                                                            July 4, 2014


       Incident Information Exchange in Darknet Monitoring System
                    draft-suzuki-mile-darknet-00.txt

Abstract

   A darknet is a set of routable but unused IP addresses whose
   monitoring is an effective way of detecting malicious activities on
   the Internet.  We have developed an alert system - called DAEDALUS -
   based-on a large-scale distributed darknet that consists of several
   organizations that mutually observe the malicious packets transmitted
   from the inside of the organizations.  This draft shares the schema
   of an alert of the DAEDALUS to exchange incident information among
   organizations.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 5, 2015.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents



Suzuki, et al.           Expires January 5, 2015                [Page 1]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Terminology . . . . . . . . . . . . . . . . . . . . . . . . .   3
   3.  DAEDALUS alert data model . . . . . . . . . . . . . . . . . .   4
     3.1.  NicterEvent class . . . . . . . . . . . . . . . . . . . .   4
     3.2.  DaedalusAlertHeader class . . . . . . . . . . . . . . . .   4
     3.3.  AlertData class . . . . . . . . . . . . . . . . . . . . .   4
     3.4.  Packet class  . . . . . . . . . . . . . . . . . . . . . .   5
   4.  DAEDALUS alert schemata . . . . . . . . . . . . . . . . . . .   5
   5.  An example XML document . . . . . . . . . . . . . . . . . . .   6
   6.  Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . .   7
     6.1.  Finding Scans of Infected Hosts . . . . . . . . . . . . .   7
     6.2.  Observing Backscatter of DDoS . . . . . . . . . . . . . .   7
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .   8
   8.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .   8
   9.  Informative References  . . . . . . . . . . . . . . . . . . .   8

1.  Introduction

   Recent epidemic of highly organized and sophisticated malwares like
   bots increases the necessity of techniques to detect, analyze and
   respond to them.  Various commercial, academic, or government-backed
   projects are ongoing to research and develop the countermeasure
   technologies.  As the prior step, many of these projects are
   concentrating on providing statistical data, such as rapid increase
   of accesses on certain port numbers, based on network events
   monitoring.  In course of these activities, it is a popular approach
   to monitor a dark address space, which is a set of globally announced
   unused IP addresses.  One method of these monitoring approaches is
   black hole monitoring that listen quietly to the incoming packets,
   which often contain great amount of malware scans, DDoS backscatter,
   etc.

   We have been developing the nicter1 system[nicter] that consists of a
   large-scale darknet monitoring facility.  There, however, have been a
   gap between the darknet monitoring and actual security operations on
   the live network (hereafter referred to as livenet), which comprises
   legitimate hosts, servers and network devices.  For instance,
   although darknet monitoring can be used to inform network operators
   about a global increase in scan on 80/tcp, it may not ensure that any
   concrete security operations are carried out.  This means that



Suzuki, et al.           Expires January 5, 2015                [Page 2]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


   darknet monitoring does not significantly contribute to the
   protection of the livenet.

   Therefore, we propose a novel application of large-scale darknet
   monitoring that significantly contributes to the security of the
   livenet.  In contrast to the conventional method wherein the packets
   received from the outside are observed, we employ a large-scale
   distributed darknet that consists of several organizations that
   mutually observe the malicious packets transmitted from the inside of
   the organizations.  Based on this approach, we have developed an
   alert system called DAEDALUS (direct alert environment for darknet
   and livenet unified security)[DAEDALUS-VIZ].

   DAEDALUS consists of an analysis center and several organizations.
   Each organization (hereafter referred to as org) establishes a secure
   channel with the analysis center and continuously forwards darknet
   traffic toward the center.  In addition, each org registers the IP
   address range of its livenet to the center beforehand.  We divide the
   darknet into two types - internal and external darknet.  From the
   viewpoint of an org, the darknet within the org is an internal
   darknet, and the darknets in other orgs are external darknets.

   When a malware infection occurs, and the infected host starts
   scanning the inside of the org, including the internal darknet, the
   analysis center can detect the infection on the basis of the match
   between the source IP address of darknet traffic from the org G and
   the preregistered livenet IP address.  The analysis center then sends
   an internal darknet alert to org G.  When the infected host starts
   scanning the outside, including the external darknet in org A, the
   analysis center can detect the infection in the same above-mentioned
   manner.  The analysis center then sends an external darknet alert to
   org G.  The alerts include information on the IP address of the
   infected host, protocol, source/destination ports, duration of
   attack, and analysis results, if any.

   This draft describes the schemata of the alert in detail

2.  Terminology

   The terminology used in this document follows the terminology defined
   in RFC 5070.

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119.






Suzuki, et al.           Expires January 5, 2015                [Page 3]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


3.  DAEDALUS alert data model

   The DAEDALUS data model is used for sharing alert data among parties
   about darknet monitoring.  The XML Schema of this data model is shown
   in the next section.

3.1.  NicterEvent class

   The NicterEvent class is the top level class in the DAEDALUS data
   model.  This class and following Header class is commonly used in the
   other model of our nicter project.  The EventType class in the Header
   class indicates the type of event in our nicter project.  Fixed value
   "DaedalusAlert" is used in case of this draft.  CreateTime class
   shows the time when this event occured.

3.2.  DaedalusAlertHeader class

   The DaedalusAlertHeader class contains general information of the
   alert.  The AlertID class indicates unique ID throughout all alerts.
   The OrgID class shows unique ID of each organization that monitors
   its own darknet.  The Trigger class shows the cause of issued alert.
   Currently, DAEDALUS has one of "Urgent" or "Periodic" in the Trigger
   class.  The "Urgent" means the alert needs immediate attention.  The
   "Periodic" means the alert is issued periodically, and is not urgent.
   The Duration class indicates the duration of monitoring until this
   alert issued.

3.3.  AlertData class

   The AlertData class contains packet data summarized by each source IP
   address.  The following Packet class shows actual packet data.  The
   EventTime attribute shows the time when the last packet in this
   AlertData class is monitored.  The EventID attribute indicates unique
   ID throughout all AlertData class.  The SrcIP attribute shows the
   monitored source IP address.  The SrcCC attribute indicates the
   country code where the source IP address is allocated.  The
   TotalPacketCount attribute shows the number of whole monitored
   packets.  The DisplayedPacketCount shows the number of sampled
   packets when large number of packets is monitored.  The Type
   attribute shows the type of the AlertData class.  The string "New"
   means that the source IP address hasn't been monitored for a certain
   period.  While, the "Continued" means the source IP address has been
   monitored continuously.








Suzuki, et al.           Expires January 5, 2015                [Page 4]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


3.4.  Packet class

   The Packet class shows a series of packets received from the source
   IP address indicated on the upper AlertData class.  One Packet class
   contains layer 3 and layer 4 information of one packet.  The DstIP
   attribute shows the destination IP address of the packet, and the
   DstCC shows the country code of that address.  The Protocol attribute
   shows the protocol number of the packet.  The DstPort attribute and
   the SrcPort attribute indicate the destination port number and the
   source port number of the packet.  These attributes of port numbers
   appear only when the protocol number of the packet is 6 (TCP) or 17
   (UDP).  The Flag attribute shows both the flag of TCP header and the
   number of ICMP type field, which depends on the protocol of the
   packet.  The DarknetType attribute shows where the packet comes from.
   The "internal" means that the packet comes from internal IP address
   of the monitored organization.  In contrast, the "external" packets
   come from external IP address outside of its monitored organization.

4.  DAEDALUS alert schemata

   The XML schema of the DAEDALUS alert is as shown below.

<?xml version="1.0" encoding="shift_jis"?>
<xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema">
  <xs:element name="NicterEvent">
    <xs:complexType>
      <xs:sequence>
        <xs:element name="Header">
          <xs:complexType>
            <xs:sequence>
              <xs:element name="EventType" type="xs:string" />
              <xs:element name="CreateTime" type="xs:dateTime" />
            </xs:sequence>
          </xs:complexType>
        </xs:element>
        <xs:element name="DaedalusAlertHeader">
          <xs:complexType>
            <xs:sequence>
              <xs:element name="AlertID" type="xs:unsignedInt" />
              <xs:element name="OrgID" type="xs:unsignedInt" />
              <xs:element name="Trigger" type="xs:string" />
              <xs:element name="Duration" type="xs:unsignedInt" />
            </xs:sequence>
          </xs:complexType>
        </xs:element>
        <xs:element maxOccurs="unbounded" name="AlertData">
          <xs:complexType>
            <xs:sequence>



Suzuki, et al.           Expires January 5, 2015                [Page 5]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


              <xs:element maxOccurs="unbounded" name="Packet">
                <xs:complexType>
                  <xs:attribute name="PacketTime" type="xs:dateTime" use="required" />
                  <xs:attribute name="DstIP" type="xs:string" use="required" />
                  <xs:attribute name="DstCC" type="xs:string" use="required" />
                  <xs:attribute name="DstPort" type="xs:unsignedShort" use="required" />
                  <xs:attribute name="SrcPort" type="xs:unsignedShort" use="required" />
                  <xs:attribute name="Protocol" type="xs:unsignedShort" use="required" />
                  <xs:attribute name="Flag" type="xs:string" use="required" />
                  <xs:attribute name="DarknetType" type="xs:string" use="required" />
                </xs:complexType>
              </xs:element>
            </xs:sequence>
            <xs:attribute name="EventTime" type="xs:dateTime" use="required" />
            <xs:attribute name="EventID" type="xs:unsignedInt" use="required" />
            <xs:attribute name="SrcIP" type="xs:string" use="required" />
            <xs:attribute name="SrcCC" type="xs:string" use="required" />
            <xs:attribute name="TotalPacketCount" type="xs:unsignedInt" use="required" />
            <xs:attribute name="DisplayedPacketCount" type="xs:unsignedInt" use="required" />
            <xs:attribute name="Type" type="xs:string" use="required" />
          </xs:complexType>
        </xs:element>
      </xs:sequence>
    </xs:complexType>
  </xs:element>
</xs:schema>

5.  An example XML document

   An example XML document of the DAEDALUS alert is shown below.  The
   source IP address and destination IP address are masked as xxx.yyy on
   this example.



















Suzuki, et al.           Expires January 5, 2015                [Page 6]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


<?xml version="1.0"?>
<NicterEvent>
  <Header>
    <EventType>DaedalusAlert</EventType>
    <CreateTime>2011-12-19 11:00:45</CreateTime>
  </Header>
  <DaedalusAlertHeader>
    <AlertID>277761</AlertID>
    <OrgID>2</OrgID>
    <Trigger>Periodic</Trigger>
    <Duration>3600</Duration>
  </DaedalusAlertHeader>
  <AlertData EventTime="2011-12-19 11:00:39" EventID="1096117" SrcIP="xxx.yyy.236.116" SrcCC="JP" TotalPacketCount="878" DisplayedPacketCount="878" Type="Continued">
    <Packet PacketTime="2011-12-19 10:01:21" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="" SrcPort="" Protocol="1" Flag="8" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:31" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="" SrcPort="" Protocol="1" Flag="8" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:33" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="" SrcPort="" Protocol="1" Flag="8" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:35" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="445" SrcPort="3580" Protocol="6" Flag="2" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:38" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="445" SrcPort="3580" Protocol="6" Flag="2" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:42" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="" SrcPort="" Protocol="1" Flag="8" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:44" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="" SrcPort="" Protocol="1" Flag="8" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:45" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="445" SrcPort="3580" Protocol="6" Flag="2" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:47" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="137" SrcPort="137" Protocol="17" Flag="" DarknetType="internal"/>
    <Packet PacketTime="2011-12-19 10:01:48" DstIP="xxx.yyy.241.101" DstCC="JP" DstPort="137" SrcPort="137" Protocol="17" Flag="" DarknetType="internal"/>
  <!-- SNIP -->
  </AlertData>
</NicterEvent>

6.  Use Cases

6.1.  Finding Scans of Infected Hosts

   When the infected host in a organization(Org.  A) starts scanning
   outside the organization, including the external darknet in other
   organization(Org.  B), Org. B detects the scanning.  It then shares
   the monitored information with Org. A using this schema.

6.2.  Observing Backscatter of DDoS

   When a host in a organization(Org.  A) is under a distributed denial
   of service (DDoS) attack from many spoofed IP addresses, the host
   sends backscatter (TCP SYN-ACK) packets to a wide area, including the
   external darknets in some of other organizations(Org.  B and C).  In
   this example case, sharing monitored information of Org. B and C with
   Org. A using this schema helps to defence against the DDoS attack.







Suzuki, et al.           Expires January 5, 2015                [Page 7]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


7.  Security Considerations

   TBD

8.  Acknowledgments

   TBD

9.  Informative References

   [DAEDALUS-VIZ]
              Inoue, D., "DAEDALUS-VIZ: Novel Real-time 3D Visualization
              for Darknet Monitoring-based Alert System", October 2012,
              <http://dl.acm.org/citation.cfm?id=2379700>.

   [nicter]   Inoue, D., "nicter: An Incident Analysis System Toward
              Binding Network Monitoring with Malware Analysis", April
              2008, <http://ieeexplore.ieee.org/xpl/
              articleDetails.jsp?arnumber=4627315>.

Authors' Addresses

   Mio Suzuki
   National Institute of Information and Communications Technology
   4-2-1 Nukui-Kitamachi Koganei
   184-8795 Tokyo
   Japan

   Phone: +80 423 27 6277
   EMail: mio@nict.go.jp


   Daisuke Inoue
   National Institute of Information and Communications Technology
   4-2-1 Nukui-Kitamachi Koganei
   184-8795 Tokyo
   Japan

   Phone: +80 423 27 6243
   EMail: dai@nict.go.jp











Suzuki, et al.           Expires January 5, 2015                [Page 8]

Internet-DraIncident Information Exchange in Darknet Monitori  July 2014


   Masashi Eto
   National Institute of Information and Communications Technology
   4-2-1 Nukui-Kitamachi Koganei
   184-8795 Tokyo
   Japan

   Phone: +80 423 27 5573
   EMail: eto@nict.go.jp


   Koji Nakao
   National Institute of Information and Communications Technology
   4-2-1 Nukui-Kitamachi Koganei
   184-8795 Tokyo
   Japan

   Phone: +80 423 27 6826
   EMail: ko-nakao@nict.go.jp

































Suzuki, et al.           Expires January 5, 2015                [Page 9]