IEEE Spectrum December, 2007 - 37
If we observe enough of them, we can come up with historical
averages for inbound and outbound data packets, noting such
key features as which Internet addresses the network receives
packets from and which ones it sends packets to. We can also
note how many packets are sent in accord with which Internet
protocols at various times of the day and the overall traffic
volume. At any given time, the probability distributions of the
flow of traffic through the network will be characterized by
distinct curves [see graphs, "Fingering the Culprit"]. In fact,
the shape of the curve shows the entropy of the system. If the
shape of the curve is uniform, then entropy is high. If there's
a spike, then a low-probability event has occurred, and the
entropy is correspondingly low.
Internet traffic is dynamic and constantly evolving.
Nevertheless, over the course of, say, a year, some consistent
patterns emerge. These patterns are driven mainly by the
mixture of applications generating the traffic, such as Web
surfing, e-mail, music downloading, or Internet telephony,
though seasonal and geographical factors also affect them.
The first step in using these patterns to spot anomalous activity is to develop a probability distribution for each of the
characteristics. When these distributions are taken together,
they uniquely profile the traffic and create a "fingerprint"
of the network under consideration
and what we might call its internal
state-the sum total of these network
characteristics.
If we have monitored and measured
a system long enough, we know which
internal states are associated with wellbehaved Internet traffic. Any malicious
activity introduced into the network
alters the nature of the Internet traffic, because it has a designed, premeditated outcome that is different from
any of the network's normal states.
Even if an attack came in the form of
an activity that fits within network
norms-say, downloading a number
of music files-the fingerprint of the
network would look unusual, because it would differ in some
way from the network's established patterns of usage, if not in
terms of volume, then time of day, source, or some combination of those or other characteristics.
Paradoxically, Internet traffic has features of both randomness
and structure, and a worm, for example, will alter both, making the
traffic appear in some respects more uniform or structured than
normal Internet traffic, while appearing more random in others.
Packets flowing into a server seem to come from random
locations. For example, requests for Web pages typically come
from surfers all over the Internet. More will come from some
people and networks than from others, to be sure, but a graph
of them will normally be a fairly uniform curve. If a worm
is loose on the Internet, however, and the packet flows from
infected hosts grow to be a significant part of the set of total
traffic flows, then the addresses of those hosts will show up
disproportionately in any distribution graph-indicating how
many flows have come from a given source.
During a worm infestation, hosts that have been maliciously
co-opted connect to many other hosts in a short period. The
number of open connections from infected hosts become dominant, and entropy decreases. Similarly, the target IP addresses
seen in packet flows will be much more random than in normal
traffic. That is, the distribution of destination IP addresses will
be more dispersed, resulting in higher network entropy.
Most malicious attacks tend to seek out and exploit certain
vulnerabilities in the implementation of an Internet protocol.
Two of the most important of these are the Hypertext Transfer
Protocol, HTTP, which downloads Web pages, and the Simple
Mail Transport Protocol (SMTP), for sending e-mail. Besides the
protocol, specific operating-system ports are used to send and
receive traffic. We can think of the protocol as a means of transit, such as an ocean freighter or a yacht, while the port (as the
name suggests) terminates the data's journey at the computer's
equivalent of a berth number at a marina.
Fingerprinting is also possible at the port level. An attacker
can scan for a specific vulnerability by sending packets looking to see whether they are received and what response they
get; these scans often have to go to a specific target destination port. If the traffic that results from this scanning
becomes a significant component of the overall network traffic, then this will create an unusual fingerprint. Lastly, the
flow size-the number of packets in the flow-of the malicious worm activity will become more dominant and will
alter the distribution of flow size observed during a normal
network operation.
The Sasser worm, one of the largest and best-studied infestations in
Internet history, is an ideal example of
this port-specific approach. It began by
scanning the computers on whatever
network it had infiltrated. Whenever a
connection was made, the worm sent
a piece of code. The goal of the code
was to cause the infected host computer to accept commands on TCP
port 9996. Sasser then created a small
program named cmd.ftp on the host
computer, which then executed it. The
"ftp" in this script's name stands for
the File Transport Protocol. The FTP
script instructed the victim machine to
download and execute the worm from
the infected host without human intervention. The infected
host accepted this FTP traffic on still another port. To spread
itself even faster, Sasser spawned multiple threads, finding and
capturing as many vulnerable computers within an organization's network as possible.
Each of Sasser's activities created a unique network fingerprint. Information entropy can capture the dynamics of such
fingerprints by extracting any sudden change in the shape of the
distributions constituting that fingerprint. There is little that
the attacker can do to control the information entropy associated
with the fingerprint and thereby conceal the attack.
The Sasser worm significantly affected the information
entropy of a large North American wireless service provider
network [see graph, "Sasser's Entropy," based on an analysis
done after the attack]. Notice that traffic is much heavier during
the day, as reflected by the information entropy: high during the
day, low at night. When the Sasser worm invaded this wireless
carrier's network, the behavior-based security systems were
unable to detect the outbreak until the network became saddled
with more than 30 times its normal traffic volume. Behaviorbased systems cannot detect the initial attack, because the
traffic generated by one infected machine is negligible. Within
minutes, however, that one machine has infected 10 others, and
Paradoxically,
Internet traffic
has features of
both randomness
and structure,
and a worm will
alter both
www.spectrum.ieee.org
December 2007 | IEEE Spectrum | NA
47
http://www.spectrum.ieee.org
Table of Contents for the Digital Edition of IEEE Spectrum December, 2007
IEEE Spectrum December, 2007 - Cover1
IEEE Spectrum December, 2007 - Cover2
IEEE Spectrum December, 2007 - 1
IEEE Spectrum December, 2007 - 2
IEEE Spectrum December, 2007 - 3
IEEE Spectrum December, 2007 - 4
IEEE Spectrum December, 2007 - 5
IEEE Spectrum December, 2007 - 6
IEEE Spectrum December, 2007 - 7
IEEE Spectrum December, 2007 - 8
IEEE Spectrum December, 2007 - 9
IEEE Spectrum December, 2007 - 10
IEEE Spectrum December, 2007 - 11
IEEE Spectrum December, 2007 - 12
IEEE Spectrum December, 2007 - 13
IEEE Spectrum December, 2007 - 14
IEEE Spectrum December, 2007 - 15
IEEE Spectrum December, 2007 - 16
IEEE Spectrum December, 2007 - 17
IEEE Spectrum December, 2007 - 18
IEEE Spectrum December, 2007 - 19
IEEE Spectrum December, 2007 - 20
IEEE Spectrum December, 2007 - 21
IEEE Spectrum December, 2007 - 22
IEEE Spectrum December, 2007 - 23
IEEE Spectrum December, 2007 - 24
IEEE Spectrum December, 2007 - 25
IEEE Spectrum December, 2007 - 26
IEEE Spectrum December, 2007 - 27
IEEE Spectrum December, 2007 - 28
IEEE Spectrum December, 2007 - 29
IEEE Spectrum December, 2007 - 30
IEEE Spectrum December, 2007 - 31
IEEE Spectrum December, 2007 - 32
IEEE Spectrum December, 2007 - 33
IEEE Spectrum December, 2007 - 34
IEEE Spectrum December, 2007 - 35
IEEE Spectrum December, 2007 - 36
IEEE Spectrum December, 2007 - 37
IEEE Spectrum December, 2007 - 38
IEEE Spectrum December, 2007 - 39
IEEE Spectrum December, 2007 - 40
IEEE Spectrum December, 2007 - 41
IEEE Spectrum December, 2007 - 42
IEEE Spectrum December, 2007 - 43
IEEE Spectrum December, 2007 - 44
IEEE Spectrum December, 2007 - 45
IEEE Spectrum December, 2007 - 46
IEEE Spectrum December, 2007 - 47
IEEE Spectrum December, 2007 - 48
IEEE Spectrum December, 2007 - 49
IEEE Spectrum December, 2007 - 50
IEEE Spectrum December, 2007 - 51
IEEE Spectrum December, 2007 - 52
IEEE Spectrum December, 2007 - Cover3
IEEE Spectrum December, 2007 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1217
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1117
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1017
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0917
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0817
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0717
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0617
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0517
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0417
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0317
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0217
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0117
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1216
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1116
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1016
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0916
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0816
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0716
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0616
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0516
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0416
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0316
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0216
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0116
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1215
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1115
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1015
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0915
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0815
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0715
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0615
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0515
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0415
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0315
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0215
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0115
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1214
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1114
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1014
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0914
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0814
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0714
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0614
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0514
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0414
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0314
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0214
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0114
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1213
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1113
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1013
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0913
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0813
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0713
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0613
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0513
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0413
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0313
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0213
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0113
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1212
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1112
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1012
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0912
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0812
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0712
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0612
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0512
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0412
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0312
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0212
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0112
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1211
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1111
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1011
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0911
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0811
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0711
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0611
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0511
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0411
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0311
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0211
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0111
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1210
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1110
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1010
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0910
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0810
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0710
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0610
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0510
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0410
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0310
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0210
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0110
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1209
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1109
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1009
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0909
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0809
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0709
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0609
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0509
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0409
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0309
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0209
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0109
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1208
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1108
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1008
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0908
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0808
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0708
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0608
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0508
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0408
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0308
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0208
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0108
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1207
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1107
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_1007
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0907
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0807
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0707
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0607
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0507
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0407
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0307
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0207
https://www.nxtbook.com/nxtbooks/ieee/spectrum_na_0107
https://www.nxtbookmedia.com