sistem pemantauan ancaman serangan siber di indonesia generasi baru public

61
IDSECCONF 2016 Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Mario Marcello, Mkom, BEng 24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia Sistem Pemantauan Ancaman Serangan Siber di Indonesia Generasi Baru

Upload: charles-lim

Post on 11-Jan-2017

94 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

IDSECCONF 2016

Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI

Mario Marcello, Mkom, BEng24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia

Sistem Pemantauan Ancaman Serangan Siber di Indonesia

Generasi Baru

Page 2: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Agenda

• About Honeynet

• Indonesia Honeynet Project

• The Threat Intelligence

• The New Generation Threat Intelligence

• Research & Publications

• Statistics

• Conclusion

Page 3: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Introduction to Honeynet

Page 4: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Honeynet• Volunteer open source computer security

research organization since 1999 (US 501c3 non-profit)

• Mission: ¨learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned¨ -http://www.honeynet.org

Page 5: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project• Mycert introduces honeypot in OIC-CERT in

2009

• Explore honeypot in 2010, due to students’ interest in learning data mining on:

– Cyber terrorism

– Malware behavior

• Cecil (Singapore Chapter lead) introduced us to Honeynet global

Page 6: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project• 15 passionate security

professionals, academicians and government officials met signed a petition in 25 November 2011

• Indonesia Chapter officially recognized 9 January 2012

• Current members: 178 (25 active members)

Page 7: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project

Page 8: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project• Attended Honeynet Workshop 2012

• With support from KOMINFO, we conducted yearly seminar and workshops– Focus on Security Awareness and Security Research

• Honeynet communities: Jakarta, Semarang, Surabaya, Yogya, Denpasar, Palembang, Lampung

• Research Topics: Incident handling, Vulnerability Analysis, Malware, Digital Forensics, Penetration Testing, Threats Intelligence

Page 9: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project

Honeynet Seminar & Workshop | 10-11 Juni 2015 | Lampung, Indonesia

Page 10: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

About Indonesia Honeynet Project

Incident Response & Analysis Challenge | 24 Aug 2015 | Jakarta, Indonesia

Page 11: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Honeypots Research & Deployment

2009 2011 2013 2015

LearningPeriod

Early Period

GrowingPeriod

ExpandingPeriod

Honeypot: Nepenthes

Honeypot:Nepenthes, Dionaea

Honeypot:Dionaea

Honeypot:Dionaea, Kippo, Glastopf, Honeytrap

Learning How to install and configure

Deployed 1st

Honeypot in SGUTarget: Academic, Government, ISP

Coverage: Java, Bali, Sumatera,

# Honeypots deployed: None

# Honeypots deployed: 1

# Honeypotsdeployed: 5

# Honeypots deployed: 20

Hardware: Client Hardware: SimpleClient and Server

Hardware: Mini PC and Server

Hardware: Raspberry Pi and Dedicated servers

Page 12: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

List of contributors

• Amien H.R.

• Randy Anthony

• Michael

• Stewart

• Glenn

• Mario Marcello

• Joshua Tommy

• Andrew Japar

• Christiandi

• Kevin Kurniawan

Page 13: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

The Threat Intelligence

Page 14: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

What is Darknets?

Darknet – portion of routed, allocated IP

space in which no active servers reside.

— Team CYMRU

Page 15: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

What is Darknets?

Livenet Darknet

Live IP Address (used) Unused IPs

Page 16: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Darknets and Honeypots

Goal

• To understand cyber activities in our institutions in Indonesia (Government, Education and Industry)

How

• Honeypot servers put in the unused IP address across the above organizations

Page 17: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

First Step – Distributing Sensors

Mini PC Raspberry Pi

Page 18: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

First Step – Collecting sensors’ data

Repository Server

Raspberry Pi

Raspberry Pi

Raspberry Pi

Page 19: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Second Step – Analysis

Repository Server

AnalysisServer

Raspberry Pi

Raspberry Pi

Raspberry Pi

Page 20: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Third Step – User Experience

Repository Server

AnalysisServer

WebServer

USERSRaspberry Pi

Raspberry Pi

Raspberry Pi

Page 21: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Honeypots Implemented• Dionaea – capturing attack patterns and

malware involved via port 21, 42, 69, 80, 135, 445, 1433, 3306 dan 5060 & 5061

• Glastopf – capturing attack pattern on web application attacked

• Kippo – capturing traffic pattern on SSH port

• Honeytrap – capturing other misc. ports not captured above

Page 22: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Why not IDS? Why Honeypots?

IDS

HONEYPOT

A

T

T

A

C

K

S

Detection based on

KNOWN ATTACK rules

Record ALL attacks directed toward the monitored IP

add

UNKNOWNATTACK

Page 23: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Current Architecture

Repository Server

AnalysisServer

Web Server + Web Service

USERSPots

Pots

Pots

Page 24: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

The New GenerationThreat Intelligence

Page 25: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

New Data Source

Repository Server

AnalysisServer

USERS

System Logs

DNSTraffic Log

Pots

Web Server + Web Service

Page 26: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

MALWARE ANALYSIS ENGINE

New Analysis Engine

Static DynamicRisk

Scoring

Reverse EngineerMalware code

To find “hidden” code

Run MalwareIn a sandbox; dump

malware code

Provide Risk Score based on the static & behavior analysis

Page 27: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

DNS TRAFFICANALYSIS

DNS Analysis Target

Domain

Botnet

Anomaly

Extract Malicious Domain from the DNS traffic

captured

Identifying Botnet fromDomain names Botnet

visited

Identify anomaly traffic from DNS traffic

Page 28: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Architecture DNS Traffic Analysis

Page 29: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Attack Connection Analysis

ATTACK CONNECTION

ANALYSIS

Domain/IPAnalysis

Traffic PatternAnalysis

ProduceMalicious Domain List

(Publicly usable)

New Knowledge on Attack pattern

Page 30: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

New Generation Capabilities

• Dynamic Analysis (with Static Analysis) using Binary Instrumentation to obtain critical malware hidden code

• Risk Scoring on malware captured

• Malware Domain List based on DNS traffic and Attack Traffic to Honeypots

• Traffic Attack Pattern knowledge

Page 31: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Some Statistics

Page 32: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Contribution

Page 33: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Contribution

Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked

Page 34: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Contribution

Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked

Page 35: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics

Page 36: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics

Page 37: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics (malware found)

Page 38: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics

Page 39: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics

Page 40: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics

Page 41: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics (other malware)2013 2014

Virus naming by AhnLab-V3 (Virustotal)

Page 42: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Statistics (other malware)2015 2016

Virus naming by AhnLab-V3 (Virustotal)

Page 43: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics

Page 44: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics

Page 45: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics

Page 46: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics

Page 47: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics

Page 48: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics (who are they?)

Page 49: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics (who are they?)

Page 50: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics (who are they?)

Page 51: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

More Statistics (who are they?)

Page 52: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Research & Publications

Page 53: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Research & Publications

Malware | Data Mining | Behavior Analysis | Cyber Terrorism

Page 54: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Other Research

Second Hand USB Forensics and Publications

Page 55: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Mapping Research Roadmap

Deception Technology | Malware | Data Mining | Cyber Crime

Deception Technology

Malware

Data Mining Cyber Crime

Tools

Page 56: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Join Us

• http://www.ihpcon.id

• Indonesia Honeynet Project

• idhoneynet

• http://www.honeynet.or.id

• http://groups.google.com/group/id-honeynet

Page 57: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Related Publications• Joshua Tommy Juwono, Charles Lim, Alva Erwin, A Comparative Study

of Behavior Analysis Sandboxes in Malware Detection, The 3rd International Conference on New Media 2015, Jakarta, Indonesia, 2015

• Charles Lim, Nicsen, Mal-EVE Static Detection Model for Evasive Malware, 10th EAI International Conference on Communications and Networking in China, Shanghai, China, 2015

• Charles Lim, Darryl Y. Sulistyan, Suryadi, and Kalamullah Ramli, Experiences in Instrumented Binary Analysis for Malware, The 3rd International Conference on Internet Services Technology and Information Engineering 2015 (ISTIE 2015), Bali, 2015

• Charles Lim, Meily, Nicsen, and Herry Ahmadi, Forensics Analysis of USB Flash Drives in Educational Environment, The 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014

• Charles Lim, and Kalamullah Ramli, Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection, 2014 2nd International Conference on Technology, Informatics, Management, Engineering & Environment, Bandung, 2014.

Page 58: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Call for Research Collaboration• Research Champion for each university

• Research collaboration across different universities to foster rapid research growth in Cyber security

• Generate more research publications ==> easier to get funding for research as well

Page 59: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

Our Partners

Page 60: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public

THANK YOU

Ministry of Communication and Informatics of Republic of Indonesia

Page 61: Sistem pemantauan ancaman serangan siber di indonesia generasi baru public