Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

62
IDSECCONF 2016 Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI Mario Marcello 24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia Sistem Pemantauan Ancaman Serangan Siber di Indonesia Generasi Baru

Transcript of Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Page 1: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

IDSECCONF 2016

Charles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEI

Mario Marcello24 Sep 2016 | UIN Maulana Malik Ibrahim | Malang, Indonesia

Sistem Pemantauan Ancaman Serangan Siber di Indonesia

Generasi Baru

Page 2: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About MeCharles Lim, Msc., ECSA, ECSP, ECIH, CEH, CEIResearcher – Information Security Research Group and LecturerSwiss German UniversityCharles.lims [at] gmail.com and charles.lim [at] sgu.ac.idhttp://people.sgu.ac.id/charleslim

I am currently doing my doctoral study in Universitas Indonesia

Research Interest

CommunityIndonesia Honeynet Project - Chapter Lead

Academy CSIRT – member

Asosiasi Digital Forensik Indonesia - member

MalwareIntrusion DetectionThreats Intelligence

Vulnerability AnalysisDigital ForensicsCloud Security

Page 3: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Agenda

• About Honeynet

• Indonesia Honeynet Project

• The Threat Intelligence

• The New Generation Threat Intelligence

• Research & Publications

• Statistics

• Conclusion

Page 4: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Introduction to Honeynet

Page 5: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Honeynet• Volunteer open source computer security

research organization since 1999 (US 501c3 non-profit)

• Mission: ¨learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned¨ -http://www.honeynet.org

Page 6: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project• Mycert introduces honeypot in OIC-CERT in

2009

• Explore honeypot in 2010, due to students’ interest in learning data mining on:

– Cyber terrorism

– Malware behavior

• Cecil (Singapore Chapter lead) introduced us to Honeynet global

Page 7: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project• 15 passionate security

professionals, academicians and government officials met signed a petition in 25 November 2011

• Indonesia Chapter officially recognized 9 January 2012

• Current members: 178 (25 active members)

Page 8: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project

Page 9: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project• Attended Honeynet Workshop 2012

• With support from KOMINFO, we conducted yearly seminar and workshops– Focus on Security Awareness and Security Research

• Honeynet communities: Jakarta, Semarang, Surabaya, Yogya, Denpasar, Palembang, Lampung

• Research Topics: Incident handling, Vulnerability Analysis, Malware, Digital Forensics, Penetration Testing, Threats Intelligence

Page 10: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project

Honeynet Seminar & Workshop | 10-11 Juni 2015 | Lampung, Indonesia

Page 11: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

About Indonesia Honeynet Project

Incident Response & Analysis Challenge | 24 Aug 2015 | Jakarta, Indonesia

Page 12: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Honeypots Research & Deployment

2009 2011 2013 2015

LearningPeriod

Early Period

GrowingPeriod

ExpandingPeriod

Honeypot: Nepenthes

Honeypot:Nepenthes, Dionaea

Honeypot:Dionaea

Honeypot:Dionaea, Kippo, Glastopf, Honeytrap

Learning How to install and configure

Deployed 1st

Honeypot in SGUTarget: Academic, Government, ISP

Coverage: Java, Bali, Sumatera,

# Honeypots deployed: None

# Honeypots deployed: 1

# Honeypotsdeployed: 5

# Honeypots deployed: 20

Hardware: Client Hardware: SimpleClient and Server

Hardware: Mini PC and Server

Hardware: Raspberry Pi and Dedicated servers

Page 13: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

List of contributors

• Amien H.R.

• Randy Anthony

• Michael

• Stewart

• Glenn

• Mario Marcello

• Joshua Tommy

• Andrew Japar

• Christiandi

• Kevin Kurniawan

Page 14: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

The Threat Intelligence

Page 15: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

What is Darknets?

Darknet – portion of routed, allocated IP

space in which no active servers reside.

— Team CYMRU

Page 16: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

What is Darknets?

Livenet Darknet

Live IP Address (used) Unused IPs

Page 17: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Darknets and Honeypots

Goal

• To understand cyber activities in our institutions in Indonesia (Government, Education and Industry)

How

• Honeypot servers put in the unused IP address across the above organizations

Page 18: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

First Step – Distributing Sensors

Mini PC Raspberry Pi

Page 19: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

First Step – Collecting sensors’ data

Repository Server

Raspberry Pi

Raspberry Pi

Raspberry Pi

Page 20: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Second Step – Analysis

Repository Server

AnalysisServer

Raspberry Pi

Raspberry Pi

Raspberry Pi

Page 21: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Third Step – User Experience

Repository Server

AnalysisServer

WebServer

USERSRaspberry Pi

Raspberry Pi

Raspberry Pi

Page 22: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Honeypots Implemented• Dionaea – capturing attack patterns and

malware involved via port 21, 42, 69, 80, 135, 445, 1433, 3306 dan 5060 & 5061

• Glastopf – capturing attack pattern on web application attacked

• Kippo – capturing traffic pattern on SSH port

• Honeytrap – capturing other misc. ports not captured above

Page 23: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Why not IDS? Why Honeypots?

IDS

HONEYPOT

A

T

T

A

C

K

S

Detection based on

KNOWN ATTACK rules

Record ALL attacks directed toward the monitored IP

add

UNKNOWNATTACK

Page 24: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Current Architecture

Repository Server

AnalysisServer

Web Server + Web Service

USERSPots

Pots

Pots

Page 25: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

The New GenerationThreat Intelligence

Page 26: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

New Data Source

Repository Server

AnalysisServer

USERS

System Logs

DNSTraffic Log

Pots

Web Server + Web Service

Page 27: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

MALWARE ANALYSIS ENGINE

New Analysis Engine

Static DynamicRisk

Scoring

Reverse EngineerMalware code

To find “hidden” code

Run MalwareIn a sandbox; dump

malware code

Provide Risk Score based on the static & behavior analysis

Page 28: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

DNS TRAFFICANALYSIS

DNS Analysis Target

Domain

Botnet

Anomaly

Extract Malicious Domain from the DNS traffic

captured

Identifying Botnet fromDomain names Botnet

visited

Identify anomaly traffic from DNS traffic

Page 29: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Architecture DNS Traffic Analysis

Page 30: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Attack Connection Analysis

ATTACK CONNECTION

ANALYSIS

Domain/IPAnalysis

Traffic PatternAnalysis

ProduceMalicious Domain List

(Publicly usable)

New Knowledge on Attack pattern

Page 31: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

New Generation Capabilities

• Dynamic Analysis (with Static Analysis) using Binary Instrumentation to obtain critical malware hidden code

• Risk Scoring on malware captured

• Malware Domain List based on DNS traffic and Attack Traffic to Honeypots

• Traffic Attack Pattern knowledge

Page 32: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Some Statistics

Page 33: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Contribution

Page 34: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Contribution

Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked

Page 35: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Contribution

Attacker Statistics: Attacker IP, Malware, Targeted Ports, Provinces attacked

Page 36: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics

Page 37: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics

Page 38: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics (malware found)

Page 39: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics

Page 40: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics

Page 41: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics

Page 42: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics (other malware)2013 2014

Virus naming by AhnLab-V3 (Virustotal)

Page 43: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Statistics (other malware)2015 2016

Virus naming by AhnLab-V3 (Virustotal)

Page 44: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics

Page 45: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics

Page 46: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics

Page 47: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics

Page 48: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics

Page 49: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics (who are they?)

Page 50: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics (who are they?)

Page 51: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics (who are they?)

Page 52: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

More Statistics (who are they?)

Page 53: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Research & Publications

Page 54: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Research & Publications

Malware | Data Mining | Behavior Analysis | Cyber Terrorism

Page 55: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Other Research

Second Hand USB Forensics and Publications

Page 56: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Mapping Research Roadmap

Deception Technology | Malware | Data Mining | Cyber Crime

Deception Technology

Malware

Data Mining Cyber Crime

Tools

Page 57: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Join Us

• http://www.ihpcon.id

• Indonesia Honeynet Project

• idhoneynet

• http://www.honeynet.or.id

• http://groups.google.com/group/id-honeynet

Page 58: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Related Publications• Joshua Tommy Juwono, Charles Lim, Alva Erwin, A Comparative Study

of Behavior Analysis Sandboxes in Malware Detection, The 3rd International Conference on New Media 2015, Jakarta, Indonesia, 2015

• Charles Lim, Nicsen, Mal-EVE Static Detection Model for Evasive Malware, 10th EAI International Conference on Communications and Networking in China, Shanghai, China, 2015

• Charles Lim, Darryl Y. Sulistyan, Suryadi, and Kalamullah Ramli, Experiences in Instrumented Binary Analysis for Malware, The 3rd International Conference on Internet Services Technology and Information Engineering 2015 (ISTIE 2015), Bali, 2015

• Charles Lim, Meily, Nicsen, and Herry Ahmadi, Forensics Analysis of USB Flash Drives in Educational Environment, The 8th International Conference on Information & Communication Technology and Systems, Surabaya, 2014

• Charles Lim, and Kalamullah Ramli, Mal-ONE: A Unified Framework for Fast and Efficient Malware Detection, 2014 2nd International Conference on Technology, Informatics, Management, Engineering & Environment, Bandung, 2014.

Page 59: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Call for Research Collaboration• Research Champion for each university

• Research collaboration across different universities to foster rapid research growth in Cyber security

• Generate more research publications ==> easier to get funding for research as well

Page 60: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

Our Partners

Page 61: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru

THANK YOU

Ministry of Communication and Informatics of Republic of Indonesia

Page 62: Charles Lim - Sistem pemantauan ancaman serangan siber di indonesia generasi baru