throbber
Live Traffic Analysis of TCP /IP Gateways t
`
`Phillip/'\ .. Porras
`porrasOcsl.sri.com
`Computer Science Ijal)oratory
`
`SRI I11Ler11ai.io11al
`333 n.avcnswood /\venue
`Menlo Park, CA 94025
`
`Alfonso Valdes
`avaldesOcsl.sri.com
`Electromagnetic ai1d Re111ote
`Sensing Laboratory
`SRI International
`;3;33 Rave1uiwood Avenue
`Menlo Park, C/\ 94025
`
`December 12 1997
`
`Abstract
`
`11ece.s.sary flo\VS demanded for user functionality, can be
`a nontrivial exercise [3].
`
`rve enumerate a variety of u:ays to extend buth sla(cid:173)
`t1st1cal and signature-based intrusiuu-de/eclion analy.~i.~
`techniques lo 1nonilo1· nft111ork traffiC:. Specifically, u1e
`pre.~f:nl techniques to analyze TCJ-'/lP packet strca111s
`that flow through network gateways for· 8i.l/nY of mali(cid:173)
`cious activity, no111naficiu·as failures, and othrr excep(cid:173)
`tional events. The intent is lo demon.~trnte, by exam.(cid:173)
`pie 1 the utility of introducing gatr111ay surveillance mech(cid:173)
`a11is1ns lo monitor net1vork traffic.
`ltJ.'e present this dis(cid:173)
`c1tssion of gateway surveillance 1uec!tanisrris a.~ com.ple(cid:173)
`nientary to the filteriug rnechanisms of a large enterprise
`nct·work, aud illuslrate the usefulness of surveillance in
`directly enhancing the security and stability of net111ork
`operations.
`
`1
`Introduction
`M cchanis1ns for p::i.rsing and filtering hostile exler(cid:173)
`
`nal nPtwork traffic [:.!, 4] that could reach internal
`net\\o·ork services have become widely accepted as prc(cid:173)
`requisitt:s for lirniting the exposure of internal net>vork
`W:lset.s V>'hile maintaining interco1111eclivity \Yith ext.er(cid:173)
`ual nel \\'or ks. The encoding of filteriug rules for p::i.cket(cid:173)
`or transport-layer con1municatiou should he enforced
`at entry pointR between internal network.sand external
`traffic. Developing filtering rules Lhat .strike an optin1al
`balance between the restrictiveness ner,esRary to sup(cid:173)
`pres.s the entry of unwanted Lraffic, while allowing the
`•t Th" W•>rk prl"sl"ntcdin this pa.per is cniT.,nLly funded by the
`Information Technoloi>;y Offict' of the Defense Advanced Rflsf!arch
`Projects Agf'rwy, under contract number F30!i02-96-C-U~!J4.
`
`ln additioll to intelligent. filtering, there have been
`various developmt:>nts in recent years in passive surveil(cid:173)
`lance mechanisms to 111onitor net,vork traffic for signs of
`malicious or anon1alous (e.g., potentially erroneous) ac(cid:173)
`tivity. Such tools atle1npl lo provi<le network adminis(cid:173)
`trators tin1ely in.sight into note\vorthy exceptional activ(cid:173)
`ity. Real-time monitoring pron1ises an added dimenRion
`of control and insight into the flow of traffic between
`the internal network and its external environment. The
`insight. gained through fielded network Lraflic monitors
`could also aid sites in enhancing the effectiveness of their
`fire\vall tillering rllles.
`
`Ilowever, traffic 111onitoring i.s not a free activity(cid:173)
`especially live Lraffic monitoring. In presenting our di.s(cid:173)
`cussion of nelwork analysis techniques, we fully real(cid:173)
`ize thf'. t'-Osts they in1ply -..vith respect t.o computational
`resources and hu1u1111 over.sight. For exan1ple, obtain(cid:173)
`ing the necessitry input for surveillanct: involves the de(cid:173)
`ployment of instrumentation to parse, filter, and for(cid:173)
`rnat event strean1s derived fro111 µotentially high-volun1e
`packet transmissions. Con1plex event analysis, response
`logic, and human n1anagc111ent of the analysis units also
`introduce costs. Clearly, the int.roduction of network
`Rllrveillance 1nechani::lrns on top of alrea.dy-deploycd pro(cid:173)
`tective traffic filters is an expense that requires justifica(cid:173)
`tion. In this paper, >ve outline the benefits of our tech(cid:173)
`nique~ and seek to persuade the reader that the costs
`can he worthwhile.
`
`In proceedings oft.he 1998 !SOC Symposium on Networ·k and Distributed Sy.•lf.m.B St:cu•·ity
`
`1 of 13
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 1
`
`

`

`2 Toward Generalized Network
`Surveillance
`
`The Lechnique::; pre::iente<l in this paper arc extensions
`of earlier work hy SRI in developing analytical meth(cid:173)
`ods for detecting anomalous or known intrusive activ(cid:173)
`ity [1, 5, 12, 13]. Our earlier intrusion-detection ef(cid:173)
`forts in rh~veloping IDES (Intrusion DeterJ.ion F,xpert
`System) and later NIDES (!\ext-Generation Intrusion
`Detection Expert System) were oriented toward the
`Hurveillance of user-session an<l hosL-layer activity. This
`previous foe.us on session activity within host houn<l(cid:173)
`aries is understandable given that the primary input
`to intrusion-detection tools, audit data, is produced by
`1ncchauis1ns that tend to be locally ad1ninistcrcd 'll'ithin
`11 single host or domain. Ho¥lever, as the importanr.e
`of net,vork security has gro,vn, so too has the need to
`expand intrusion-detection technology to address net(cid:173)
`work infra;;;tructnre and service:s. Tn 011r r.urrent re(cid:173)
`search effort, E~IERALD (Event Monitoring Enabling
`llesponses to Anomalous Live Disturbances), we explore
`the extension of our intrusion-dctcctiuu uH..:tho<l~ tu the
`analysis of netv.·ork activity.
`
`Net>vork monitoring, in the context of fault detection
`and diagnosis for computer network and telecon1n1uni(cid:173)
`cation environrncnts, has becu ~tu<lied exie118ively by
`the network 1nanagement and alarm correlation commu(cid:173)
`nity [8, 11, 15, 16]. The high-volume distributed event
`correlation technology pron1oted in so1ne projects µru(cid:173)
`vides an exeellent foundation for building truly scalable
`net. \Vork-aware ,o;11rveillance technology for n1isuse. llow(cid:173)
`ever, these efforts focus prin1arily on the health au<l ~ta­
`t.us (fault detection and/or diagnosi:;,) or µerfor1nance of
`the target net.work, an<l <lo 11ot cover the detertion of in(cid:173)
`tentionally abu8ive traffic. Tn<leed, some simplifications
`in the fault analy,o;is a.nd diagnosis co111111unity (e.g., as(cid:173)
`sumptions of stateless correlation, which precludes even I.
`ordering; simplistic ti1ne-out 111etric:s for resetting the
`tracking of prol>le111s; ignoring individuals/sources re·
`sponsible for exceptional activity) do not translate well
`to a malicious environn1ent for detecting intrusions.
`
`Earlier work in the intrusion-detertion community
`atten1pting tu address the is,o;11e of network surveillance
`includes the Nr.:Lwork Security Monitor (NS.l\i), devel(cid:173)
`oped at UC Davi8 [6], and the Network Anon1aly De(cid:173)
`tection and Intrusion R,eporter (N AD Ill) [7], developed
`at Los Ala111us National Lahoratory (LANL). Both per(cid:173)
`fur111ed broadc:ast LA;"if packet 111onit.oring tu analyze
`traffic patterns for knov:n hostile or a1101nalou,o; activ(cid:173)
`ity. 1 Further research by UC Davis in the Distributed
`
`1Rcccnt product examples, 5uch ru; ASTM and Net Ranger,
`that follow the pa~~iv" pa<·ket 1non.itoring approach have 5ince
`
`[2il] and later
`Intrusion Detection Syste1n (DIDS)
`Graph-based Intrusion Detection Systern (GRIDS) [24]
`projects has attempted to extend intrusion monitor(cid:173)
`ing capabilities beyond LAN analysis, to provide rnulti(cid:173)
`LAN and very large-8cale netv.·ork coverage.
`
`'fhis paper takes a pragn1at.ic look at the issue
`of packet and/or datagra1n analysis ha.~ed on statis(cid:173)
`tical anomaly detection and signature-analysis tech-
`1uques.
`'!'his "'ork is being perforn1ed in the con(cid:173)
`text of SR.l's latest intru8ion-detection effort, EMER·
`ALD, a distributed scalable tool suite for tracking mali(cid:173)
`cious activity through and across large net.works [20].
`EMERALD iuiro<luces a building-block approach to
`nP-t>vork ,o;urveillance, attac:k isolation, and a.utomated
`response. The a.pproa.ch employs highly distributed, in(cid:173)
`dependently tunable, surveillance and response mon(cid:173)
`itors that arc deployable puly111orphically at various
`ahstrar.t laye:rs in a large network. These monitors
`den1onstrate a streamlined intrusion-detect.ion design
`that co1nbines signature analysis with statistical proftl(cid:173)
`ing to provide localized real-t.ime protect.ion of the most
`widely used network services and components on the
`Internet.
`
`Among the general types of analysis targets that
`EMERALD monitors arc network gateways. We de-
`8cribe several analysis t.el".hniqnes that EMERALD im(cid:173)
`plements, and discuss their use in analyzing malicious,
`faulty, and other exceptional uct\vork activity. F,MF,R(cid:173)
`ALD's ~urveillance rnodules will monitor entry points
`that separate external network traffic fro1n an enterprise
`network and its constituent local <lornain,;. 2 We present
`thc~e 8urveillance techniques as complementary to the
`filtering mechanisms of a large enterprise network, and
`illustrate their utility in directly cuhancing the ,o;ec:urity
`and stability of nctV1·urk operations.
`
`"\Ve first consider the candidate event streams that
`pass through network entry points. Critical to the ef(cid:173)
`fective 111011itoring of operations is the careful selection
`an<l organization of these event strca1118 such that an
`analysis bWled 011 a selected event stream will provide
`111ea11i11gful insight into the target activity. We identify
`effective analytical techniques for processing the event
`stream given specific analysis objectives. Sections 4
`ancl 5 explore how both staListical anomaly detection
`and signature analysis can be applied to iclentify activ(cid:173)
`ity worthy of review and µossible re,o;ponse. All such
`
`gained wide deployment in some Departn1ent of n~reuse network
`facilities.
`2 We use the terms enterprise and intr11'<"1 inLerchnngcably;
`both exi5t ultin1al.ely as cooperative conunun.ities of incl.,p•m(cid:173)
`d .. utly administered domains, com1nunirat.iug 1.ogethcr with sup(cid:173)
`portive network i11fr...,.tructure such as firewalls, router"· and
`lirirlges.
`
`In procee<lillg~ u! Lhe 199!i !SOC' S"ymposi111n on N~twork and Distribu.ted Sy.1tfln1s Secur;ly
`
`2 of 13
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 2
`
`

`

`clai111s are suµµurtt.:d by exan1ples. More broadly, in
`Section fl \Ve discuss the correlation of analysis results
`producf'rl hy surveillance cornµunents deployed indepen
`dently throughout the entry points of our protected in(cid:173)
`tranct. We discuss how events of limitecl significance to
`a local surveillance monitor may be aggregated \Vith re(cid:173)
`sults frorn other ::;trategically deployed monitors to pro(cid:173)
`vide insight into more \vide-scale proble111::; or threats
`against the intranet. Section 7 discusses the issue of
`response.
`
`3 Event Stream Selection
`
`The success or failure of event analy1:1i1:1 ::;hould be quanti(cid:173)
`tatively measured for q11 ::i.litie.~ such as acc1irar,y and per(cid:173)
`forn1ance: both are assessable through testing. A more
`difficult but equally i1nportant n1etric to assess is con1-
`pleteness.
`'VVith regard to net¥lork surveillance, inac(cid:173)
`curacy is reflected in the number of legitimate transac(cid:173)
`tion::i flagged as abnormal or malicious (false positives),
`inromph~teness is reflected in Lhe 11u111ber of har111ful
`transactions that escape detection (falsr. negatives), and
`perforn1ance is 111easured by the rate at which transac(cid:173)
`tions can be processed. All three nleasurements of suc(cid:173)
`cess or failure directly depend on the quality of the event
`stream upon which the analysis is bll!ed. Here, we con(cid:173)
`sider the objective of providing real-time surveillance
`of TCP /IP-based networks for 111alicious or exceptional
`network traffic. In parlicular, our net\\'ork surveillance
`mec,hanisms ran he integrated onto, or interconnectecl
`with, network gateways that filter traffic between a pro·
`tected intranet and external networks.
`
`IP traffic represents an interesting candidate event
`stream for analysis.
`Individually, packets represent
`parsablc activity records, where key data \viLhin Lhe
`header and data segment can he statistically analyzed
`and/or heuristically parsed for response-worthy activity.
`llowever, the sheer volume of potential packets dictates
`careful llilsess111ent of ways to optirnally organizr. pack(cid:173)
`ets into streams for efficient parsing. Thorough filtering
`of events and event fields such that the target activ(cid:173)
`ity is concisely isolated, should be applied early in the
`processing stage to reduce re::;ource utilization.
`
`\l\'ith respect to T"CP /IP gateway tr attic monitoring,
`we have investigated a variety of ¥1ays to categorize
`and isolate groups of packets fron1 an arbitrary packt.:t
`stream. Individual packet strean1s can be filtered bll!ed
`on different isolation criteria, ::iuch fill
`
`• Pas.~-t!tro'ugh lru.f]ic. packets allo\ved into the inter(cid:173)
`nal network frorn exlernal sources.
`
`• Protocol-spec({ic lru_{fic: µackets pertaining to a
`common protocol
`fl..~ designated in Lhe packet
`header. One example is the stream of all ICMP
`packets that reach the gateway.
`
`•
`
`l!nassigned port lrajfic: packets targeting ports to
`which the administrator has not assigned any net(cid:173)
`work service and that also ren1ain unblocked by the
`firewall.
`
`• Tran11porl 1nunagcu1enl rnes::;o._qc::;: packets involv(cid:173)
`ing t.ra.nsport-111.yer <'.onnection establishment, con(cid:173)
`trol, and termination (e.g., TCP SYN, RESET,
`ACK, <window resize>).
`
`• Source-address 1nonitor1ng: packets v.·hose source
`addresses match well-known external sites (e.g.,
`connections fron1 satellite offices) or have raised
`::;uspicion fro111 other n1onitori11g efforts.
`
`• Deslinaliori-add1·ess nioniluring: all packets whose
`clestination addresses match a given internal host
`or workstation
`
`• Application-layer monitoring: packets targeting a
`particular network service or application. 1'his
`strean1 isolation 1nay translate to parsing packel
`headers for TP/port matches (assuming an estab~
`lished binding between port and service) and re~
`building datagrarns.
`
`lu the following sections we discuss how such t.raffi<'.
`st,reams can he statistic::i.\ly and heuristically analyzed
`to provide insight into malicious and erroneous external
`traffic. Alternative sources of event data are also avail(cid:173)
`able fro1n the report logs produced hy the various gate(cid:173)
`ways, -firewalls, routers, and proxy-servers (e.g., router
`syslogs can in fact be used to collect packet inforn1a(cid:173)
`tion from several products). We explore how stlltistical
`and signature analysis techniques can be employed to
`monitor various elen1ents within 'J'CP /IP event strean11:1
`that flow through network gateways. '\Ve present spe(cid:173)
`cific techniques for detecting external entities that at(cid:173)
`Le111pl lo subvert or bypru;s internal network services.
`Techniques are suggested for detecting attacks against
`the underlying network infrastructure, including attacks
`using corruption or forgery of legitin1ate traffic in an at(cid:173)
`tempt to negatively affect routing services, aµplication(cid:173)
`Jayer services, or other uct;vork conlrols.
`\Ve suggest
`
`• Discarded traffic: packets not allowed through the
`gateway becau::;e they violate filtering rules. 3
`30f par~icular added value in assessing this traffic would be
`
`some indication of why a given pack"t WM ,-.,j~cted. A generic
`Rolut.inn fur deriving this di•po•ition information without depen(cid:173)
`dencies on the firewall or router is difficuh.. Suo:l1 infurn1.atjon
`would be a. useful en\1a11ct<nLenl lu pm::kct"rcjection handlers.
`
`In proceP.dings of the 1998 JSOC Sy1npo~iu1r1 011 iVetwork and Distributed Sy~tF.ms Secui·ity
`
`3 of 13
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 3
`
`

`

`how to extend onr s11rveillance Lechuique:; to recognize
`network faults and other exceptional acLivity. \Ve also
`<liscuss issues of distributed result correlation.
`
`4 Traffic Analysis with Statisti(cid:173)
`cal Anomaly Detection
`
`SRI has been involved in statistical anomaly-detection
`research for over a decade [1, 5, 10]. Our previous "'ork
`focused on the profiling of user activity through audit(cid:173)
`trail analysis. \.Vithin Lhe EMER.ALD µrojcct, we arc
`extending the underlying statistical algorith mi; to profile
`various aspects of network traffic in search of response(cid:173)
`or alP:rt-worthy anornalie;;.
`
`'!'he statistical subsystem tracks subject activity via
`one or more variables called 1neasures. '!'he statistical
`algorilJuus e1uploy four clilllses of 1neW>urcs; categorical,
`continnoui;, intensity, and event distribution. Categori(cid:173)
`cal me::i;;11res are those that a;;;sume values from a cate(cid:173)
`gorical set, such as originating host identity, destination
`host, and port number. G'ontinuous 1neasures are those
`for which observed values are uu1ueric or ordinal, such
`as number of bytes transferred. Derived measures also
`track the intensity of activity (that is, the rate of events
`per unit time) and the "n1eta-distribution" of the n1ea(cid:173)
`sures affected by recent events. These derived measure
`types a.re referred to as intensity and event distribution.
`
`The system we have developed maintains and up(cid:173)
`dates a description of a subject's behavior with respect
`to these mea.9urc types in a co111pact, efficieuLly updated
`profile. The profile is subdivided into i;hort- an<l long(cid:173)
`term elements. The short-term profile accumulates val(cid:173)
`ues between updates, and exponentially ages values for
`comparison to the long-Ler111 profile. As a r.onsequenr.e
`of t,he aging mPrhanism, the short-term profile char(cid:173)
`acterizes the recent activity of the subject, where "re(cid:173)
`cent" is detern1ined by the dyna111ically configurable ag(cid:173)
`ing paran1eters used. At update tin1e (typically, a time
`of low systc111 acLiviLy), Lhe update funr,tion folds the
`shorL·Lerrn values obi;erved since the la.5t update into the
`long-term profile, and the short-tern1 profile is cleared.
`'fhe long-tern1 profik: is it<iclf slowly aged to adapt to
`changes in subJect activity, A1101ua!y scoring cornpares
`related attributes iu the short-terrn profile against the
`long-ier111 profile. Ai; all evaluations are done against
`c111pirical distrib11tionR, no assumptions of paran1etric
`distributions arf' made, and n1ulti-n1odal and categori(cid:173)
`cal distributions are accommodated. l 1'urthermore, the
`algorithms we have developed require no a priori knowl(cid:173)
`edge of intrusive or exceptional activity. A n1ore de(cid:173)
`tailed mathematical description of these algoriLhnIB is
`
`given in [9, 26].
`Our earlier work r.onsidered the subject class of users
`of a con1puter system and the corresponding event
`::;trean1 the systcn1 audit trail generated by user ac(cid:173)
`tivity. Within the EMER,ALD project, '?l'e geueralize
`these concepts so that components and software such
`a.9 network gatev;ays, proxies, and network services can
`the1nselves be 111ade subject cla:;scs. The generated
`event streams are obtained from log files, packeL anal(cid:173)
`ysis, and-where required-special-purpose instrumen(cid:173)
`tation made for services of interest (e.g., F'l'P, H'l"l'P,
`or SMTP). As appropriaLe, aIJ event stn::a111111ay be an(cid:173)
`alyze<l a.<; a single subject, or as rnultiple subjects, and
`the san1e network activity can be analyzed in several
`ways. For exan1ple, an event strcan1 of dropped pack(cid:173)
`ets permits analyses that trar.k the rea.<;on each par,ket
`was rejected. Under such a scenario, the firewall re(cid:173)
`jecting the packet is the subject, and the measures of
`interesL are Lhe re!IBon the packeL was dropped (a cat(cid:173)
`egorical measure), and the rate of <lropped par.kets in
`the recent past (one or more intensity measures tuned
`to time intervals of seconds to 1ninutes). Alternatively,
`these dropped µackets 111ay be parse<l in fiIJer detail,
`supporting other ::i.n::i.lyses where the suhject is, for ex(cid:173)
`an1ple, the identity of the originating host.
`
`EI\lERALU can also choose to separately define
`satelliLe offices and "rest of world" as different subjecti;
`for the same event stream. That is, we expect distinc(cid:173)
`tions from the satellite office's use of services and ac(cid:173)
`cess to assets to deviate "'idely from sessions originatiIJg
`from external nouaffiliated siLes. Through satellite sei;(cid:173)
`sion profiling, E\fERA T. n r.an monitor traffic for signs
`of unusual activity. In the case of the F'l'P service, for
`exan1ple, each user who gives a login 11a111e is a subject,
`and "anony1nous11 is a subjecL as well. Another exam(cid:173)
`ple of a subject is the network gateway itself, in which
`case there is only one subject. All subjects for the sa1ne
`cvenL strea111 (LhaL is, all subjer.ti; '-"'ithin a subject class)
`have the i;::i.me measures defined in their profiles, but the
`internal profile values are different.
`
`Ai; WP: migrate our statistical algorithms that had pre(cid:173)
`viously focused on user audit trails with users as sub(cid:173)
`jects, '-"'e generalize our ability Lo build more abstract
`profiles for varie<l types of activity captured within our
`generalized notion of an event stream. In the context
`of statistically analyzing TCP /IP traffic strea1ns, profil(cid:173)
`ing can be derived fron1 a variety of traffic perspectivei;,
`including profiles of
`
`• Protocol-sper.ific transactions (e.g., all ICMP ex(cid:173)
`r.hftnges)
`
`• Sei;sions between specific internal hosts au<l/or spe-
`
`In pro<.:ccdings of the 1998 !SOC Symposium nn i'>iP.twork <Hltl Di~l•·ibult'd Sy8tems Security
`
`1 of lJ
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 4
`
`

`

`cific external sites
`
`• Application-layer-specific sessions (e.g., anonymous
`FTP sessio11s profiled individually and/or collec(cid:173)
`tively)
`
`• Discarded traffic, measuring a.ttrih11te;s such as vol(cid:173)
`uH1e and disposition of rejections
`
`• Connection requests, errors, and unfiltered trans(cid:173)
`mission rates and disposition
`
`Event records are generated either as a result of activ(cid:173)
`ity or at periodic intervals. 111 our case, activity records
`are based on the content of IP packets or transport(cid:173)
`layer data.gr~.m.~. 011r event filters also construct. inter(cid:173)
`val sun1111ary records, which contain acc.umulated net(cid:173)
`work traffic statistics (at a 1ninin1um, number of packets
`and 11u111bcr of kilobytes transferred). 'l'hese records are
`constructed at the end of each interval (e.g., once per N
`seconds).
`
`F.MF.RALD's statistical algoritl11n adjusts its short(cid:173)
`tern1 profile for the measure values observed on the
`event record. The distribution of recently observed val(cid:173)
`ues is evaluated against the long-ter111 profile, and a
`distance between the t"''o is obtained. The difference
`is compared to a historically adaptive, subject-specific
`deviation. The empirical distribution of this deviation
`is Lransforrned to obtain a score for the event. Ano111a(cid:173)
`lous events are thosP whose sr.ores exr.eed a historically
`adaptive, subject-specific score threshold based on the
`'l'his nonparametric ap(cid:173)
`en1pirical score distribution.
`proach ha11dles all rneasure types a11d rnakes 110 !l.'lsurnp(cid:173)
`tions on t.he modality of the difitribution for c.ontinuous
`measures.
`
`The; following se;r.tions provide example scenarios of
`exceptional network activity that can be measured by
`an EMEllALD statistical engine deployed to network
`gateways.
`
`4.1 Categorical Measures 111 Network
`Traffic
`
`Categorir.al measures assume values fron1 a discrete,
`nonordered set. of possibilities. Exan1ples of categori(cid:173)
`c;:i.1 measures include
`
`• Snurce/destination address: One expects, for ex(cid:173)
`ample, accesses from satellite oftict.:s Lu originate
`from a set of known host identities.
`
`• Command issued: While any single couunand may
`not in itself be a1101nalous, >iome intri1sion scenar(cid:173)
`ios (such as "doorknoh rattling") give rise to an
`
`unusual 1nix of commands in the short-term pro(cid:173)
`ftlc.
`
`• Protocol: As ,.,·ith r.orr1rr1ands, a single retp1cst of
`a given protocol may not be anomalous, bnt an
`unusual 1nix of protocol requests, reflected in the
`Hhort-ter1n profile, 1nay indicate an intrusion,
`
`• Errors and privilege violat.io11s: We track the return
`code from a command as a categoric.a.I me;:isnre; we;
`expect the distribution to reflect only a small per
`r.e;nt of abnorrnal returns (the actual rate is learned
`in the long-te;rm profile). While some rate of errors
`is normal, a high number of exceptions in the recent
`past is abnormal. This is reflected both in unusual
`freq11enr.ie;s for abnormal categories, deter.t.ed here,
`and unusual count of abnorn1al returns, tracked as
`a continuous measure as described in Section 4.2.
`
`• Malforn1ed service requests: Categorical measures
`r.an track the occurrence of various for1ns of bad
`requests or malformed packets directed to a specific
`network service.
`
`• ~lalforrned packet disposition: Packets are dropped
`by a packet filter for a variety of reasons, many of
`winch are innocuous (for exan1ple, badly formed
`packet header). U11usual patterns of packet rejec(cid:173)
`tion or e;rror messages could lead to insight into
`problems in neighboring systems or more serious
`atten1pts by external sites to probe internal assets.
`
`• File handles: Certain subjects (for exarnple, anony(cid:173)
`mous FTP users) are restricted as to which files
`they can access. Atten1pts to access other tiles or to
`1vritc rcad-011ly files appear anornalous Snr.h events
`l:lre ofteu detectable by Hignature analysis AA well.
`
`The statistical componi>nt builds empirical distribu(cid:173)
`tions of the c.ategory values encountered, even if the list
`of possible values is open-ended, and has n1echanisn1s
`for "aging out" categories whose long-terrn probabili(cid:173)
`ties drop below a threshold.
`
`The following is an example of categorical measures
`used in the surveillance of proxies for services such
`as SMTP or FTP. Cuusidcr a typical data-exchange
`sequence between an externul clic11L aud an inter(cid:173)
`nal server within the protected network. Anonymous
`.F'f P is restricted to certain files and direr.tories; the
`na111cs of these are categories for measures pertaining
`to file/direr.tory reads and (if permitted) writes. At(cid:173)
`ternpted acr,esses to unusual directories appear anoma(cid:173)
`lous. i\1onitors dedicated to ports include a categorical
`n1easure whose values arc the protocol used. Invalid re(cid:173)
`quests oft<.:n lead to an acce>is violation error; the type
`
`In proceedings of the 1998 JSOC SympcMium 011 A'etwork t111tl Di~lributt'd Syaterns Security
`
`5 of 13
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 5
`
`

`

`of error associated with a request is a11ot 11er ex1u11ple of
`a categorical n1easure, and the count or rate of errors
`in the rt:cent past is tracked as continuous measures, as
`dPsc:rihed in Secliou 4.2.
`
`1.2 Conti11uous Measures in Network
`Traffic
`
`Continuous measures assun1e values from a continuous
`or ordinal set. Exa111ples include inter-event ti1ne ( dif(cid:173)
`ference in time stamps bet;veen couseculive eveuts fru111
`the same stream), counting mea.sures snc:h as thf' nun1-
`ber of errors of a particular type observed in the recent
`pasL and network traffic uH.:asures (nun1ber of packets
`and number of kilobytes). The slalislical subsystc111
`treats contin11011s mefl..~ures by firsl allocaling bins ap(cid:173)
`propriate to t.he range of values of the underlying mea(cid:173)
`sure, and then tracking the frequency of observation of
`each value range. In Lhis 'Nay, rnulli-111odal distributions
`are acc.ommodated and muc.h of the computational ma(cid:173)
`chinery used for categorical measures is shared.
`
`Continuous n1e<l.'lures are useful not only fur iutrusiou
`deter.tion, hnt also support the monitoring of health and
`status of the net\.vork from the perspective of connectiv(cid:173)
`ity and throughput. An instantaneous measure of traffic
`volun1e maintained by a gateway n1onitor can detect a
`sud<len a11<l unexpected loss in the <lala rate of received
`packets, when this volume falls outside historic.al norms
`for the gateway. 'l'his sudden drop is specific both to
`Lhe galeway (the subjecl, in this case) an<l Lo Lhe time
`of <lay (e.g., Lhe average sustained traffic rate for a rna.(cid:173)
`jor network artery is much different at 11:00 a.111. than
`at n1idnight).
`
`In our exarnple discussion of an FTP service in Sec(cid:173)
`tion 4.1, atte111pts to access unallowed directories or filris
`result in errors. The recAntly ohsArved ra.te of such er(cid:173)
`rors is continuously compared with the rate observed
`over sin1ilar time spans for other FTP sessions. So111e
`101-v rate of error due t.o rnisspAllings or innocent at-
`1e1npts is to he rixpAc:ted, and this would be reflected
`in the historical profile for these ineasures. An excess
`beyond historical norms indicates a110111alous activity.
`
`Continuous rucasures can also work in conjunction
`with categorical measures to detecl excessive data trans(cid:173)
`fers or file uploads, or cxct:::.:oive 111ail relaying, fl..~ well a.<;
`excessive service-layer errors by external clients. Cate(cid:173)
`gorical a1Hl conlinuous measures have proven to be the
`111osl useful for anomaly detection in a variety of con(cid:173)
`tPxts.
`
`\Ve next describe the t>vo <lerive<l 1neasure types, in(cid:173)
`tensity and cvcrtl di:>tr·ibuliun, vvhirh deter.t annmalies
`
`related to recent traffic volume and the mix of measurPs
`afTecte<l by this traffic.
`
`4.3 Measuri11g Network Traffic Inten(cid:173)
`sity
`
`lntensity measures distinguish whether a given volume
`of traffic aµpears consistent with historical observations.
`ThesP mPasnres reflpct the int.ensily of Lhe evenl strea111
`(nun1ber of events per unit time) over time intervals that
`are Lunablc. Tyµically, we have defined three intensity
`measures per profile, which, \\•ilh respect to user aclivit.y
`monitoring, were scaled at intervals of 60 seconds, 600
`seconds, and 1 hour.
`..\.pplied to raw event strean1s,
`inlensity ine<l.'lures art: particularly suited for <lctcctiug
`flooding attacks, while also providing insight. inlo olher
`anomalies.
`
`E:\1ERALD uses volnme ana.lyses to help detect the
`introduction of malicious traffic, such as traffic intended
`to cause service denials or perforn1 intelligence gath(cid:173)
`Pring, whPrP such traffic m11.y not nec.Pssarily he vio(cid:173)
`lating filtering policies. A sharp increase in the over(cid:173)
`all volun1t: of di:ocar<le<l packets, us well as analysis of
`the disposition of the disr,arded packets (fl..~ disr,11ssrid
`in Section 4.1 ), can provide insight into 11nintentionally
`malformed packets resulting from poor line quality or
`internal errors in neighboring hosts. High volumes of
`discarded packels can also indicate rnore maliciously in(cid:173)
`tended transmissions such as scanning of UPD ports or
`IP address scanning via ICMP echoes. Excessive num(cid:173)
`bers of 111ail expansio11 requests (EXPN) may indir.ate in(cid:173)
`telligence gathering, perhaps by spammers. 'fhese and
`other application-layer forms of doorknob raitli11g can
`Uc <lcit:cic<l Uy an £.1\ifERALD statistical enginP ¥1hen
`filtering is not desired.
`
`Allcrnalively, a sharp increa.~e in events viewed
`across longer durations may prnvide insight into a con(cid:173)
`sistent P:ffort t.o limit or prevent successful traffic flow.
`Intensity measures of transport-layer conneclion re(cid:173)
`quests, such as a volume analysis of SYN-RST mes(cid:173)
`sages, could indicate the occurrence of a SYN-attack [17]
`against port availability (or possibly for port scanning).
`Variants of this could includA intensity measures of
`TCP/FIN iucssa,l!;es [14], considered a more ;;tealthy
`forn1 of port scauning.
`
`Monitoring overall traffic volun1c an<l bursty events
`by using both intensity and couti11uous 1nea.~ures pro(cid:173)
`vides son1e interesting advantrtges over other monitoring
`aµproaches, such as user-definable heuristic rules that
`specify fixPd thresholds. In particular, the intensity of
`events over a duration is relative iu the sense that the
`term "high volume" n1ay reasonably be considered dif-
`
`In prorf'P<iings of the 1998 lSOC Syr11posiu.m on Jl.'etwork (lnd /)i~fributed Systenos Security
`
`6 of 13
`
`Commerce Bancshares, Inc., et al.
`Exhibit 1004
`Page 6
`
`

`

`ferent ut 1nidnight than at 11:00 a.111. The notion of
`high bursts of events might similarly be unique to the
`role oft11e target systen1 in the intrane

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket