Sustainable Sustworks - Tools for Internet Travel
Inspired Tools for the Mac

Search




Application Note 1008

Using the IPNetSentry Bandwidth Analyzer (IBA) as an IP Security Analysis Tool



Scenarios

1. Your Mac OS X system is up and running, but you are not currently doing anything with it. You look over to your cable (or DSL) modem to see the activity light occasionally flashing. You wonder "what is going on here"?

2. You've heard a lot in the news lately about "worms" being released and how they may slowdown the Internet. You wonder if your machine, even if it is a Macintosh, is being subjected to any of this activity.

Step 1: Acquire Data

We first need to acquire bandwidth and security log data using IPNetSentryX. The easiest way to acquire this data is to download and install the Bandwidth Analyzer application (available from our Downloads page). In this package you will find an IPNetSentryX document entitiled "Bandwidth Accounting". Open this document to install the needed filters. The needed filters are simply a collection of logging filters that start with the underscore character "_". Such filters cause matching datagrams to be logged in a daily Bandwidth Logging file. You can view the specific Bandwidth Logging filters by opening the 1.5 and 1.6 rules set. This document will also enable logging of all incoming and outgoing datagrams in a daily Security Log file.

In addition to opening this document you must also open the IPNetSentryX Preferences window and:

  • check the "Save To:" checkbox (the default directory should be fine)
  • check the "Enable bandwidth accounting for rules named with "_" prefix" checkbox
  • choose an accounting interval from the popup menu (our sample files use 1 minute interval)
  • check the "Write to accounting file each interval" checkbox
  • check the "Connection Logging" checkbox to if you also wish to begin connection logging (covered in App Note 1009)

Once these settings have been made, let IPNetSentryX acquire a few hours worth of data. You can be using the machine at the time or just let it sit idle (but it should not go to sleep).

Step 2: Analyze Data

Now that we have some data to analyze, we can launch the IPNetSentryX Bandwidth Analyzer. Open the recently created "bandwidth log YYYY-MM-DD.plist" file. Depending on how much data has been acquired, this may take a few moments as the Bandwidth Analyzer parses this file.

Once loaded, you can simply plot all the data in the list by clicking the "Graph All" button. This should create a plot similar to the following:

Now click the "Scan for Unusual Activity" button. This action may take some time (please be patient). The Bandwidth Analzyer is examining every datagram received by or sent from your machine, and seeing if the datagram is "unexpected" behavoir. Unexpected datagrams are marked by small red (incoming) or blue (outgoing) tick marks at the top and bottom of the plot, respectively. If you have a lot of unexpected activity, the ticks may actually appear as a solid 5 pixel high lines at the top and bottom of the plot. Here is the result of our unusual activity security scan:

Note the solid red and blue "lines" at the top and bottom of the plot. The blue line only extends to about 11:30 AM, afterwhich we invoked a special filter, but more on this later. This clearly shows us that our machine is being subjected to plenty of unexpected incoming and outgoing activity.

To see exactly what is happening. click in the plot region itself and drag to the right in order to select a region of the plot for more detailed Security Log analysis:

This will enable the "Show Security Log" button. Click the "Only show unusual datagrams button, and leave the popup menu set at "Both" (we want to examine both incoming and outgoing datagrams). Click the "Show Security Log" button. Once again, because we are looking at every datagram passed to and from the machine, this process may take a few moments. Once completed, you should see a list similar to the following (your list, however,will depend on the specific unusual activity of your network connection):

This data immediately shows us that our machine is being subjected to numerous ICMP Pings. In this case, this is due to a recent release of a Windows worm (W32.Welchia.Worm).

Step 3: Add Additional Filters

Now that we know the source of most of our "unusual" Internet activity, we are in a position to address it. In this case the solution is relatively simple: add a trigger for any incoming ICMP Ping datagrams. Having done this at about 11:30 A.M, we see that our unusual outgoing activity was significantly stopped (this ICMP Ping trigger is actually part of the Bandwidth Accounting rules set, specifically rule 2.4.1.3.3). Note that we cannot stop the initial incoming ICMP Ping datagram, since these are directly being delivered to us by our ISP (who does not know if this is a legitimate or illegitimate datagram).

The importance of stopping the Ping reply from our machine should be highlighted. This is because:

- by stopping the reply, the remote infected machine (probably a Windows machine) will not even know our machine is on the Internet, hence will normally stop transmitting datagrams to this "inactive" IP address.

- by stopping the reply we save precious upstream bandwidth. Normally all cable and DSL (ADSL) connections are highly asymmetric. We are given far more downstream bandwidth than we are given upstream bandwidth. IF we continue to reply to unwanted Ping Echo requests, we are only wasting our upstream bandwidth which could be better used for our wanted connections to remote locations.

We then repeat Steps 2 and 3 as needed to identify and block other unwanted and unusual activity.

Definition of "Unusual Activity"

When performing the Unusual Activity scan, the Bandwidth Analyzer compares each incoming and outgoing datagram to a list of expected services. This list of expected services can be viewed and edited through the Bandwidth Analyzer Preferences window:

The default list should be good for most users who are using their machines for standard Internet activities such as web browsing, file downloading, and email. Add or remove services (ports and protocols) as needed for your specific Internet activities. A current and complete list of standard Internet services can be found at:

http://www.iana.org/assignments/port-numbers

Conclusion

Packet security analysis use to be the domain of large corporate network administrators. With the recent release of several worms to the Internet at large, it can be beneficial to each of us to occasionally perform our own security analysis. Not only such analyses point out general deficencies in our firewall policies (rules), but subsequent actions might also help increase the overall performance of our network connections.

The IPNetSentryX Bandwidth Analyzer is one tool which will signficantly aid the lay person in performing these security audits.


Please send questions, comments, or suggestions using our general requests form:

http://www.sustworks.com/site/sup_questions.html

Top

Back to IPNetSentryX Application Notes