What we do with argus
Russell Fulton
r.fulton at auckland.ac.nz
Thu Jun 21 17:46:15 EDT 2001
On Thu, 21 Jun 2001 15:40:40 -0400 Desmond Irvine
<desmond.irvine at sheridanc.on.ca> wrote:
> What I'm most curious about is how other list members are making use of
> Argus.
Right, you know about my scan detectoin stuff -- that's really just a
hobby ;-)
The main reason we run argus is to have a long term audit trail of our
network traffic. The next logical question is what do we use this for.
1/ We run snort and argus logs are invaluable in figuring out if an
exploit attempt succeeded or not -- it isn't infallable but it is
pretty good. eg. if you see exploit attempt immediately followed by
inbound session to high port followed by outbound ftp connection you
know you've got a problem. Another example is the sadmind worm: I
dumped all traffic from the exploit phase of the attack and grep'ed out
all the established sessions. Looking at the logs I quickly
spotted that some machine had many more sessions than others so I wrote
a short (10 - 15 lines) perl script that read these ra records and
counted how many sessions to each host and output the hostnames and
counts (sorted by number of hits). The machines fell naturally into 3
groups:
a/ There were quite a few machines that had large numbers of sessions
(over 30 and up to 100). A bit more research showed that nearly all of
these machines had default install of IIS or were defaced). THese
machines were vulnerable to one or more of the attacks the worm used.
b/ There was another sizable group with exactly 15 connections, on
investigation these turned out to be all running IIS but none were
defaced. These machines were not vulnerable.
c/ Lastly a big group that had just a single session. These were
machines that were running web servers other than IIS.
It took me most of one afternoon to figure all this out but once I had
it the next time the worm struck I had a list of vulnerable machine in
about 5 minutes.
2/ We we do find compromised machines we use argus logs to track
cracker activity and in a few cases we have gone back several months to
find the original compromise. Since we installed snort I have not had
to do this much since we now usually pick up the compromise fast.
3/ we sometime want answers to ad hoc questions like "what proportion
of our traffic is udp and is it increasing".
4/ I periodically get calls from customers of local ISPs. "I've just
installed a personal firewall and it says your web server is attacking
my machine on <some high numbered port>". Invariably this is the
result of a dialup session being dropped and a new user picking up the
IP, a quick look at the argus logs will confirm this.
We also do per user billing and we could use argus for that but we dont
because we use Netramet --- which implements the IETF's Real Time
Traffic Measurement architecture (RTFM). Netramet was written by Nevil
Brownlee who lives in the next door office when he is not in San Diego
at CAIDA. Netramet does ragator style aggregation (and much more) on a
remote meter which you read with an snmp agent. The agregation is much
more flexible and since the agregation is done on the meter the traffic
transfer is minimized. It is however more difficult to set up -- it
has a programming language to specify the aggregation.
Russell.
Russell Fulton, Computer and Network Security Officer
The University of Auckland, New Zealand
More information about the argus
mailing list