Very Fast containment of Scanning Worms Presented by Vinay Makula.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

F3 Collecting Network Based Evidence (NBE)
1 Reading Log Files. 2 Segment Format
11 Packet Sampling for Worm and Botnet Detection in TCP Connections Reporter: 林佳宜 /10/25.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Very Fast containment of Scanning Worms Presenter: Yan Gao Authors: Nicholas Weaver Stuart Staniford Vern.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Fast Port Scan Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan.
“On Scalable Attack Detection in the Network” Ramana Rao Kompella, Sumeet Singh, and George Varghese Presented by Nadine Sundquist.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Bro: A System for Detecting Network Intruders in Real-Time Presented by Zachary Schneirov CS Professor Yan Chen.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Port Scanning.
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
Tracking Port Scanners on the IP Backbone Tao Ye Sprint Burlingame, CA Avinash Sridharan University of Southern California.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IIT Indore © Neminah Hubballi
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG Supervisor : AP. Dr. Mohamed Othman.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Advanced Anti-Virus Techniques
1 ECE 526 – Network Processing Systems Design System Implementation Principles I Varghese Chapter 3.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
Very Fast Containment of Scanning Worms Written By: Nicholas Weaver, Stuart Staniford, Vern Paxson Presentation By: Nathan Johnson A.K.A Space Monkey and.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network Security Lab Jelena Mirkovic Sig NewGrad presentantion.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
CompTIA Security+ Study Guide (SY0-401)
Internet Quarantine: Requirements for Containing Self-Propagating Code
Networking Devices.
Very Fast containment of Scanning Worms
Principles of Computer Security
Introduction to Networking
Configuring EtherChannels and Switch Troubleshooting
Firewalls.
Security in Networking
CompTIA Security+ Study Guide (SY0-401)
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Very Fast Containment of Scanning Worms
Data Mining & Machine Learning Lab
Jonathan Griffin Andy Norman Jamie Twycross Matthew Williamson
By: Dr. Visavnath, Lecturer Comp. Engg. Deptt.
Statistical based IDS background introduction
Introduction to Internet Worm
Presentation transcript:

Very Fast containment of Scanning Worms Presented by Vinay Makula

Introduction Computer Worms: malicious, self propagating programs Containment: limit a worm’s spread by isolating it in a small subsection of the network

Worm Containment Detecting infected machines and preventing them from contacting further hosts Implementation aspects: Breaking network into small pieces called cells Lowering false positives

Scanning Worms Operate by picking random addresses, attempting to infect them Linear scanning (Ex. Blaster) Fully random (Ex. Code Red) Bias toward local addresses (Ex. Code Red II & Nimda) Permutation scanning

Scanning Worms Properties: Most scanning attempts result in failure Infected machines will institute many connection attempts Containment: Seeks a class of behavior rather than specific worm signatures

Epidemic Threshold Worm-suppression device must necessarily allow some scanning before it triggers a response Worm may find a victim during that time

Epidemic Threshold The epidemic threshold depends on: The sensitivity of the containment response devices The density of vulnerable machines on the network The degree to which the worm is able to target its efforts into the correct network, and even into the current cell

Sustained Scanning Threshold If worm scans slower than sustained scanning threshold, the detector will not trigger In this implementation threshold set to 1 scan per minute.

Scan Suppression Respond to detected portscans by blocking future scanning attempts Two types of Portscans: Horizontal – search for identical service on large number of machines Vertical – examine an individual machine to discover running services

Threshold Random Walk (TRW) The algorithm operates by using an oracle to determine if a connection will fail or succeed A successfully completed connection will drive the random walk upwards A failure to connect drives the random walk downwards

Scan detection algorithm Advantages Suitable for both hardware and software implementation No changes in the false positive rate Disadvantages Increased false negative rate Worms can still evade detection

Hardware Implementation Constraints: Memory access speed During transmission of minimum-sized gigabit Ethernet packet, need to access a DRAM at 8 different locations or 4 accesses for full duplex Use SRAM to solve the problem but it is more expensive

Hardware Implementation Memory size SRAM currently only hold a few tens of megabytes DRAM can hold up to a gigabyte Try to keep memory size small (5MB) so that both are options

Approximate Cache The information we’d like to store can exceed the fixed volume of memory Hence use approximate cache: for which collisions cause imperfections Advantages: Keep the memory bounded Allow for very simple lookups

Attacking the Cache Predicting the hash Create collisions to evict or combine data to cause false positives or negatives Flooding the Cache Massive amounts of normal data to hide the true attack

Approximation of TRW Track connections and addresses using approximate caches Track success and failure of connection attempts to New address New address to old ports Old ports at old addresses Track addresses indefinitely

The Structure

The structure Connection Cache: It tracks whether the connection has been established in either direction Address Cache: It keeps tracks of detected addresses, and records in “count” the difference between number of failed and successful connections

Condition 1

Condition 2

Condition 3

Blocking and special cases If count is greater than a predefined threshold, it is blocked Only already existing connections are maintained Dropped unless session already exists TCP RST, RST+ACK, SYN+ACK, FIN, FIN+ACK

Evaluation A gigabit link connects 6000 hosts connected to the internet The link sustains Mbps and 8-15K packets/sec In a day: 20M external connection attempts 2M internally initiated connection attempts Main trace: Lasted 72 minutes 44M packets were generated of which, external hosts, and 131K internal addresses Captured using Tcpdump

Evaluation All outbound connections over a threshold of 5 were flagged by the algorithm

Evaluation Additional alerts on the outbound traffic generated when sensitivity was increased

Cooperation Every containment device knows how many blocks the other containment devices currently have Each device use the above information to adjust its response threshold

Cooperation Reduces Threshold by where θ controls how aggressively to reduce T and X is the number of other blocks in place

Attacking the Containment Attacker can create false positives Trigger responses which wouldn’t otherwise occur False positive create a DOS target Attacker can create false negatives to slip by the defenses

Inadvertent False positives Two types: Resulting from artifacts of the detection routines Resulting from benign scanning

Malicious False negatives Instead of the worm scanning, it propagates through different means: topological, passive etc. Worms can operate below scanning threshold to avoid detection Scan for liveliness of the port Obtaining multiple network addresses

Malicious False positives Attacker can spoof packets to frame other hosts in the same cell Spoofing can be prevented using MAC addresses Setup HTTP proxies and mail filtering to detect and block malicious content

Attacking the algorithm Exploit the approximate cache’s hash and permutation function Exploit the vulnerability of a two-sided evasion technique

Two-sided evasion Requires two computers, one on each side of the containment device, generating normal traffic on a multitude of ports A worm could use this evasion technique, making up for each failed attempt by creating a successful connection between cooperating machines

Related Work Network Security Monitor Snort Bro Leckie Forescout Mirage Networks

Future Work Implementing the system in hardware and deploying it Integrating the algorithm in into software based IDS Obtain complete enterprise-trace Developing optimal communication strategies

Conclusions Demonstrated a highly sensitive scan detection and suppression algorithm suitable for worm containment Able to detect scanning for fewer than 10 attempts for a highly sensitive machine and for a normal machine in 30 attempts Cooperation between containment devices provides an improved performance