Very Fast Containment of Scanning Worms

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

Nicholas Weaver Vern Paxson Stuart Staniford UC Berkeley ICIR
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Fast Worm Propagation In IPv6 Networks Malware Project Presentation Jing Yang
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Introduction to Security Computer Networks Computer Networks Term B10.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Very Fast containment of Scanning Worms Presenter: Yan Gao Authors: Nicholas Weaver Stuart Staniford Vern.
DFence: Transparent Network-based Denial of Service Mitigation CSC7221 Advanced Topics in Internet Technology Presented by To Siu Sang Eric ( )
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Fast Port Scan Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Propagation and Containment Presented by Jing Yang, Leonid Bolotnyy, and Anthony Wood.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Very Fast Containment of Scanning Worms Written By: Nicholas Weaver, Stuart Staniford, Vern Paxson Presentation By: Nathan Johnson A.K.A Space Monkey and.
Very Fast containment of Scanning Worms Presented by Vinay Makula.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
An Introduction To ARP Spoofing & Other Attacks
MALWARE.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Memory COMPUTER ARCHITECTURE
Outline Basics of network security Definitions Sample attacks
Very Fast containment of Scanning Worms
Chapter 4 Data Link Layer Switching
– Chapter 5 – Secure LAN Switching
Introduction to Networking
Configuring EtherChannels and Switch Troubleshooting
Cache Memory Presentation I
Firewalls.
Security in Networking
Defending Against DDoS
Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Brad Karp UCL Computer Science
Mapping Internet Sensors With Probe Response Attacks
Contents Memory types & memory hierarchy Virtual memory (VM)
Jonathan Griffin Andy Norman Jamie Twycross Matthew Williamson
Ch 17 - Binding Protocol Addresses
Introduction to Internet Worm
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Very Fast Containment of Scanning Worms By Nicholas Weaver Stuard Stainford Vern Paxson Presented by Yan Zhang

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Worms Definition: Damages: Malicious program that propagates copies of itself to other computers Damages: consuming bandwidth make network inaccessible, cost millions of dollars 12/30/2018 Coputer Sci & Engr, USC

How Can Worm Acquire Targets? Routing Worm BGP( Broader Gateway Protocol) information can tell which IP address blocks are allocated Pre-generated Hit List( Flash Worm) Hit list of vulnerable machines is sent with payload Topological Uses info on the infected host to find the next target Stealth / Passive Waits for a vulnerable system to contact it, no active scanning Scanning Virus 12/30/2018 Coputer Sci & Engr, USC

Scanning Worms Operate by picking random addresses, attempting to infect them Linear scanning (e.g. Blaster) Fully random (Code Red) Bias toward local addresses (Code Red II, Nimda) Permutation scanning 12/30/2018 Coputer Sci & Engr, USC

Scanning Worms Properties: Containment: Most scanning attempts result in failure Infected machines will institute many connection attempts Containment: Seeks a class of behavior instead of specific worm signatures 12/30/2018 Coputer Sci & Engr, USC

How to mitigate the spread of scanning worm? Prevention 􀂄Reduce size of vulnerable population 􀂄Single victim can infect millions of vulnerable hosts 􀂄Complete infection of local network from single original source Treatment 􀂄Once a host is infected, clean it up immediately 􀂄Using antivirus software, patches 􀂄Limitation: long time to develop cleanup code Containment 12/30/2018 Coputer Sci & Engr, USC

Worm Containment Purpose Most promising solution Reaction time 􀂄Protect individual networks, isolate infected hosts 􀂄e.g. firewalls, content filter, automated blacklists Most promising solution 􀂄Completely automated 􀂄No need participation of each host on the Internet Reaction time 􀂄Detection of malicious activity 􀂄Propagation of containment information 􀂄Activate any containment strategy 12/30/2018 Coputer Sci & Engr, USC

Containment Strategy Address Blacklist Content filtering 􀂄Maintain a list of IP addresses infected 􀂄Drop all packets from the addresses in the list 􀂄Pros: implement easily with existing filtering 􀂄Cons: update continuously to reflect newly infected Content filtering 􀂄Need a database of content signatures 􀂄Pros: a single update is sufficient 􀂄Cons: hard to automatically create signature 12/30/2018 Coputer Sci & Engr, USC

Containment Strategy Defense against scanning worms 􀂄Detect worms, block infected hosts 􀂄Based on worm behavior rather than signature 􀂄Capable to stop new worms Break the network into many cells 􀂄Must have very low false positive rate 􀂄Cause a DoS if false positive rate is high 􀂄Need to complete deployment within an enterprise 􀂄Integrate into network’s outer switches 12/30/2018 Coputer Sci & Engr, USC

Epidemic Threshold Epidemic Threshold 􀂄Worm-suppression device must necessarily allow some scanning before it triggers a response 􀂄Worm may find a victim during that time 􀂄Epidemic occurs if each infection results in a single child 􀂄Exponential epidemic occurs if results in more than one child 12/30/2018 Coputer Sci & Engr, USC

Epidemic threshold The epidemic threshold depends on 􀂄Sensitivity of containment response devices 􀂄Density of vulnerable host on the network 􀂄Degree to target, i.e. capability of worms 12/30/2018 Coputer Sci & Engr, USC

Sustained Scanning Threshold If a worm scans slower than this rate, the detector will not trigger Vital to achieve as low a sustained scanning threshold as possible Target a threshold of 1 scan per minute in this paper 12/30/2018 Coputer Sci & Engr, USC

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Scan Suppression Scan suppression 􀂄Portscans 􀂄Responding to detected portscans by blocking future scanning attempts 􀂄Portscans 􀂄Probe attempts to determine if a service is operating at a target IP address 􀂄Portscans have two basic types 􀂄Horizontal scans 􀂄search for identical service on large number of machines 􀂄Vertical scans 􀂄examine an individual machine to discover all running services 12/30/2018 Coputer Sci & Engr, USC

Scan Suppression Scan detection algorithm derived from Threshold Random Walk (TRW) 􀂄Sequential Hypothesis Testing (SHT) to determine if a connection will fail or succeed 􀂄Assume that benign traffic has a higher probability of success than attack traffic 􀂄TRW can make decision by likelihood Implementation easier than TRW 􀂄Suitable for both hardware and software implementation 􀂄Simplified algorithm caused increased false negative rate 􀂄No changes in the false positive rate 12/30/2018 Coputer Sci & Engr, USC

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Goal & Constraints Constraints Design goal 􀂄Memory access speed 􀂄Must be very fast to keep up with high packet rates 􀂄On full duplex Gb Ethernet, access DRAM 4 times per packet 􀂄Memory size 􀂄Attempt to keep footprint under 16 MB 􀂄The number of distinct memory banks 􀂄Algorithm complexity Design goal 􀂄Less than 16MB of total memory 􀂄2 uncached memory accesses per packet 􀂄Include within conventional NIDS, such as Bro or Snort 12/30/2018 Coputer Sci & Engr, USC

Mechanism Approximate caches Efficient small (32-bit)block ciphers 􀂄Collisions cause imperfections (Bloom filter) 􀂄Fixed memory available 􀂄Allow collisions to cause aliasing 􀂄Error on the side of false negative Efficient small (32-bit)block ciphers 􀂄Prevent attackers from controlling collisions 􀂄Permute the N-bit value 􀂄Separate the resulting N-bit value into an index and a tag 12/30/2018 Coputer Sci & Engr, USC

Approximate Scan Suppression 􀂄Track connections and addresses using approximation caches 􀂄Replace old addresses and ports if corresponding entry has timed out 􀂄Block when counts (misses –hits) > threshold 􀂄Track addresses indefinitely as long as no evict their states from our caches 􀂄Implement a “hygiene filter” to thwart some stealthy scanning techniques without causing undue restrictions on normal machines 12/30/2018 Coputer Sci & Engr, USC

Connection Cache Connection cache record if we have seen a packet in each direction 􀂄Aliasing turns failed connection attempt into success (biases to false negative) 􀂄Age is reset on each forwarded packet 􀂄Every minute, back ground process purges entries older than Dconn 12/30/2018 Coputer Sci & Engr, USC

Connection Cache 12/30/2018 Coputer Sci & Engr, USC

Address cache Address cache trace “outside” addresses 􀂄Encrypt them to create index and tag 􀂄Counter tracks differences between misses and hits 􀂄Counts are decayed every Dmiss seconds (60 sec) 􀂄Hard limit on negative counts (-20) 12/30/2018 Coputer Sci & Engr, USC

Algorithm 12/30/2018 Coputer Sci & Engr, USC

Algorithm We count every successful connection (in either direction) as a “hit”, All failed or possibly-failed connections as “misses”. If the difference between the number of hits and misses is greater than a threshold, we block further communication attempts from that address. Assume that legitimate traffic with success rate greater than 50%, while scanning traffic succeeds with a probability less than 50%. 12/30/2018 Coputer Sci & Engr, USC

Evaluation For 6000-host enterprise trace: 􀂄1MB connection cache, 4MB 4-way address cache, 5MB total 􀂄At most 4 memory accesses per packet 􀂄Operated at gigabit line-speed 􀂄Detects scanning at rates over 1 per minute 􀂄Low false positive rate 􀂄on DNS and SMTP servers due to fan-out 􀂄need to be white-listed 􀂄About 20% false negative rate 􀂄Detects scanning after 10-30 attempts 12/30/2018 Coputer Sci & Engr, USC

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Cooperation Divide enterprise into small cells 􀂄Connect all cells via low-latency channel efficiently 􀂄Cooperate to reduce thresholds during an attack 􀂄A cell’s detector notifies others when it blocks an address (“kill message”) Blocking threshold dynamically adapts to number of blocks (X) in enterprise: 􀂄T’= T(1 –θ)X, for very small θ 􀂄Control how to reduce threshold as a worm spread 12/30/2018 Coputer Sci & Engr, USC

Cooperation Efficiency 12/30/2018 Coputer Sci & Engr, USC

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Attack False positives False negatives 􀂄Forge packet, spoofing outside address 􀂄False positive create a DoS target False negatives 􀂄Use a non-scanning technique (topological, meta-server, passive, and hit-list) 􀂄Scan under detection threshold(1 scan/min) 􀂄Use a white-listed port to test for liveness before scanning 􀂄Offset misses by making valid connections 12/30/2018 Coputer Sci & Engr, USC

Attack on Containment Attacking Cooperation 􀂄Attempt to outrace containment if threshold is permissive 􀂄Flood cooperation channels 􀂄Cooperative collapse 􀂄False positives cause lowered thresholds 􀂄Lowered thresholds cause more false positives 􀂄Feedback causes collapse of network 12/30/2018 Coputer Sci & Engr, USC

Attack on Containment Detecting containment Circumventing containment 􀂄Try to contact already infected hosts 􀂄Go stealthy if containment is detected Circumventing containment 􀂄Embed scan in storm of spoofed packets 􀂄Two-sided evasion 􀂄Inside and outside host initiate normal connections to counter penalty of scanning 􀂄Can modify algorithm to prevent, but lose vertical scan detection 12/30/2018 Coputer Sci & Engr, USC

Outline Introduction Scan Suppression Implementation Cooperation Attack on Containment Conclusion 12/30/2018 Coputer Sci & Engr, USC

Conclusion Develop containment algorithms suitable for deployment in high-speed, low-cost network hardware Devise the mechanisms for cooperation that enable multiple containment devices to more effectively detect and respond to an emerging infection 12/30/2018 Coputer Sci & Engr, USC

Thank you. Comments? 12/30/2018 Coputer Sci & Engr, USC