Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Worms – Code Red BD 480 This presentation is an amalgam of presentations by David Moore, Randy Marchany and Ed Skoudis. I have edited and added material.
By Hiranmayi Pai Neeraj Jain
Introduction to Security Computer Networks Computer Networks Term B10.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Internet Quarantine: Requirements for Containing Self- Propagating Code David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage.
CS-495 Advanced Networking J. Scott Miller, Spring 2005 Against Internet Intrusions (paper)
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Inferring Internet Denial-of- Service Activity David Moore, Geoffrey M Voelker, Stefan Savage Presented by Yuemin Yu – CS290F – Winter 2005.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
A Study of Mass- mailing Worms By Cynthia Wong, Stan Bielski, Jonathan M. McCune, and Chenxi Wang, Carnegie Mellon University, 2004 Presented by Allen.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Honeypot and Intrusion Detection System
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
Final Introduction ---- Web Security, DDoS, others
--Harish Reddy Vemula Distributed Denial of Service.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Security at NCAR David Mitchell February 20th, 2007.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
DoS/DDoS attack and defense
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Defending against Hitlist Worms using NASR Khanh Nguyen.
Role Of Network IDS in Network Perimeter Defense.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
By: Austen Perelman-Hall COSC 101 Presentation.  What is a worm? What is a virus?  What is the Red Worm?  Where did it come from? Causes  Effects.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Information Security Session October 24, 2005
Internet Worm propagation
A Distributed DoS in Action
Firewalls Jiang Long Spring 2002.
Brad Karp UCL Computer Science
Lecture 3: Secure Network Architecture
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim

Contents Introduction Objectives Background Worm trace collection methodology Analyzed results Animation of Code-RedⅠ v2 Summary and conclusion

Introduction Virus vs. Worm Some Worms -Virus : -Worm : 1. do not try to break into machines 2. spread by user’s action 3. attach themselves onto other program -Worm : 1. try to break into machines using some vulnerability 2. spread on their own without user action 3. exist as a separate code in memory Some Worms - Morris in Nov 3, 1988 - Lion in Mar, 2001 - WANK in Oct, 1989 - Code-Red in Jul, 2001 - Ramen in Jan, 2001

Objectives Collect packet information generated by Code-Red (How to collect this information and identify Code-Red?) Analyze the spread of Code-Red Trace geographic location and top-level domains in which Code-Red resides.

Background The Chronology of Code-Red outbreak 1. On Jun 18, 2001, eEye released information about a buffer- overflow vulnerability in Microsoft’s IIS web servers. 2. On Jun 26, 2001, Microsoft released a patch for the vulnerability 3. On Jul 12, 2001, Code-RedⅠv1 spread by exploiting the above vulnerability 4. On Jul 19, 2001, Code-RedⅠv2 spread 5. On Aug 4, 2001, Code-RedⅡ spread * Cost of recovering from Code-Red : 2.6 billion dollars

… 1. Code-RedⅠv1 : Characteristics of Code-Red - Use a static seed, so it generated the same list of IP addresses - Between 1st and 19th of every month, it attempts to infect machines. (Infection phase) - Between 20th and 28th, it stops infecting machines and does a DoS attack against www1.whitehouse.gov (attack phase) - Between 29th and the last day, it does nothing. (dormant phase) * scanning mechanism … 3 2 1

… 1. Code-RedⅠv1 : Characteristics of Code-Red - Use a static seed, so it generated the same list of IP addresses - Between 1st and 19th of every month, it attempts to infect machines. (Infection phase) - Between 20th and 28th, it stops infecting machines and does a DoS attack against www1.whitehouse.gov (attack phase) - Between 29th and the last day, it does nothing. (dormant phase) * scanning mechanism … 3 1 2

… 1. Code-RedⅠv1 : Characteristics of Code-Red - Use a static seed, so it generated the same list of IP addresses - Between 1st and 19th of every month, it attempts to infect machines. (Infection phase) - Between 20th and 28th, it stops infecting machines and does a DoS attack against www1.whitehouse.gov (attack phase) - Between 29th and the last day, it does nothing. (dormant phase) * scanning mechanism … 2 3 1 Therefore, the spread is slow

- Identical to Code-RedⅠv1 except that it uses a random seed, so it generates a different list of IP addresses * scanning mechanism 1 5 2 1 4 2 3 3 1 3 2 Therefore, the spread is much faster than Code-RedⅠv1 Intuitively, the rate of infection will be exponential

- set up backdoor ( more dangerous than Code-RedⅠ) - become dormant for a day to avoid being discovered by system administrator (slow infection mechanism) - after rebooting the machine, it begins to spread * scanning mechanism Let’s assume that the infected host IP address is 10.9.8.7 10.0.0.0 Relative amount of probes 10.9.0.0 1/8 10.9.8.7 3/8 X.X.X.X 10.X.X.X 1/2 10.9.X.X Idea : Hosts within the network of an infected host may run the same vulnerable software

Worm trace collection Methodology Three sources used to collect the worm packets - Passive network monitors within /8 network and /16 network - Backup data set from filtering router Worm identification If a host sends at least two TCP SYN packets on port 80 to two different hosts within research network, the host is considered to be infected. Research network /8 network Monitor Filtering router /16 network An infected host trying to probe hosts Monitor

Analyzed result Outbreak of Code-RedⅠ v1 Normal activity of TCP SYN Packets on port 80 Infected hosts by Code-RedⅠv1 - Each Infected host probed the same set of 23 IP addresses into the research network because Code-RedⅠv1 used a static seed

Outbreak of the Code-RedⅠ v2 (infection rate) Cumulative total of unique IP addresses One minute infection rates Detected unique IP addresses ≈ 359,000 Peak infection rate ≈ 2000 hosts /minute

Outbreak of the Code-RedⅠ v2 (deactivation rate) Some infected hosts were patched Infection phase attack phase Cumulative total of deactivated hosts One minute deactivation rate The author’s methodology of identifying worms were not able to distinguish hosts infected with Code-RedⅡ from those Infected with Code-RedⅠv2 because two scanning mechanisms used by Code-RedⅠ v2 and Code-RedⅡ are a little similar (i.e. they use random seed)

Geographic location of Code-Red Ⅰ v2 They made this table by using IxMapping service which is useful to find location of certain host based on its IP address

Top-Level domains in which Code-Red Ⅰ v2 resides They made this table by using NetSizer service

Top 10 domains (ISPs) in which Code-Red Ⅰ v2 resides It shows that machines operated by home users and small businesses are the majority of infected hosts.

Animation Code-RedⅠ v2 Animation of Code-RedⅠv2

Summary and Conclusion This paper shows how to extract various useful information from only logged IP header data (traffic analysis) DHCP inflates the number of infected hosts as measured by IP addresses, whereas NAT deflates the number of compromised IP address. We should consider those two factors in estimating the spread of Internet worms From the worm viewpoint, scanning mechanism is the key to spread fast, while from the defense viewpoint, ISP level solution should be achieved to mitigate Internet worms

… Autonomous System Monitor Infected host Messages are protected Router Worm scanner Worm packets … Hardware compiler Network segment