The Evolving Threat of Internet Worms Jose Nazario, Arbor Networks.

Slides:



Advertisements
Similar presentations
Defense and Detection Strategies Against Internet Worms Usman Sarwar Network Research Group, University Science Malaysia.
Advertisements

Expose the Vulnerability Paul Hogan Ward Solutions.
Network Security Essentials Chapter 11
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Security Firewall Firewall design principle. Firewall Characteristics.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Network Security Testing Techniques Presented By:- Sachin Vador.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Web server security Dr Jim Briggs WEBP security1.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
EDUCAUSE Security 2006 Internet John Brown University.
Website Hardening HUIT IT Security | Sep
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 4 Finding Network Vulnerabilities By Whitman, Mattord, & Austin© 2008 Course Technology.
Honeypot and Intrusion Detection System
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Security at NCAR David Mitchell February 20th, 2007.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MIS Week 6 Site:
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Network Perimeter Defense Josef Pojsl, Martin Macháček, Trusted Network Solutions, Inc.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Blackhat 2001 Las Vegas, Nazario, “The Future of Internet Worms” The Future of Internet Worms Jose Nazario Crimelabs Research.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
Internet Quarantine: Requirements for Containing Self-Propagating Code
Presentation by: Naga Sri Charan Pendyala
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Instructor Materials Chapter 7 Network Security
EN Lecture Notes Spring 2016
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Intro to Ethical Hacking
Intro to Ethical Hacking
Network hardening Chapter 14.
Introduction to Internet Worm
Presentation transcript:

The Evolving Threat of Internet Worms Jose Nazario, Arbor Networks

Why Worm Based Intrusions Relative ease —“Write once, run everywhere” promise can come true Penetration —Right past firewalls via laptops, find the weakest link Persistence —Worms keep working so you don’t have to Coverage —Attack everything eventually

Why Worms are Successful  Missing patches  Rogue access  Missing access control

Evolution of Worm Threats Previously, worms were simple clones Worms have become more complicated systems —Multi-vector Grow your potential target base —DDoS tool propagation Utilize the army of machines —Dynamic Thwart static detection mechanisms —Counterworms Fight back with the same strategy

Multi-vector Worms Goal is to thwart simple defenses and infect more machines Code Red vs. Nimda (2001) —Code Red: one attack vector (IIS) —Nimda: multiple attack vectors (IIS, mail, IE, open shares) Sircam (2001) —Mass mailer, also spread via open shares Blaster (2003) —MS-RPC or WebDAV attacks

DDoS Tool Propagation Use the worm to attack an adversary Code Red (2001) —SYN flood against a static IP Blaster (2003) —SYN flood against a static domain —Variants carried a DDoS toolkit Sapphire, Welchia (2003) —The worm’s spread is a DDoS

Dynamic Worm Appearances Try and develop a worm with longevity by evading defenses Hybris (2000) —Used alt.comp.virus to spread code updates Lirva (2003) —Attempted to download new packages from website Sobig (2003) —Contacted website for next set of instructions

Counterworms Fight the worm with a fast, scalable attack Code Green (2001) —Anti-Code Red worm Cheese (2001) —Anti-L1on worm Welchia (2003) —Anti-Blaster worm Cause more traffic and problems than they attempt to solve

Worm Authors Are Learning It’s growing easier to build worms —Recycle an exploit, automation code, build, launch Use flexible targeting for DoS attacks No need to target multiple platforms —One platform works well enough Multiple infection vectors lead to longevity —Nimda still present two years later Local bias effective at enterprise penetration —Worms will be carried into the enterprise —Laptops, VPN connections

Vectors of Control

Current Visibility Control Classic firewall strategy for the Internet —Minimally protect the DMZ —Maximally protect the internal network DMZ for exposed services —Control data flow between trusted, untrusted networks Hardened wall against internal, external networks

Classic Vulnerability Control Minimized setups on system rollouts —Construct an image with minimal software Patch maintenance —Worms typically attack known holes Aggressive known vulnerability inventorying —Regular system inventories, comparisons against vulnerability databases (e.g. CVE)

Controlling Infectability Hardened systems —OS level changes Non-executable stack Permissions for any subsystem Hardened applications —Application configurations Strengthened configurations —Services and privileges for any system

Going Beyond the Firewall Traditional firewall configuration methods —Decide policy, install filters —Adjust by reading logs, tweak as needed —Broken applications or upset users Informed firewall configurations —Measure traffic, infer usage —Determine policy, install policy Assisted by Peakflow X

Intelligent Risk Assessment Traditional vulnerability scanners —Scan for a service, list machines offering that service —Banner grab, report service type, report potential vulnerabilities Usage, policy-aware vulnerability scanners —Scan for services, compare against usage and policy, report differences —Performed by Peakflow X

Combating Worms Minimize visibility —Tune access filters to a minimal set —Externally reachable —Internally used Minimize vulnerability —Track used services —Identify, remove unused services —Couple to strong patch management

Detecting Worms Challenge —In the face of dynamic behaviors, reliably detect the presence of a worm Solution —Every worm attempts to spread from host to host —Specific forms of traffic will increase —Not every host will have sent this traffic before Example: web server becoming a web client Therefore —Detect the cascading change in host behaviors

Data Gathering for Worm Detection Blackhole networks —No background traffic —Collect attempts from worm trying random hosts Live enterprise networks —Traffic and relationship modeling Live backbone networks —Interface and topology statistics —Traffic modeling and analysis

Principles of Correlation Analysis Two types of correlations to qualify events —Auto-correlation Frequency and sources for any single type of anomaly Example: scan frequencies —Cross-correlation Frequency and sources of related anomalies Example: scans followed by traffic increases During worm outbreaks, these frequencies will increase from a growing number of hosts

Worm Detection by Peakflow X Uses correlation analysis —Partially based on an expert system —Extendable by the user via a filter language Produces a detailed report —Pattern of the worm’s behavior —Hosts matching this pattern Dynamically grows —Amount of traffic caused by the worm Couple to flow log for additional forensics

Safe Quarantine Interactions  Control plane interactions  Specific filters  Preserve legitimate service

Conclusions Worm authors are getting smarter —Worms are getting easier to write, more effective Worm detection mechanisms are getting more sophisticated and robust IDS and firewall mechanisms are advancing to develop worm defense techniques