The Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory December 2, 2004.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
By Hiranmayi Pai Neeraj Jain
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Automated Worm Fingerprinting [Singh, Estan et al] Internet Quarantine: Requirements for Self- Propagating Code [Moore, Shannon et al] David W. Hill CSCI.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
University of WashingtonComputing & Communications Recent Computer Security Incidents Terry Gray Director, Networks & Distributed Computing 03 October.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Measuring Adversaries Vern Paxson International Computer Science Institute / Lawrence Berkeley National Laboratory June 15, 2004.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Addressing The Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory April 14,
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
A Study of Mass- mailing Worms By Cynthia Wong, Stan Bielski, Jonathan M. McCune, and Chenxi Wang, Carnegie Mellon University, 2004 Presented by Allen.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Addressing the Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory February.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons.
Honeypot and Intrusion Detection System
BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES By: Eric Chien and Peter Szor Presented by: Jesus Morales.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
Final Introduction ---- Web Security, DDoS, others
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
A Taxonomy of Computer Worms Nicholas Weaver, Vern Paxson, Stuart Staniford, and Robert Cunningham ACM WORM 2003 Speaker: Chang Huan Wu 2008/8/8.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
W elcome to our Presentation. Presentation Topic Virus.
How to 0wn the Internet In Your Spare Time Authors Stuart Staniford, Vern Paxson, Nicholas Weaver Published Proceedings of the 11th USENIX Security Symposium.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Internet Quarantine: Requirements for Containing Self-Propagating Code
A Distributed DoS in Action
Experiences With Internet Traffic Measurement and Analysis
Brad Karp UCL Computer Science
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
Jonathan Griffin Andy Norman Jamie Twycross Matthew Williamson
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

The Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory December 2, 2004

What is a Worm? Self-replicating/self-propagating code. Spreads across a network by exploiting flaws in open services. –As opposed to viruses, which require user action to quicken/spread. Not new --- Morris Worm, Nov –6-10% of all Internet hosts infected Many more since, but none on that scale …. until ….

Code Red Initial version released July 13, Exploited known bug in Microsoft IIS Web servers. 1 st through 20 th of each month: spread. 20 th through end of each month: attack. Payload: web site defacement. Spread: via random scanning of 32-bit IP address space. But: failure to seed random number generator  linear growth.

Code Red, con’t Revision released July 19, Payload: flooding attack on Bug lead to it dying for date ≥ 20 th of the month. But: this time random number generator correctly seeded. Bingo!

Measuring Internet-Scale Activity: Network Telescopes Idea: monitor a cross-section of Internet address space to measure network traffic involving wide range of addresses –“Backscatter” from DOS floods –Attackers probing blindly –Random scanning from worms LBNL’s cross-section: 1/32,768 of Internet –Small enough for appreciable telescope lag UCSD, UWisc’s cross-section: 1/256.

Spread of Code Red Network telescopes give lower bound on # infected hosts: 360K. (Beware DHCP & NAT) Course of infection fits classic logistic. Note: larger the vulnerable population, faster the worm spreads. That night (  20 th ), worm dies … … except for hosts with inaccurate clocks! It just takes one of these to restart the worm on August 1 st …

Striving for Greater Virulence: Code Red 2 Released August 4, Comment in code: “Code Red 2.” But in fact completely different code base. Payload: a root backdoor, resilient to reboots. Bug: crashes NT, only works on Windows Localized scanning: prefers nearby addresses. Kills Code Red I. Safety valve: programmed to die Oct 1, 2001.

Striving for Greater Virulence: Nimda Released September 18, Multi-mode spreading: –attack IIS servers via infected clients – itself to address book as a virus –copy itself across open network shares –modifying Web pages on infected servers w/ client exploit –scanning for Code Red II backdoors (!)  worms form an ecosystem! Leaped across firewalls.

Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks

Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back!, still exhibiting monthly pattern

Life Just Before Slammer

Life Just After Slammer

A Lesson in Economy Slammer exploits a connectionless UDP service, rather than connection-oriented TCP. Entire worm fits in a single packet!  When scanning, worm can “fire and forget”. Worm infects 75,000+ hosts in 10 minutes (despite broken random number generator). Progress limited by the Internet’s carrying capacity!

The Usual Logistic Growth

Slammer’s Bandwidth-Limited Growth

Blaster Released August 11, Exploits flaw in RPC service ubiquitous across Windows. Payload: attack Microsoft Windows Update. Despite flawed scanning and secondary infection strategy, rapidly propagates to (at least) 100K’s of hosts. Actually, bulk of infections are really Nachia, a Blaster counter-worm. Key paradigm shift: firewalls don’t help.

80% of Code Red 2 cleaned up due to onset of Blaster Code Red 2 re- released with Oct die-off Code Red 1 and Nimda endemic Code Red 2 re-re- released Jan 2004 Code Red 2 dies off again

What if Spreading Were Well-Designed? Observation (Weaver): Much of a worm’s scanning is redundant. Idea: coordinated scanning –Construct permutation of address space –Each new worm starts at a random point –Worm instance that “encounters” another instance re-randomizes.  Greatly accelerates worm in later stages.

What if Spreading Were Well-Designed?, con’t Observation (Weaver): Accelerate initial phase using a precomputed hit-list of say 1% vulnerable hosts.  At 100 scans/worm/sec, can infect huge population in a few minutes. Observation (Staniford): Compute hit-list of entire vulnerable population, propagate via divide & conquer.  With careful design, 10 6 hosts in < 2 sec!

Defenses Detect via honeyfarms: collections of “honeypots” fed by a network telescope. –Any outbound connection from honeyfarm = worm. –Distill signature from inbound/outbound traffic. –If telescope covers N addresses, expect detection when worm has infected 1/N of population. –Major issues regarding filtering Thwart via scan suppressors: network elements that block traffic from hosts that make failed connection attempts to too many other hosts. No “white worms”, please.

Defenses? Observation: worms don’t need to randomly scan Meta-server worm: ask server for hosts to infect (e.g., Google for “ powered by phpbb ” Topological worm: fuel the spread with local information from infected hosts (web server logs, address books, config files, SSH “known hosts”)  No scanning signature; with rich inter- connection topology, potentially very fast.

Defenses?? Contagion worm: propagate parasitically along with normally initiated communication. E.g., using 2 exploits - Web browser & Web server - infect any vulnerable servers visited by browser, then any vulnerable browsers that come to those servers. E.g., using 1 BitTorrent exploit, glide along immense peer-to-peer network in days/hours.  No unusual connection activity at all! :-(

Thoughts on Worm Technology Today, random-scanning worms are highly-effective. Today, firewalls are ineffective at preventing worms. (c.f. Stanford’s 6,000+ Blaster infections) Today, we’ve been lucky regarding payloads.

Near-Term Responses Today’s cleanup pain + today’s firewall traversal  deployment of scan suppressors within enterprises, ISPs Provides some protection against external (scanning) worms Provides good protection against internal (scanning) worms

Incidental Damage … Today Today’s worms have significant real- world impact: –Code Red disrupted routing –Slammer disrupted elections, ATMs, airline schedules, operations at an off-line nuclear power plant … –Blaster possibly contributed to Great Blackout of Aug … ? But today’s worms are amateurish –Unimaginative payloads

Where are the Nastier Worms?? Botched propagation the norm Doesn’t anyone read the literature? e.g. permutation scanning, flash worms, metaserver worms, topological, contagion Botched payloads the norm e.g. DDOS fizzles  Current worm authors are in it for kicks … (… or testing) No arms race.

Next-Generation Worm Authors Military. Crooks: –Denial-of-service, spamming for hire –Access for Sale: A New Class of Worm (Schecter/Smith, ACM CCS WORM 2003) Money on the table  Arms race

“Better” Payloads Wiping a disk costs $550/$2550 * “A well-designed version of Blaster could have infected 10M machines.” (8M+ for sure!) The same service exploited by Blaster has other vulnerabilities … Potentially a lot more $$$: flashing BIOS, corrupting databases, spreadsheets … Lower-bound estimate: $50B if well-designed

Attacks on Passive Monitoring Exploits for bugs in passive analyzers! Suppose protocol analyzer has an error parsing unusual type of packet –E.g., tcpdump and malformed options Adversary crafts such a packet, overruns buffer, causes analyzer to execute arbitrary code

Witty Released March 19, Single UDP packet exploits flaw in the passive analysis of Internet Security Systems products. Flaw had been announced the previous day. “Bandwidth-limited” UDP worm ala’ Slammer. Initial spread seeded via a hit-list. Vulnerable pop. (12K) attained in 45 minutes. Payload: slowly corrupt random disk blocks. Written by a Pro.

How Will Defenses Evolve? Wide-area automated coordination/decision- making/trust very hard More sophisticated spreading paradigms will require: –Rich application analysis coupled with –Well-developed anomaly detection

What do we need? Hardening of end hosts Traces of both worms and esp. background Topologies, both network and application Funding that isn’t classified Good, basic thinking: –This area is still young and there is a lot of low- hanging fruit / clever insight awaiting …

But At Least Us Researchers are Having Fun … Very challenging research problems –Immense scale –Coordination across disparate parties –Application anomaly detection –Automated response Whole new sub-area –What seems hopeless today … … can suddenly yield prospects tomorrow. –And vice versa: tomorrow can be much more bleak than today!