CS-495 Advanced Networking Chi Yin Cheung, Spring 2005 The Top Speed of Flash Worms Introduction Design of Flash Worms UDP Flash Worms TCP Flash Worms.

Slides:



Advertisements
Similar presentations
TCP/IP MODEL Maninder Kaur
Advertisements

Introduction 2 1: Introduction.
The Internet Protocol.
Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Resilient Peer-to-Peer Streaming Paper by: Venkata N. Padmanabhan Helen J. Wang Philip A. Chou Discussion Leader: Manfred Georg Presented by: Christoph.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Internetworking Fundamentals (Lecture #1) Andres Rengifo Copyright 2008.
Paul Solomine Security of P2P Systems. P2P Systems Used to download copyrighted files illegally. The RIAA is watching you… Spyware! General users become.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Gursharan Singh Tatla Transport Layer 16-May
Network Topologies.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
CS An Overlay Routing Scheme For Moving Large Files Su Zhang Kai Xu.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Chapter 5 Transport layer With special emphasis on Transmission Control Protocol (TCP)
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
A Low-bandwidth Network File System Athicha Muthitacharoen et al. Presented by Matt Miller September 12, 2002.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Lec 17. 4/2/14 Anthony D. Joseph CS162 ©UCB Spring 2014 CS162 S ECTION 8.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
DoS/DDoS attack and defense
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Defending against Hitlist Worms using NASR Khanh Nguyen.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Process-to-Process Delivery:
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Lecture (2).
CHAPTER 3 Architectures for Distributed Systems
TCP Transport layer Er. Vikram Dhiman LPU.
Packet Sniffing.
Transport Layer Unit 5.
Precept 2: TCP Congestion Control Review
Chapter 23 Introduction To Transport Layer
A Distributed DoS in Action
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
IT351: Mobile & Wireless Computing
Lecture 4 Communication Network Protocols
CPEG514 Advanced Computer Networkst
Computer Networking A Top-Down Approach Featuring the Internet
Routing and the Network Layer (ref: Interconnections by Perlman
Computer Networks Protocols
Introduction to Internet Worm
NetWarden: Mitigating Network Covert Channels without Performance Loss
Presentation transcript:

CS-495 Advanced Networking Chi Yin Cheung, Spring 2005 The Top Speed of Flash Worms Introduction Design of Flash Worms UDP Flash Worms TCP Flash Worms Worm Resilience Avoiding Containment Defenses

CS-495 Advanced Networking Chi Yin Cheung, Spring 2005 Introduction Controlling 1 million hosts can cause enormous damage –DDoS Attack –Stealing and modifying data –Can be leveraged for cyber-warfare Worms can be used to gain such control in a very short period of time Is much more dangerous –why?

CS-495 Advanced Networking Remote Control Distributed control –Each worm knows about other worms *it* has infected –Analysis: High connectivity, Average degree= 4 –Without a single point of communication, updates can be passed Programatic Updates –Worms as “computing capsules” –Can send arbitrary code !

CS-495 Advanced Networking Random Scanning Not the most effective, but is easiest to implement Efficiency depends on the quality of random number generator Potential for repeats and invalid addresses

CS-495 Advanced Networking Permutation Scanning Random scanning inefficient  lot of overlap  All worms share a common pseudo – random permutation / use cipher + key to generate addresses. Worms start scanning after their point in permutation 32 bit block cipherkey Permutation scanning Index IP Address

CS-495 Advanced Networking Worm Scanning methods Hit List Scanning –“getting off the ground” very fast –Say first 10,000 hosts –Pre-select 10,000-50,000 vulnerable machines –First worm carries the entire hit list –Hit list split in half on each infection –Can establish itself in few seconds

CS-495 Advanced Networking Combining techniques Combination of hit-list scanning and permutation scanning produces “Warhol” worm Capable of attacking most vulerable targets in < 15mins Uses hit list to improve initial spread, then switches to permutation scanning to ensure high infection rate. Future worms will be faster and better (hence more dangerous) – introducing Flash worms

CS-495 Advanced Networking Flash Worms Fastest Method  Entire internet in 10s of seconds Obtain hit-list of vulnerable servers in advance 2 hours for entire IP space on OC-12 link (622 mbps) List would be big ( ~ 48 MB ) Divide into n blocks –Infect first of each block and hand over the block to the new worm –Repeat for each block Alternative: Store pre-assigned chunks on a high BW server Two limitations –Large list size –Latency Analysis: Sub-thirty limit on total infection time on a 256 kbps DSL link

CS-495 Advanced Networking Worm spread using a hit list For 3 million hosts, just 7 layers deep ( n = 10)

CS-495 Advanced Networking Design of Flash Worms Flash worm concepts derived from 2 prominent worms –Slammer worm (Jan 2003)– fastest scanning worm to date. Infects via UDP –Witty worm (2000) Authors uses information from these 2 worms to model their potential flash worm characteristics

CS-495 Advanced Networking Flash worms: what are they? Most effort are directed against random scanning worms: guess and attack Flash worms: precompiled list of vulnerable addresses to infect Flash worms interesting because: –Fastest possible worms –Spread map can be calculated offline, can be used to explore worse case performance of containment defenses

CS-495 Advanced Networking UDP Flash Worms Key issue in single packet flash worm design is the time between packets from a host is small compared to the time to cross the Internet Computation of average latency distribution in different regions motivates a shallow and broad infection tree Attacker should launch from a host with high data capacity and good connection to the Internet.

CS-495 Advanced Networking UDP Flash Worms The UDP worm will contain the address list to be infected after code Worm injector will copy a subset of the address list into each copy of worm before sending it out Given author assumptions about the worm and network conditions, the worm can infect 1 million hosts in less than 1 second. Worm will not be limited by congestion in network core (total bandwidth required by worm will only be O(10 Gbps) according to authors.

CS-495 Advanced Networking UDP Flash Worms

CS-495 Advanced Networking TCP Flash Worms TCP worms are larger and slower than UDP worms, but more services to exploit 2 Types of TCP worms –Small worms, where k (no of packets) < Window –Large worms, where k > W Packet loss will affect worm speed – esp large worms No direct guidance due to absence of “ack clocking” from TCP slow start, so might overflow buffers Solution: round robin through connection to avoid overflowing senders Author believes a TCP worm can be not much larger than Slammer

CS-495 Advanced Networking TCP Flash worms Small worms Window Small worm (smaller than window) Window Large worm (larger than window) Large worms Whilst large worms can make transmission faster by disregarding window size and send the whole worm (provided the receiver can receive fast enough), packet loss will degrade performance of worm because window will not move forward

CS-495 Advanced Networking TCP Flash Worms TCP worms are slower than UDP worms because of TCP latency But TCP worms are still fast, author simulation show 99% compromise after 3.3s

CS-495 Advanced Networking TCP Flash Worms

CS-495 Advanced Networking Worm Resilience Address list is imperfect –Why? Unreliable diagnostic, aging 2 Situations: –False negative –False positive False positives can hamper worm spread –Especially true for deep and narrow spread trees –Broad / shallow trees are more resilient –Binary spread trees are too fragile (what if a node close to source is invulnerable?)

CS-495 Advanced Networking Worm Resilience Making Flash worms resilient –Shallow spread tree Flash worms? Add acknowledgements – have infected nodes send back copy of worm to initial host –If no ack, substitute address Acks are not good for deep spread trees –Too slow / must gather acks effectively Solution: Double infection –Have each intermediate node infect one of its siblings as well

CS-495 Advanced Networking Worm Resilience To compute probability r that a given node ends up uninfected, the authors propose this equation Graphs are shown on the next page

CS-495 Advanced Networking Worm Resilience It is readily apparent that a shallow tree is less fragile than a deep, binary tree, where an invulnerable host can prune entire branches of the tree.

CS-495 Advanced Networking Worm Resilience

CS-495 Advanced Networking Worm Resilience K independent K-way trees –In K-way tree, non-leaf nodes use a fraction 1/K of the total nodes –K independent internal sets –Can start worms using such trees simultaneously to increase resilience Cost: increased code complexity Graphs show that they are more effective than the binary tree scheme (except the 2 way tree compared to doubling up infections)

CS-495 Advanced Networking Worm Resilience

CS-495 Advanced Networking Worm Resilience Note that the 2-2 way tree’s performance is worse than doubling up. This might be because it is less likely to get 2 invulnerable hosts at the same level than to get 2 invulnerable hosts (one one each tree) on each path to a host.

CS-495 Advanced Networking Multitree Approach Implications Multitree approach may not increase bandwidth required by worm, except for single packet UDP worm (increase bandwidth by factor of K) Multitree approachDoes not slow the worm – it might actually make it faster by offering the benefits of a shallower tree But may make worm easier to detect

CS-495 Advanced Networking Avoiding Containment Defenses Methods of avoiding containment –Slowing the worm –Reduce the degree K at each node –Add redundancy to route around defenses Flash worm using binary tree / low-K tree will avoid scan-detection algs (no of victims contacted below threshold for detection) Avoids dark-address detectors because addresses contacted will mostly be valid

CS-495 Advanced Networking Avoiding Containment Defenses 2 possible detectors: –EarlyBird detector –Honeyfarm detector EarlyBird searches for statistical anomalies in common content pattern freq Honeypot will detect worms by letting worm to propagate to it. But detection is not enough – it must respond to infection by stopping the spread –EarlyBird is too slow to stop worm –Honeypot cannot tell rest of network of worm fast enough

CS-495 Advanced Networking Implications One solution for Flash Worm writers –Ignore containment defenses –Make worm fast and reliable –Don’t avoid detection (by slowing worm etc) Consider systems with defense as resistant, counter using resilience mechanisms Best chance defender has is to hide list of vulnerable addresses from any potential attackers (ie no good solution)

CS-495 Advanced Networking Related work Study of fast worms that spread via IM clients Sizable buddy lists and short latency for sending messages 6-157s to saturate 500, 000 machines, based on author assumptions

CS-495 Advanced Networking Conclusions Flash worms can spread extremely quickly, provided that they have a good hit list UDP worms infects in < 1s TCP worms infects in a few seconds Shallow trees are resilient to list errors, but less resilient to containment defenses Deep trees are harder to contain, but is less resilient to list errors Deep trees can tolerate modest proportions of list errors and containment defenses

CS-495 Advanced Networking Exploiting P2P systems for infection Large set, all running same software Only single exploit now needed More favorable for infection: –Interconnect with large number of peers –Transfer large files –Not mainstream protocols –Execute on desktops, not servers Potentially immense size