Stopping Worm/Virus Attacks Chiu Wah So (Kelvin).

Slides:



Advertisements
Similar presentations
Nicholas Weaver Vern Paxson Stuart Staniford UC Berkeley ICIR
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
CISCO NETWORKING ACADEMY Chabot College ELEC Address Resolution Protocol.
FIREWALLS Chapter 11.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
Ken Birman. Virtualization as a Defense We know that our systems are under attack by all sorts of threats Can we use virtual machines as a defensive tool?
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Security Awareness: Applying Practical Security in Your World
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Vigilante and Potemkin Presenter: Ýmir Vigfússon Based in part on slide sets from Mahesh Balakrishnan and Raghavan Srinivasan.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
Vigilante: End-to-End Containment of Internet Worms M. Costa et al. (MSR) SOSP 2005 Shimin Chen LBA Reading Group.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Host Intrusion Prevention Systems & Beyond
Lecture 11 Intrusion Detection (cont)
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm Authors: Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex.
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Presenter: Martin Krogel.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Introduction to Honeypot, Botnet, and Security Measurement
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
SOS: Secure Overlay Services A.Keromytis, V. Misra, and D. Rubenstein Presented by Tsirbas Rafail.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Introduction to Honeypot, measurement, and vulnerability exploits
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex C. Snoeren,
Full and Para Virtualization
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft,
Introduction to Internet Worm
Presentation transcript:

Stopping Worm/Virus Attacks Chiu Wah So (Kelvin)

Worms Replicate worms over a computer network Perform malicious action Grow Exponentially – Double in a few seconds to hours

Two Papers on stopping worms Potemkin Virtual Honeyfarm: – Scalability, fidelity, and containment in worm detection using honeypots. Vigilante: – End-to-end worm containment strategy, which includes worm detection, alert propagation, and local response.

Background on HoneyPot Definition: – An information system resource whose value lies in unauthorized or illicit use of that resource Carefully monitored and frequently left unprotected to detect and analyze intrusions Analyzed intrusions for – Antivirus/worm signatures – Disinfection algorithm – Criminal investigation and persecution

Low-interaction honeypots Minimal interactions with the attackers (at most network layer interaction) – Passively monitors inbound packets – Simply transmits a SYN/ACK sequence to TCP SYN Advantage: high scalability - up to millions Disadvantage: low fidelity (Doesn’t execute the kernel or application code)

High-interaction honeypots Execution environment identical or similar to a real host Advantage: high fidelity Disadvantage: low scalability (each system monitors one IP address) Can use VM to multiplex such that each machine can monitor more IP addresses

Containment Strategies Prevent compromised honeypots from attacking other machines Disallow outbound messages – Problems with “phone home” to receive updates Forward outbound packets sent in response to inbound packets – Problems with DNS query Result low fidelity (impossible to understand the native behavior of a malware)

Goal of Potemkin Virtual Honeyfarm To implement scalable high-interactive honeypots with – High fidelity – running common operating system and application software – High scalability – High containment

Observations High-interactive honeypots Most of a honeypot’s processor cycles are wasted idling (given IP address is rarely accessed) Most of a honeypot’s memory is idle Different honeypot servers in a honeyfarm replicate the same environment, and duplicate the effort.

Main Ideas Use gateway router – Dynamically bind IP addresses to physical servers, – Containment policies. Use Virtual Machine Monitor (Xen) create lightweight virtual machines – Flash cloning (create VM from reference image) – Delta virtualization (copy-on-write)

Architecture

Gateway Router Direct inbound traffic to individual honeyfarm servers Manage the containment of outbound traffic Implement long-term resource management Interface with detection, analysis and user- interface components

Gateway Router: Inbound traffic Attracts traffic: routing (BGP) and tunneling Sends IP packets for which there is no active VM to a non-overloaded honeyfarm server – Type map: illusion that a given IP address hosts a particular software configuration Assigns to the same VM if the same IP Scan filter: reduces inbound traffic

Gateway Router: Outbound traffic Containment Policies implemented on the gateway – Track communication patterns – Proxy standard outbound service Internal Reflection – redirect the unsafe outbound packet back into honeyfarm – Avoid resource starvation – Avoid cross-containment

Cross Containment (1) Yellow = contaminated by worm Wx Blue = contaminated by worm Wy

Cross Containment (2) Yellow = contaminated by worm Wx Blue = contaminated by worm Wy Green = contaminated by worm Wx and Wy

Cross Containment (3) Green = contaminated by worm Wx and Wy

Solution for Cross Containment Each packet is extended with a universe identifier (src, dest, src port) that identifies a unique virtual IP address space New universe identifier is created for each transaction Packets can only forward to hosts within the same universe

Gateway Router: Resource Allocation Reclaim uncompromised VM if it is not receiving inbound traffic Allow compromised VM to persist for further analysis When resource is low, prioritize VM

Virtual Machine Monitor Active IP addresses are an order of magnitude smaller Each server only uses small subset of hardware Therefore, VMs are created on request to multiplex a lot of machines One VM per IP address per universe

VMM: Flash Cloning Reduces speed to instantiate a new clone

VMM: Delta Virtualization Reduces memory overhead Shares VM pages and supports copy-on- write operation

Evaluation: Question to address How many honeypot VMs are necessary? How many VMs can a machine spawn? How many connections can a gateway support?

Multiplexing Address Space /16 network VM aggressively recycled after 500 ms Average number of active VMs = 58 Peak = 13614

Multiplexing Honeyfarm Servers

Statistics Delta Virtualization: 128MB for 116 clones Flash Cloning: 521.2ms to clone and 315.5ms to tear down CPU usage < 0.01% for HTTP request Gateway traffic: 160,000 packets / sec (hitting flow cache), 28,000 packets /sec (random traffic) Gateway Memory: 256 bytes per flow

Limitations Attracting Attacks – Tends to only receive traffic from randomly targeted attacks Honeypot Detection – Detects honeypot and evades honeypot Denial-of-Service attack

Next Paper: Vigilante What do we do after we detect a worm? – Generate worm signatures by human. Too slow? Usually generating worm signatures by human takes days to weeks. – And worm doubles in seconds to hours. Therefore, we need an end to end worm containment solution.

Vigilante An automatic end to end worm containment with negligible false positive rate – Detection – Propagation – Response

Current Worm Containment Strategies Network level approach (doesn’t have enough information, and has false positives) Host-based detection (not end-to-end solution) Host-based architecture (uses heuristic to correct the vulnerable service)

Vigilante architecture Use honeypot for worm detection, and generate self-certifying alert Propagate alert on overlay network Install filter in local host

Self-certifying alert Remove the trust between hosts Prove the existence of a vulnerability Can be verified inexpensively Automatically generate, verify, and distribute SCAs.

Alerts types Arbitrary Execution Control: contains the address of a code to execute Arbitrary Code Execution: contains the code to execute Arbitrary Function: contains the value of argument of critical functions Format: id of the vulnerable service, id of the alert type, verification information, and the messages

Worm detection Use Honeypots Two different worm detections engines: 1. Non-executable pages Non-execute protection on stack and heap to prevent code injection attack 2. Dynamic dataflow analysis Data received from the network is dirty, and propagate the dirty bit whenever data is moved

Alert generation Log all the network messages for some threshold time When worm is detected, use all the network messages in the log to generate candidate SCAs. Run verification procedure for each candidate. If verification succeeds, generate SCA.

Alert Verification Verification is run in sandbox, virtual machine. Service is instrumented according to alert type with the verified function.

Properties of SCA Verification Fast – Overhead of virtual machine is small Simple and generic No false positives Some drawbacks – Doesn’t describe the scheduling order for the threads

Alert Distribution Distribution must be fast, secure and reliable Use of secure Pastry overlay to broadcast To avoid DOS: – Don’t forward already seen or blocked SCAs – Only forward verifiable SCAs – Limit rate of SCAs received on each neighbors Use super-peers: they only have overlay code and VMs with vulnerability services for verification

Filter generation Use dataflow and control flow analysis to generate filter Use two filters: general filters and specific filters to reduce false negatives

Evaluation Three real worms – Slammer: 75,000 MS SQL Servers infected, 8.5 seconds to double – CodeRed: 360,000 MS IIS Servers infected, 37 mins to double – Blaster: 500,000 MS Windows infected, rate of growth similar to CodeRed

Alert generationand verification

Alert Distribution

Filter generation and CPU overhead

End-to-end experiments 5 host vigilante networks One detector, three super-peers for SCA distribution overlay, and one vulnerable host Results – Slammers: 79ms – Blaster: 305ms – CodeRed: 3044ms

Conclusion Is it possible to incorporate Potemkin Virtual Honeyfarm into the worm detection of Vigilante to make it a more scalable solution? Different aspects of worm containment: – Potemkin Virtual Honeyfarm talks about salability, fidelity, and containment of honeypots – Vigilante is an end-to-end worm containment strategy