Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Univ. Massachusetts, Amherst.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Automated Worm Fingerprinting [Singh, Estan et al] Internet Quarantine: Requirements for Self- Propagating Code [Moore, Shannon et al] David W. Hill CSCI.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Automated Worm Fingerprinting Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage Manan Sanghi.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
1 Modeling, Analysis, and Mitigation of Internet Worm Attacks Presenter: Cliff C. Zou Dept. of Electrical & Computer Engineering University of Massachusetts,
Global Intrusion Detection Using Distribute Hash Table Jason Skicewicz, Laurence Berland, Yan Chen Northwestern University 6/2004.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Click to add Text Automated Worm Fingerprinting Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Department of Computer Science and Engineering.
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Countering DoS Through Filtering Omar Bashir Communications Enabling Technologies
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG Supervisor : AP. Dr. Mohamed Othman.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Defending against Hitlist Worms using NASR Khanh Nguyen.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
Polygraph: Automatically Generating Signatures for Polymorphic Worms Authors: James Newsome (CMU), Brad Karp (Intel Research), Dawn Song (CMU) Presenter:
Usenix Security 2004 Autograph Toward Automated, Distributed Worm Signature Detection Hyang-Ah KimBrad Karp Carnegie Mellon UniversityIntel Research &
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Internet Quarantine: Requirements for Containing Self-Propagating Code
POLYGRAPH: Automatically Generating Signatures for Polymorphic Worms
Chap 10 Malicious Software.
A Distributed DoS in Action
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Lecture 3: Secure Network Architecture
Chap 10 Malicious Software.
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Worms: Taxonomy and Detection Mark Shaneck 2/6/2004

2 Outline  Introduction  Worm Classification Spreading Media Target Acquisition Polymorphic Worms  Detection / Prevention  Conclusion

3 Introduction  Common and costly  So far, mostly benign…  Need to react within seconds - too quickly for a human

4 Spreading Media  Traditional   Windows File Sharing  Hybrid

5 Traditional  Self-propagate through network  Exploit some vulnerability to automatically execute worm payload Most common - buffer overflow  Least common in existence  Largest potential danger Spreads fastest  Main subject of detection and containment research

6  Spreads through  Relies on humans or poor application design Most are executable attachments Nimda executed automatically when previewed  Most common form of worm  Very hard to detect, but they spread slowly

7 Windows File Sharing  Spreads through windows file shares  Worms don’t generally spread this way solely Very hard to penetrate a network perimeter this way Usually use other methods to penetrate network and then this method to spread within the network

8 Hybrid Worms  Combination of methods  Example: Nimda Spread through Copied itself to open network shares (was executed if someone viewed it in Windows Explorer) Traditional methods Used subnet scanning to look for open Code Red II and Sadmind backdoors Exploited multiple IIS Directory Traversal vulnerabilities Modified web pages to cause clients to download and execute the worm payload

9 Hybrid Worms  Detection difficulties Propagation pattern is difficult to predict since humans are involved If one method is blocked it might find another way in…

10 Target Acquisition  Random Scanning  Subnet Scanning  Routing Worm  Pre-generated Hit List  Topological  Stealth / Passive

11 Random Scanning  32 bit number is randomly generated and used as the IP address  Slammer and Code Red I  Hits black IP space frequently Only 28.6% of IP space is allocated

12 Subnet Scanning  Generate last 1, 2, or 3 bytes of IP address randomly  Code Red II and Blaster  Some scans must be completely random to infect whole internet

13 Routing Worm  BGP information can tell which IP address blocks are allocated  This information is publicly available

14 BGP Routing Worm  By including routable prefixes in the worm payload, it can limit its scanning to allocated addresses  Could reduce scanning space by 71.4%  Aggregation and compression could reduce the space needed to 175 KB  Compare Slammer: 376 bytes Blaster: 6 KB Nimda: 57 KB

15 Class A Routing Worm  By examining BGP data you can see which Class A addresses are allocated  Only 116 of 256 Class A addresses are publicly routable (45.3% of total IP space)  Only 116 extra bytes are needed to reduce the scanning space in half

16 Pre-generated Hit List  Hit list of vulnerable machines is sent with payload Determined before worm launch by scanning  Gives the worm a boost in the slow start phase  Skips the phase that follows the exponential model Infection rate looks linear in the rapid propagation phase  Can avoid detection by the early detection systems

17 Topological  Uses info on the infected host to find the next target Morris Worm used Network Yellow Pages and /etc/hosts file to find more hosts worms use address books P2P systems usually store info about hosts it connects to

18 Stealth / Passive  Waits for a vulnerable system to contact it  Hides the infection among normal traffic No active scanning  Nimda - modification of server web pages  P2P systems - infected host could respond to requests with the worm

19 Polymorphic Worms  Worms can easily be enhanced for self- modification  Simple encryption with random key would randomize the payload Small decryption routine would remain This could be obfuscated and randomized as well Random do-nothing instructions Random padding  Exploit might remain common Nimda - no exploit data Buffer Overflow - return address might be same

20 Detection / Prevention  Ideal: Dynamic Quarantine and Automatic Signature Generation  IPv6 vs. Worms  EarlyBird  Honeycomb  BGP Information  Kalman Filter  Hidden Markov Models  Worm Detection

21 Ideal  Detect worm outbreak quickly  Automatically generate signatures and filter packets immediately  Distribute alerts and signatures faster than worms can spread  Is this possible?

22 IPv6 vs. Worms  IPv6 has IP addresses  Smallest subnet has 2 64 addresses 4 billion IPv4 internets  Consider a sub-network 1,000,000 vulnerable hosts 100,000 scans per second (Slammer - 4,000) 1,000 initially infected hosts It would take 40 years to infect 50% of vulnerable population with random scanning  Scan-based worms will be ineffective

23 EarlyBird  “Flows” are identified by packet content (or hash of content)  Counters of distinct sources and destinations are kept for popular flows  When counts cross the threshold, flow is considered a worm, and content used for signature  Additional “guilt” can be assigned to flows sent to black address space

24 EarlyBird  Benefits Counts distinct sources and destinations Most systems simply examine total traffic on a particular port and look for changes in the traffic pattern

25 EarlyBird  Packet content examination can be evaded with simple polymorphism They suggest using sampled Rabin fingerprinting to find commonly occurring fixed length strings If only 4 bytes are in common for a polymorphic worm, then the packets will be identified by only 4 bytes…. How to differentiate packets?

26 Honeycomb  Plugin to honeyd  Assumption: All traffic to a honeypot is suspicious  For every inbound packet - use longest common substring (LCS) algorithm to find a signature (after performing header analysis)  Adds signature to the signature pool  Periodically outputs signature pool to Snort/Bro  Problems: Traffic to regular hosts? Polymorphism?

27 BGP Information  Use black address space to watch for scans Only will be useful in detecting random scanning worms  Use AS profiling to build a model of how much traffic comes from each AS and watch for drastic changes Will it detect in time?

28 Kalman Filter  Worm propagation follows the epidemic model

29 Kalman Filter  Best system currently by Don Towsley, et al.  Distribute sensors (ingress and egress filters) around network to measure Scan rate Scan distribution Total number of scans Total number of infected hosts  Info sent to centralized Malware Warning Center (MWC)

30 Kalman Filter Worm traffic Non-worm traffic burst Exponential rate  on-line estimation Monitored illegitimate traffic rate

31 Kalman Filter  MWC uses Kalman filter to calculate trend in the growth If it matches the exponential model, it is considered a worm  Sensors measure the info by packets sent to black IP space  Sensors must monitor 2 20 IP addresses to get accurate information  Can be circumvented by a hit-list or topological worm

32 Hidden Markov Model  Not very useful in worm detection  HMMs are based on changes in states  Worm outbreaks effectively consist of two states - vulnerable and infected  To be of use the transition to infected would need to be detected, which is basically worm detection…

33 Worm Detection  Mining Toolkit (EMT) - Columbia  Cliques - users usually send to particular sets of users  Assumption: If user sends to a set that is not a subset of a clique, something is wrong  Anomaly detection to find suspicious to be examined in more detail  Problems: If user sends one broadcast , clique is useless. False positives.

34 Conclusion  Ideal in fighting worms - detection and quarantine / signature generation  Most research focuses on early detection  It is not clear how to protect after detection Is it enough to close the port? Ban offending IP addresses temporarily?  Is it possible to automatically generate signatures for any worm?