A Taxonomy of Computer Worms Ashish Gupta Network Security April 2004
Overview What are worms ? The six factors on taxonomy Target Discovery Propagation Activation Payloads Attackers End
Worm vs a virus 1. Self propagates across the network 2. Exploits security or policy flaws in widely used services 3. Less mature defense today
+ Attacker Target Discovery Carrier Activation Payload OVERVIEW
Target Discovery
Scanning sequential, random Target Lists pre-generated, external (game servers), internal Passive
Target Discovery Internal Target Lists –Discover the local communication topology –Similar to DV algorithm –Very fast ?? Function of shortest paths –Any example ? –Difficult to detect Suggests highly distributed sensors
Toolkit potential Worm tutorialhttp://lcamtuf.coredump.cx/worm.txt
Carrier
Self-Carried active transmission Second Channel e.g. RPC, TFTP ( blaster worm ) Embedded e.g. web requests
Activation
Human Activation Social Enginnering e.g. MyDoom SCO Killer ! Human activity-based activation e.g. logging in, rebooting Scheduled process activation e.g. updates, backup etc. Self Activation e.g. Code Red
MyDoom : Fastest Ever
Payload
Internet Remote Control Internet DOS : paper’s dream realized Data Damage: Chernobyl, Klez Physical World Damage Human control Blackmail !
Attacker
Curiosity Pride and Power Commercial Advantage Extortion and criminal gain Terrorism Example Cyber Warfare
Theodore Kaczynski Born in ChicagoChicago extremely gifted as a child American terrorist who attempted to fight against what he perceived as the evils of technological progressAmericanterrorist eighteen-year-long campaign of sending mail bombs to various people, killing three and wounding 29.mail bombs The first mail bomb was sent in late 1978 to Prof. Buckley Crist at Northwestern University1978Northwestern University
+ Attacker Target Discovery Carrier Activation Payload CONCLUSION
??? given the target discovery/propagation methods of worms, –how to detect it? –with only network traffic header data? –at ISP? at edge routers? at end hosts?