Security Robert Grimm New York University. Introduction  Traditionally, security focuses on  Protection (authentication, authorization)  Privacy (encryption)

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
1 Computer Networks: A Systems Approach, 5e Larry L. Peterson and Bruce S. Davie Chapter 8 Network Security Copyright © 2010, Elsevier Inc. All rights.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Introduction to Security Computer Networks Computer Networks Term B10.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Worm Defense. Outline Worm “How to Own the Internet in Your Spare Time” Worm defense Discussions.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
Web server security Dr Jim Briggs WEBP security1.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
DDos Distributed Denial of Service Attacks by Mark Schuchter.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Tracking and Tracing Cyber-Attacks
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
“How to 0wn the Internet in Your Spare Time” Nathanael Paul Malware Seminar September 7, 2004.
Honeypot and Intrusion Detection System
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
--Harish Reddy Vemula Distributed Denial of Service.
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Malicious Software.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
DoS/DDoS attack and defense
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Defending against Hitlist Worms using NASR Khanh Nguyen.
How to 0wn the Internet In Your Spare Time Authors Stuart Staniford, Vern Paxson, Nicholas Weaver Published Proceedings of the 11th USENIX Security Symposium.
Hash-Based IP Traceback Alex C. Snoeren †, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, W. Timothy Strayer.
Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent and W. Timothy.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Jessica Kornblum DSL Seminar Nov. 2, 2001 Hash-Based IP Traceback Alex C. Snoeren +, Craig Partridge, Luis A. Sanchez ++, Christine E. Jones, Fabrice Tchakountio,
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Secure Software Confidentiality Integrity Data Security Authentication
Single-Packet IP Traceback
A Distributed DoS in Action
Brad Karp UCL Computer Science
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Security Robert Grimm New York University

Introduction  Traditionally, security focuses on  Protection (authentication, authorization)  Privacy (encryption)  But, the Internet adds/amplifies several threats  (Distributed) Denial of service attacks  Viruses  Worms  For today, we are looking at  How to identify origin of denial of service attacks (or how to find those evil-doers)  How to build better worms (don’t try this at home…)

IP Traceback In General  Assumptions  Goal  Transformations  Strategies

IP Traceback Assumptions  Packets may be addressed to more than one host  Duplicate packets may exist in the network  Routers may be subverted (though, not often)  Attackers may be aware of being traced  Routing behavior may be unstable  Packet size should not grow b/c of tracing  End hosts may be resource constrained  Traceback is an infrequent operation

IP Traceback Goal  Identify source of any packet  Ingress point to traceback-enabled network  Actual host or network  Compromised router(s)  Consequently, we are really looking for path!

IP Traceback Transformations  Even under normal operation, packets are not constant  Trivial transformations  Time-to-live  Checksum  Packet encapsulation  Packet fragmentation, NAT, IP-over-IP, IPsec  Packet generation  ICMP Echo Request  ICMP Echo Response  Multicast

IP Traceback Strategies  Link testing  Flood candidate network links and watch for variations  Auditing/logging  End-host based  Mark packets in network  Store and analyze on endhosts  Infrastructure based  Store packets in network  Analyze in network  Single-Packet IP Traceback  Infrastructure based logging (with some clever twists…)

Single-Packet IP Traceback  Basic idea: Log bloom-filtered packet digests  Why digests?  % collision rate for 28-byte prefix  Need additional state for fragmentation, NAT, ICMP, IP-in-IP, IPsec  Why bloom-filtered?

Bloom-Filters and Hash Functions  Need family of hash functions  Each function uniformly distributes hashes  “Good dog!” Ummm “Good hash function!”  Collisions in one function are independent of collisions in other functions  Known as universal hash families  Functions are efficient to compute  We are targeting routers, after all

Source Path Isolation Engine (SPIE)  Per router data generation agent  Generates digests and stores them in time-stamped tables  Per region SPIE collection and reduction agent  Generates attack graphs for region  Per network SPIE traceback manager  Accepts and authenticates requests  Collects and coalesces per region attack graphs

Traceback Processing  Provide packet, victim, time  Packet to reproduce digest  Victim to identify starting point  Time to identify table  Complication: Transformations  Use transform lookup tables  Map digest to irrecoverable packet data  Typically processed on control and not fast path  Rely on transformations being infrequent

Single-Packet IP Traceback Analysis  False positives  Based on analysis and simulation  Time and memory utilization  Goal: collect 1 minute worth of digests  0.5% of total link capacity  Four OC-3 ( Mbps) links: 23MB  32 OC-192 (9.952 Gbps) links: 12 GB  One 16 Mb SRAM for current table  Backed by additional SDRAM

Single-Packet IP Traceback Discussion  Deployment  Vulnerabilities  Denial of service  Flow amplification  Information leakage  Transformations

And Now for Something Completely Different… Yeah, Right …

Worms, Worms, Worms  Install payload on as many machines as possible and then…  Launch distributed denial of service attacks  Access sensitive information (financial, medical, …)  Corrupt information 30 minutes of Sapphire Code Red I, II, Nimda

Analysis of Code Red I  Attacks Microsoft IIS web servers  Launches 99 threads, trying to compromise servers at random IP addresses  Version 1 has bug in random number generator  Fixed seed  Linear spread  Version 2  Fixes bug  Does not deface web sites  Launches DDOS attack against IP address of

Random Constant Spread Model (RCS)  N: # of vulnerable machines  K: initial compromise rate  T: time of incident  a: proportion of compromised machines

Better Worms Practice  Code Red II  Same vulnerability, different payload (root backdoor)  Localized scanning strategy favoring local machines  Nimda  Combines several techniques into one worm  Microsoft IIS web servers  attachments  Network shares  Web pages  Backdoors left behind by Code Red II and “sadmind”

Better Worms Theory: Hit-List Scanning  Helps with “getting off the ground”  Collect list of potentially vulnerable machines, start with them, splitting list between worm copies  Stealthy scans  Distributed scans  DNS searches  Spiders  Public surveys  Just listen (think peer-to-peer networks)

Better Worms Theory: Permutation Scanning  Avoid repeatedly probing same machine  Start scanning machines after your own address, using a common pseudo random permutation  Still looks like a random scan!  Stop scanning when several machines already infected  Optionally, use new permutation after some waiting time  As optimization, split permutation into ranges

Better Worms Theory: Simulation of Spread  “Warhol worm”  Uses hit-list and permutation scanning Calibration Closeup Comparison

Better Worms Theory: Alternatives to Hit-Lists  Topological scanning  Use local information  Peers, addresses, URLs  Flash worms  Create exhaustive list of all vulnerable hosts  Distribute list  By dividing list repeatedly  Storing chunks on well-connected servers  Spread may initially be limited by size of list  Start across high-bandwidth links

Better Worms Back to Reality: Sapphire  We don’t necessarily need all these techniques  Microsoft SQL Server + one 404-byte UDP packet are good enough!!!  Even though random number generator is broken  Even though port is atypical and thus easily blocked

More Bad News: Stealth Worms  Quickly spreading worms are easily detected  Alternatively, spread real sloooooooooooowly  Almost no peculiar communication patterns  Strategy  Pair of exploits E(server) and E(client) for popular web server and client  Hmmm, which company comes to mind…  Alternatively, target peer-to-peer systems  Only need one exploit as all machines run the same software

Stealth Worms Why Attack Peer-to-Peer Systems?  Interconnect to many peers  Often transfer large files  Less likely to be monitored  Typically run on less secure user machines  Transfer “grey” content  Are pretty popular  KaZaA: 9 to 30 million users…

What to Do? Cyber-center for Disease Control!  Identify outbreaks  Rapidly analyze pathogens  Fight infections  Anticipate new vectors  Proactively devise detectors  Resist future threats

What Do You Think?