1 PSU worm modeling and emulation project George Kesidis CSE and EE Depts CSE Center for Networking and Security Industry Day, Wed.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

Fast Worm Propagation In IPv6 Networks Malware Project Presentation Jing Yang
0 Penn State, George Kesidis – Professor, CSE and EE Education –1992 Ph.D. in EECS from U.C. Berkeley Background – : professor in E&CE.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Investigating the Impact of Real-World Factors on Internet Worm Propagation Daniel Ray, Charles Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong,
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Controlling High- Bandwidth Flows at the Congested Router Ratul Mahajan, Sally Floyd, David Wetherall AT&T Center for Internet Research at ICSI (ACIRI)
Internet Quarantine: Requirements for Containing Self- Propagating Code David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
On the Effectiveness of Automatic Patching Milan Vojnović & Ayalvadi Ganesh Microsoft Research Cambridge, United Kingdom WORM’05, Fairfax, VA, USA, Nov.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Active Worm and Its Defense1 CSE651: Network Security.
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 21, 2003.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
ESVT: A Toolkit Facilitating Use of DETER Lunquan Li, Jiwu Jing, Peng Liu, TJ, Jisheng, George Kesidis, David Miller Penn State University September 28,
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
1 Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense Cliff C. Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
Automating Analysis of Large-Scale Botnet Probing Events Zhichun Li, Anup Goyal, Yan Chen and Vern Paxson* Lab for Internet and Security Technology (LIST)
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
A Bandwidth Estimation Method for IP Version 6 Networks Marshall Crocker Department of Electrical and Computer Engineering Mississippi State University.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
INTERNET SIMULATOR Jelena Mirkovic USC Information Sciences Institute
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Defending Against DDoS
Worm Origin Identification Using Random Moonwalks
Defending Against DDoS
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Brad Karp UCL Computer Science
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
DDoS Attack and Its Defense
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

1 PSU worm modeling and emulation project George Kesidis CSE and EE Depts CSE Center for Networking and Security Industry Day, Wed. Oct. 5, 2005

2 Outline Scanning worms Slammer worm's spread in the Internet Homogeneous network model Model extensions Elements of this work in collaboration with:  V. Paxson and N. Weaver, ICSI, Berkeley  P. Liu, School of IST, Penn State  M. Vojnovic, Microsoft, Cambridge, UK  PSU students: I. Hamadeh, S. Jiwasurat, L. Li, Y. Jin

3 End-systems infected with scanning worms automatically search the IPv4 address space using one of several different strategies that have already been observed. They automatically scan (attempt session initiation) with potential victim end-systems. Defense/containment devices assumed deployed in peripheral enterprise networks  End-hosts and/or network nodes, e.g., access router  Stand alone or collaborative Zero-day defenses detect anomalously  large destination IP addresses contacted per unit time  large freq of failed scans, scans to dark addresses in particular  large number of packets with certain src/dst ports  few DNS precursors (may require DPI, i.e., payload info) Scanning worm defenses

4 Enterprise network defense DUT

5 Need background traffic for evaluation of false-positives. Need attack traffic for evaluation of false-negatives. In practice, most defenses are evaluated using  worst-case traffic scenarios (→over-engineering), and  limited deployments in operational networks (representative?). So, in particular need to realistically model the worm probing (scanning) activity from the Internet to the enterprise network under test. Evaluation of Scanning worm defenses

6 Scanning worm attack recreation We assume that the scans generated from a given enterprise to the rest of the (much larger) Internet and the scanning activity directed at the enterprise from without are negligibly dependent. The scan-rate directed at the enterprise under simulation could be approximated as H(t) = S(t) · A/2 32, where  S(t) is the total (Internet-wide) instantaneous scan-rate of the worm at time t, and  A is the size of its address space Alternatively, a random thinning of S could be used to determine H.

7 Enterprise network defense DUT

8 Scanning worm attack recreation (cont) The total scan-traffic generation S can be estimated from extrapolations of measured data for a particular worm when this is available, e.g., from the University of Wisconsin's, Michigan’s or CAIDA’s (UCSD’s) tarpit. Alternatively, one could use a mathematical model whose parameters can be  fit to the salient data of a given worm (again, if that data is available) or  varied in an attempt to capture the behavior of actual worms for which measured Internet data is unavailable or set for hypothetical worms. A mathematical model also:  Has insight and computational advantages over the potentially more accurate approach based on scale-down techniques and parallel simulation.  Allows for convenient study of hypothetical worms that are necessary to consider when evaluating defenses to be deployed.  Does not have privacy issues associated with dissemination of tarpit data.

9 Bandwidth Limited Scanners Propagation of Blaster, Slammer and Witty worms:  congested network links thereby creating a temporary denial-of- access to the Internet for large population of end-hosts.  resulted in a significant direct expenditure for patching and very significant aggregate loss of productivity. We focus on bandwidth-limited, random UDP-scanning worms like Slammer and Witty that spread extremely rapidly in the wild. Slammer infected about 75 thousand SQL servers (nearly the entire population of susceptibles) in less than 10 minutes and caused significant congestion in the stub-links connecting peripheral enterprise networks to the Internet core.

10 Slammer's spread The success of the simple Kermack-McKendrick (SIR) model for the Code Red worm has been demonstrated. Modeling Slammer and Witty is substantially more complex because network bandwidth limitations mitigated the spread of the worm. Beyond just spreading very quickly, Slammer was the first significant worm without a constant scanning rate:

11 Slammer's scan-rate per worm (infective) Note that the oscillations in these curves are largely due to measurement error that is magnified by extrapolation.

12 Homogeneous model For times t≥0, dy C (t)/dt = β C-1 y C-1 (t)Y(t), dy i (t)/dt = (β i-1 y i-1 (t) - β i y i (t)) Y(t) for 1≤ i ≤C-1 dy 0 (t)/dt = -β 0 y 0 (t)Y(t)

13 Total instantaneous scan-rate

14 Scan-rate per worm (infective)

15 Model Extensions Straightforward to extend our model to accommodate:  access links that gradually saturate as the number of infectives grow.  more heterogeneous enterprise networks with different access link capacities and/or different numbers of susceptible end-systems per enterprise.  removals of infectives (patch/crash) or susceptibles (patch). See Penn State’s KMSim and packet injector tools (open sourced) at

16 Model Extensions In particular, Slammer's routeview data can be used to define a number of classes of enterprises with different numbers of susceptibles and all classes having instantly saturating access links with the same bandwidth (as in our WORM’04 paper): We have shown that that both the total scan-rate and the scan-rate per infective curves are accurately approximated by this model. Furthermore, we have recently shown that this model with countermeasures accurately represents the Witty worm, its non-uniform scanning strategy notwithstanding.

17 Other projects of G. Kesidis NSF cybertrust project on congestion control in non-cooperative networks (with C. Das + Purdue) NSF NeTS NoSS Sensor MANETs (with G. Cao, T. La Porta and C. Das) NSF ITR on networking visual sensors (with O. Camps and M. Sznaier) NSF ITR on incentive engineering (with R. Acharya and N. Gautam) DARPA/ARO Emerging Surveillance Plexsus MURI (ARL) Cisco collaborations: attack attribution, reputation systems Leadership role in NSF/DHS project that is the sister project of DETER under which our worm research is funded…

18 Evaluation Methods for Internet Security Technology (EMIST)