Modeling Botnets and Epidemic Malware Marco Ajelli, Renato Lo Cigno, Alberto Montresor DISI – University of Trento, Italy disi.unitn.it

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Stopping computer viruses through dynamic immunization E. Shir, J.Goldenberg, Y. Shavitt, S. Solomon.
School of Information University of Michigan Network resilience Lecture 20.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Population dynamics of infectious diseases Arjan Stegeman.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 4, 2003 Paper # 46.
1 Introduction to Biostatistics (PUBHLTH 540) Sampling.
Network modeling of the Ebola Outbreak Ahmet Aksoy.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
By: Brian Scott. Topics Defining a Stochastic Process Geometric Brownian Motion G.B.M. With Jump Diffusion G.B.M with jump diffusion when volatility is.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Epidemic spreading in complex networks: from populations to the Internet Maziar Nekovee, BT Research Y. Moreno, A. Paceco (U. Zaragoza) A. Vespignani (LPT-
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Online Social Networks and Media Epidemics and Influence.
Chapter 1: Introduction to Statistics
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 21, 2003.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Directed-Graph Epidemiological Models of Computer Viruses Presented by: (Kelvin) Weiguo Jin “… (we) adapt the techniques of mathematical epidemiology to.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Computational Biology, Part 15 Biochemical Kinetics I Robert F. Murphy Copyright  1996, 1999, 2000, All rights reserved.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
University of Stuttgart Institute of Parallel and Distributed Systems (IPVS) Breitwiesenstraße D Stuttgart An Epidemic Model for Information.
Modeling frameworks Today, compare:Deterministic Compartmental Models (DCM) Stochastic Pairwise Models (SPM) for (I, SI, SIR, SIS) Rest of the week: Focus.
Stefan Ma1, Marc Lipsitch2 1Epidemiology & Disease Control Division
ECE-7000: Nonlinear Dynamical Systems Overfitting and model costs Overfitting  The more free parameters a model has, the better it can be adapted.
Malicious Software.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SIR Epidemics 박상훈.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
KS3 COMPUTING E-Safety Lesson 1 Malware KS3 Computing E-Safety.
Botnets A collection of compromised machines
Longitudinal Designs.
Botnets A collection of compromised machines
Chap 10 Malicious Software.
Effective Social Network Quarantine with Minimal Isolation Costs
Chap 10 Malicious Software.
Malicious Software Slide Set #5 Textbook Chapter 6 Clicker Questions
Introduction to Internet Worm
Presentation transcript:

Modeling Botnets and Epidemic Malware Marco Ajelli, Renato Lo Cigno, Alberto Montresor DISI – University of Trento, Italy disi.unitn.it

ICC NGS, Cape Town, June BOTNETS Collection of bots, i.e. machines remotely controlled by a bot-master Today intrinsically associated with malware  Viruses, worms,...  SPAM sending, data spying,... A bot is “created” by spreading a piece of software that infects machines Bot software self-replicate Bot Software may be  Active: doing its intended damage/action/...  Replicating: sending new copies to non-infected machines  Sleeping: just waiting to go into one of the above states

ICC NGS, Cape Town, June Why Modeling Botnets To... improve their design... or To understand how to counter them better Little is known about how botnets works and operate Worms and Viruses are among the most dangerous threats to Internet evolution SPAM (90% of it is deemed to be generated by botnets!) is hampering communications... and can be worse on other services like voice! Bots can scan the disk to grab, important, sensitive, personal information...

ICC NGS, Cape Town, June How to model a Botnet? Intrinsically difficult  Large, distributed system with complex behavior  Measures are not available and very difficult to collect (this limits also the “scope” of modeling, since it is not possible to validate them) No clues on the dynamic behavior, apart from the fact that they spread by infection new machines  No “space” for a proper stochastic model Learn from biology diseases spreading We propose a model technique based on compartmental ordinary differential equations

ICC NGS, Cape Town, June Compartmental ordinary differential equations Differential Eq. df(x) = a f(x)  The rate of change of e.g. a population is proportional to its value Compartment == introduce multiple populations influencing each other  System of coupled differential equations f g a c b d df(x) = a f(x) + b g(x) dg(x) = c f(x) + d g(x)

ICC NGS, Cape Town, June Botnets subject to immunization I-bot s = susceptibles: PCs that can be infected i = infected: PCs that got the malware and are spamming v = hidden: infected computers which are not spamming r = recovered: computers which were de-malwerized p = apportioning coefficient between spamming/hidden nodes: regulate the rate of toggling between states We normalize the system w.r.t. an arbitrary transition rate , which it absolute rate of transition between states i and v

ICC NGS, Cape Town, June Botnets with re-infection R-bot Recovered PCs can be re-infected with some Susceptibles can be immunized (antivirus footprint update, etc. )

ICC NGS, Cape Town, June More complex models... You can find examples/details on Ajelli, M. and Lo Cigno, R. and Montresor, A., “Compartmental differential equations models of botnets and epidemic malware (extended version),” University of Trento, T.R. DISI , 2010,

ICC NGS, Cape Town, June Insights and Metrics given by the Model What are the admissible parameters for a bot to work? Threshold conditions  What are the spreading parameters that makes a bot dangerous?  Nice closed form equations look for them in the paper you do not want a nasty 2 lines equation on a slide How many PCs will be affected in the population? What is the fraction of infected PCs in time? What is the amount of damage done by the botnet?

ICC NGS, Cape Town, June Fraction of PCs infected: I-bot Measures how many PCs will be infected during the epidemics Function of the ratio between infectivity  and recovery  Three values of p: 0.2,0.5,0.8 more infected nodes are active

ICC NGS, Cape Town, June Maximum number of infected PCs: I-bot Measures the maximum fraction of PCs will infected during the entire epidemics Function of the ratio between infectivity  and recovery  Three values of p: 0.2,0.5,0.8 more infected nodes are active

ICC NGS, Cape Town, June Fraction of infected PCs in time: I-bots Active Hidden p decreases  = 0.5  = 0.25

ICC NGS, Cape Town, June R 0 and R-botnet diffusion I-botnets are probably too simplistic  Infection always starts, even if it can be non-effective if the worm/virus is too much or too little aggressive R-botnets are more interesting, due to the possibility that the malware simply do not spread if “immunization is fast enough R 0 > 1 means that the infection can happen, < 1 means that the malware is cured before it can do meaningful harm Interestingly this fundamental property can be computed in closed for the model

ICC NGS, Cape Town, June R-botnets: areas of “effectiveness” Grey areas are those for which the epidemics will occur for the given set of parameters  = 0.25 

ICC NGS, Cape Town, June Harm caused by botnets How much damage can a botnet cause? Are I-bots more dangerous than R-bots or vice versa? Are aggressive bots more or less dangerous than hidden ones? Example: R-bot with:  = 0.25  =  variable Medium aggressiveness pays better; Larger  increase the damage (obvious)

ICC NGS, Cape Town, June I-bots: waves of spam-storm Even simple i-bots show very complex behavior just by changing a parameter like p Multiple “waves” of infection can be simply the consequence of swapping coordinately between different p values light gray: p=0.1 dark gray: p=0.9

ICC NGS, Cape Town, June Conclusions We have proposed a modeling methodology for understanding the behavior of botnets Even simple, deterministic compartmental differential equations highlight interesting phenomena and complex behavior Available measures would enable  Validation of averages  Stochastic models Botnets are currently one of the major threats in the Internet, but they covert and complex behavior lead (possibly) to underestimate their impact Read the paper (better the extended version) to learn more!!

ICC NGS, Cape Town, June THE END Thank you! Questions? Comments?