Collaborative Center for Internet Epidemiology and Defenses (CCIED) Stefan Savage Department of Computer Science & Engineering University of California,

Slides:



Advertisements
Similar presentations
Architectural issues for network-layer identifiers Stefan Savage Dept of Computer Science & Engineering UC San Diego.
Advertisements

The Internet Motion Sensor: A Distributed Blackhole Monitoring System Michael Bailey*, Evan Cooke*, Farnam Jahanian* †, Jose Nazario †, David Watson* Presenter:
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Introduction to Security Computer Networks Computer Networks Term B10.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Panel: Current Research on Stopping Unwanted Traffic Vern Paxson, Stefan Savage, Helen J. Wang IAB Workshop on Unwanted Traffic March 10, 2006.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm Authors: Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex.
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage Presenter: Martin Krogel.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Introduction to Honeypot, Botnet, and Security Measurement
1 Spam: Why? Chris Kanich Christian Kreibich Kirill Levchenko Brandon Enright Vern Paxson Geoffrey M. Voelker Stefan Savage +=
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Staying Safe Online Keep your Information Secure.
Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
MURI Kickoff Welcome! First, introductions… all around Some context and expectations u We’re going to give some informal presentations about our plans.
Botnets: Yesterday, Today, and Tomorrow CS 598: Advanced Internet Presented by: Imranul Hoque.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Final Introduction ---- Web Security, DDoS, others
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Speaker: Hom-Jay Hom Date:2009/11/17 Botnet, and the CyberCriminal Underground IEEE 2008 Hsin chun Chen Clinton J. Mielke II.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Collaborative Center for Internet Epidemiology and Defenses (CCIED) Technical Advisory Board Meeting Vern Paxson, Stefan Savage George Varghese, Geoff.
Internet Architecture and Governance
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm Michael Vrable, Justin Ma, Jay chen, David Moore, Erik Vandekieft, Alex C. Snoeren,
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
Botnets A collection of compromised machines
Internet Quarantine: Requirements for Containing Self-Propagating Code
Threats to computers Andrew Cormack UKERNA.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Internet Worm propagation
Chapter 9 E-Commerce Security and Fraud Protection
The Current Internet: Connectivity and Processing
Cyber Security Challenges
Internet CyberCrime Economics
Introduction to Internet Worm
Presentation transcript:

Collaborative Center for Internet Epidemiology and Defenses (CCIED) Stefan Savage Department of Computer Science & Engineering University of California, San Diego

Context: threat transformation Traditional threats –Attacker manually targets high- value system/resource –Defender increases cost to compromise high-value systems –Biggest threat: insider attacker Modern threats –Attacker uses automation to attack many resources at once (filter later) –Defender must defend all systems at once –Biggest threat: software bugs and naïve users

Technical enablers Wide-open communications architecture –IP model: anyone can send anything to anyone –Federated management, minimal authentication Vulnerable computing platforms –One software bug -> millions of compromised hosts –Naïve users -> don’t even need software bugs Lack of meaningful deterrence –Little forensic attribution/audit capability –Inefficient investigatory mechanisms/ prosecutorial incentives

Bigger problem: Economic Drivers In last six years, emergence of profit-making malware –Anti-spam efforts force spammers to launder through compromised machines (starts with MyDoom.A, SoBig) –“Virtuous” economic cycle transforms nature of threat Commoditization of compromised hosts –Fluid third-party exchange market (millions of hosts) Raw bots (range from pennies to dollars) Value added tier: SPAM proxying (more expensive) Innovation in both host substrate and its uses –Sophisticated infection and command/control networks: platform –SPAM, piracy, phishing, identity theft, DDoS are all applications

DDoS for sale Emergence of economic engine for Internet crime –SPAM, phishing, spyware, etc Fluid third party markets for illicit digital goods/services –Bots ~$0.5/host, special orders, value added tiers –Cards, malware, exploits, DDoS, cashout, etc.

6 3.6 cents per bot week 6 cents per bot week 2.5 cents per bot week September 2004 postings to SpecialHam.com, Spamforum.biz >20-30k always online SOCKs4, url is de-duped and updated > every 10 minutes. 900/weekly, Samples will be sent on > request. Monthly payments arranged at discount prices. >$350.00/weekly - $1,000/monthly (USD) >Type of service: Exclusive (One slot only) >Always Online: 5, ,000 >Updated every: 10 minutes >$220.00/weekly - $800.00/monthly (USD) >Type of service: Shared (4 slots) >Always Online: 9, ,000 >Updated every: 5 minutes Botnet Spammer Rental Rates Bot Payloads

Structural asymmetries Defenders reactive, attackers proactive –Defenses public, attacker develops/tests in private –Arms race where best case for defender is to “catch up” New defenses expensive, new attacks cheap –Defenses sunk costs/business model, attacker agile and not tied to particular technology Defenses hard to measure, attacks easy to measure –Few security metrics (no “evidence-based” security), attackers directly monetization which drives attack quality Minimal deterrent effect 8

CCIED Collaborative Center for Internet Epidemiology and Defenses (“Seaside”) –Joint UCSD/ICSI project, 1 of 4 National CyberTrust Centers –Focused on threats posed by large-scale host compromise Worms, viruses, botnets, DDoS, spam, spyware etc Three key areas of work –Internet epidemiology: measuring/understanding attacks –Automated defenses: blocking/stopping attacks: –Economic drivers: why attacks are happening See:

10 Detecting Outbreaks Both defense and deterrence are predicated on getting good intelligence –Need to detect, characterize and analyze new malware threats –Need to be do it quickly across a very large number of events Classes of monitors –Network-based –Endpoint-based Monitoring environments –In-situ: real activity as it happens Network/host IDS –Ex-situ: “canary in the coal mine” HoneyNets/Honeypots

Network Telescopes Idea: Unsolicited packets evidence of global phenomena –Backscatter: response packets sent by victims provide insight into global prevalence of DoS attacks (and who is getting attacked) –Scans: request packets can indicate an infection attempt from a worm (and who is current infected, growth rate, etc.) Very scalable: CCIED Telescope monitors 17M+ IP addrs –(> 1% of all routable addresses of the Internet) Moore et al, Inferring Internet Denial-of-Service Activity, USENIX Security, 2001.

Backscatter analysis Monitor block of n IP addresses Expected # of backscatter packets given an attack of m packets: Extrapolated attack rate R’ is a function of measured backscatter rate R:

Attacks over time

Example: Periodic attack (1hr per 24hrs)

Measuring worm growth CodeRed infects 360,000 hosts in 14 hours in 2001 Moore et al, Code Red: a case study on the spread and victims of an Internet worm, ACM IMW, 2002

Code red was slow Slammer worm released January 2003 –First ~1 min behaves like classic scanning worm (doubles in 8.5secs) –>1 min worm saturates access bandwidth Some hosts issue > 20,000 scans/sec Self-interfering –Peaks at ~3 min >55 million IP scans/sec –90% of Internet scanned in <10 mins Moore et al, The Spread of the Sapphire/Slammer Worm, IEEE Security & Privacy, 1(4), 2003

Scalability/Fidelity Tradeoff in detection Live Honeypot Telescopes + Responders (iSink, honeyd, Internet Motion Sensor) VM-based Honeynet (e.g., Collapsar) Network Telescopes (passive) Most Scalable Highest Fidelity

Potemkin Honeyfarm Provide the illusion of millions of honeypots –But use a much smaller set of physical resources –1 Million IP addresses on 10s of physical hosts Gateway multiplexes traffic onto multiple virtual machines (VMs) VMM multiplexes multiple VMs on physical servers Vrable et al., Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm, SOSP Was largest high-fidelity honeyfarm on planet

Potemkin Operation Packet received by gateway Dispatched to honeyfarm server VM instantiated –Adopts destination IP address –Creation must be fast enough to maintain illusion (creation via copy) Many VMs will be created –Must be resource efficient (copy-on-write representation) –Can support 100s of simultaneous VMs per server

Outbreak Defense Modern worms can infect >1M hosts/sec Need to detect and block new outbreaks << 1 sec [Moore et al, Infocom03] Earlybird: Line-rate network inference of worm signatures [Singh et al, OSDI04] Key issue: how to learn popular strings with high in and out degree, without maintaining per-string state Precise signature identification < 1ms Singh et al., Automated Worm Fingerprinting, NSDI 2004.

Today We are increasingly focused on better mapping the economics of on-line crime –Botnet infiltration –Spam conversion –Buying and selling of stolen credit cards, bank accounts, botnets, etc The hope is to find economics bottlenecks and focus defenses there

Spam The oldest e-crime profit generator > 100B spam s sent/day (Ironport) Wide range of campaigns –Scams: pharma, software, rolex, jobs, porn,.. –Phishing: banks (e.g. BoA), e-commerce, etc –Web exploits, XSS & social engineering Key question: what is ROI? –Costs can be estimated, but we don’t know sales conversion rate

Courtesy Stuart Brown modernlifisrubbish.co.uk How Pharma Spam works?

Key opportunity Spam is increasingly sent by botnets Botnets are increasingly self-organizing Can infiltrate botnet C&C network –Observe who is getting spammed –Observe what spam is being sent –Observe which addresses get delivered to –Change templates in transit Kanich, Kreibich, Levchenko, Enright, Paxson, Voelker and Savage, Spamalytics: an Empirical Analysis of Spam Marketing Conversion, ACM CCS 2008

Spam pipeline M 347.5M 21.1M (25%) 82.7M (24%) 3,827 (0.005%) 10,522 (0.003%) 316 ( %) 28 ( %) --- Pharma: 12 M spam s for one “purchase” SentMTAVisitsConversionsInbox 40.1 M10.1M (25%)2,721 (0.005%)225 ( %) E-card: 1 in 10 visitors execute the binary

Questions? Yahoo!27 Collaborative Center for Internet Epidemiology and Defenses

What’s next: Value-chain characterization Value-chain characterization –Empirical map establishing links between criminal groups and enablers Affiliate programs, botnets, fast flux networks, registrars, payment processors, SEO/traffic partners, fulfillment/manufacturing Data mining across huge data feeds we’ve built or established relationships for –Social network among criminal groups Semantic Web mining

New: Fulfillment measurements About to start purchasing wide range of spam-advertized products –Watches –Pharma –Traffic Cluster purchases based on –Merchant and processor –Packaging (postmark, forensic analysis of paper) –Artifacts of manufacturing process (e.g., FT- NIR on drugs) 29

Observations – Modest number of bots send most spam – Virtually all bots use templates with simple rules to describe polymorphism – Templates+dictionaries ≈ regex describing spam to be generated – If we can extract or infer these from the botnets, we have a perfect filter for all the spam generated by the botnet – Very specific filters, extremely low FP risk New: Bot-based spam filter generation random letters and numbers phrases from a dictionary

Early results (last week) 0 FP with 50 examples 0 FN on Storm with 500 examples Still tuning for other botnets