Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Work and play: Disease spread, social behaviour and data collection in schools Dr Jenny Gage, Dr Andrew Conlan, Dr Ken Eames.
Internet Security & Worms Prasad S. Athawale Department of Computer Science, University at Buffalo State University of New York, Buffalo.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Sigurnost računala i podataka
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Univ. Massachusetts, Amherst.
Population dynamics of infectious diseases Arjan Stegeman.
University of Buffalo The State University of New York Spatiotemporal Data Mining on Networks Taehyong Kim Computer Science and Engineering State University.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Modeling the spread of active worms Zesheng Chen, Lixin Gao, and Kevin Kwiat bearhsu - INFOCOM 2003.
Network Resilience: Exploring Cascading Failures Vishal Misra Columbia University in the City of New York Joint work with Ed Coffman, Zihui Ge and Don.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 4, 2003 Paper # 46.
Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.
On the Effectiveness of Automatic Patching Milan Vojnović & Ayalvadi Ganesh Microsoft Research Cambridge, United Kingdom WORM’05, Fairfax, VA, USA, Nov.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
1 Modeling, Analysis, and Mitigation of Internet Worm Attacks Presenter: Cliff C. Zou Dept. of Electrical & Computer Engineering University of Massachusetts,
The Internet Motion Sensor: A Distributed Blackhole Monitoring System Presented By: Arun Krishnamurthy Authors: Michael Bailey, Evan Cooke, Farnam Jahanian,
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 21, 2003.
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
Worms, Viruses, and Cascading Failures in networks D. Towsley U. Massachusetts Collaborators: W. Gong, C. Zou (UMass) A. Ganesh, L. Massoulie (Microsoft)
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense Cliff C. Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
DoS/DDoS attack and defense
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Class 21: Spreading Phenomena PartI
 RIP — A distance vector interior routing protocol  IGRP — The Cisco distance vector interior routing protocol (not used nowadays)  OSPF — A link-state.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Defending against Hitlist Worms using NASR Khanh Nguyen.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Defending Against DDoS
Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai
Modeling and Measuring Botnets
Effective Social Network Quarantine with Minimal Isolation Costs
Research Progress Report
Modeling Botnet Propagation Using Time Zones
Brad Karp UCL Computer Science
Internet Worms: Reality or Hype
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
DDoS Attack and Its Defense
CSE551: Introduction to Information Security
Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan
Introduction to Internet Worm
Presentation transcript:

Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst

Motivation Code Red worm incident of July 19th, 2001: Showed how fast a worm can spread. more than 350,000 infected in less than one day. A friendly worm? No real damage to compromised computers. Did not send out flooding traffic. A good model can: Predict worm propagation and damage. Understand the worm spreading characteristics. Help to find effective mitigation technique.

Code Red worm background Sent HTTP Get request to buffer overflow Win IIS server. It generated 100 threads to scan simultaneously One reason for its fast spreading. Huge scan traffic might have caused congestion. Characteristics: Uniformly picked IP addresses to send scan packets.

Epidemic modeling introduction “infectious” hosts: continuously infect others. “removed” hosts in epidemic area:  Recover and immune to the virus.  Dead because of the disease. “removed” hosts in computer area:  Patched computers that are clean and immune to the worm.  Computers that are shut down or cut off from worm’s circulation. susceptible infectious removed

Epidemic modeling introduction Homogeneous assumption: Any host has the equal probability to contact any other hosts in the system. Number of contacts  I  S Code Red propagation has homogeneous property: Direct connect via IP Uniformly IP scan

Deterministic epidemic models — Simple epidemic model State transition: N: population; S(t): susceptible hosts; I(t): infectious hosts dI(t)/dt =  S(t) I(t) S(t) + I(t) = N I(t)  S(t) symmetric Problems:  Constant infection rate   No “removed” state. susceptible infectious t I(t)

Deterministic epidemic models — Kermack-McKendrick epidemic model State transition: R(t): removed from infectious;  removal rate dI(t)/dt =  S(t) I(t) – dR(t)/dt dR(t)/dt =  I(t); S(t) + I(t) + R(t) = N Epidemic threshold:  No outbreak if S(0) <  / . Problems:  Constant infection rate   No susceptible infectious removed I(t) t susceptible removed

Code Red modeling — Consider human countermeasures Human countermeasures: Clean and patch: download cleaning program, patches. Filter: put filters on firewalls, gateways. Disconnect computers. Reasons for: Suppress most new viruses/worms from outbreak. Eliminate virulent viruses/worms eventually. Removal of both susceptible and infectious hosts. susceptible infectious removed

Code Red modeling — Consider human countermeasures Model (extended from KM model): Q(t): removal from susceptible hosts. R(t): removal from infectious hosts. I(t): infectious hosts. J(t)  I(t)+R(t): Number of infected hosts hosts that have ever been infected dS(t)/dt = -  S(t) I(t) - dQ(t)/dt dR(t)/dt =  I(t) dQ(t)/dt =  S(t)J(t) S(t) + I(t) + R(t) + Q(t) = N

Code Red modeling — Two-factor worm model Code Red worm may have caused congestion: Huge number of scan packets with unused IP addresses. Routing table cache misses. ( about 30% of IP space is used) Generation of ICMP (router error) in case of invalid IP. Possible BGP instability. Effect: slowing down of worm propagation rate:    (t) Two-factor worm model: dS(t)/dt = -  (t)S(t)I(t) - dQ(t)/dt dR(t)/dt =  I(t) dQ(t)/dt =  S(t)J(t)  (t) =  0 [ 1 - I(t)/N ]  S(t) + I(t) + R(t) + Q(t) = N

Validation of observed data on Code Red Network monitor: record Code Red scan traffic into the local network. Code Red worm uniformly picked IP to scan. # of scans a cite received  Size of the IP space of the cite. # of scans a cite received at time t  Overall scans in Internet at t. # of infectious hosts sent scans to a cite at time t  Overall infectious hosts in Internet at t. Local observation preserves global worm propagation pattern.

Observed data on Code Red worm Two independent Class B networks: x.x.0.0/16 (1/65536 of IP space) Count # of Code Red scan packets and source IPs for each hour. Corresponding to infectious hosts I(t) at each hour, not infected hosts J(t)=I(t)+R(t). Uniformly scan IP  Two networks, same results. # scan UTC hours (July 19-20) # IP UTC hours (July 19-20)

Code Red worm modeling — Simple epidemic modeling Staniford et al. used simple epidemic model approach. Conclusion from this model: At around 20:00UTC (16:00 EDT), Code Red infected almost all susceptible hosts. On average, a worm infected 1.8 susceptible hosts per hour.  # scan UTC hours (July 19-20) EDT hours (July 19)

Code Red worm modeling — Simple epidemic modeling Possible overestimation? Issues on using simple epidemic for Code Red: Constant infection rate  — No considering of the impact of worm traffic No recovery — removal from infectious hosts No patching before infection — removal from susceptible hosts

Code Red modeling numerical analysis — Two-factor model Two-factor model Conclusions: At 20:00UTC (16:00 EDT), 60% ~ 70% have ever been infected. Simple epidemic model overestimates worm spreading.  = 0.14: 14% infectious hosts would be removed after an hour.

Code Red Modeling — If no congestion is considered If no congestion considered The congestion assumption is reasonable.

Summary We must consider the changing environment when we model virus/worm propagation. Human countermeasures/changing of behaviors. Virus/worm impact on Internet infrastructure. Worm modeling limitation: Modeling worm continuously spreading part. Homogeneous systems. Future work: how to predict before worm’s outbreak? Determine parameters of a virus/worm model.