Worms, Viruses, and Cascading Failures in networks D. Towsley U. Massachusetts Collaborators: W. Gong, C. Zou (UMass) A. Ganesh, L. Massoulie (Microsoft)

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Rumors, consensus and epidemics on networks
Optimal Fast Hashing Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay (Hebrew Univ., Israel)
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
The Connectivity and Fault-Tolerance of the Internet Topology
1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Univ. Massachusetts, Amherst.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
Population dynamics of infectious diseases Arjan Stegeman.
Analysis of Network Diffusion and Distributed Network Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
1 Epidemic Spreading in Real Networks: an Eigenvalue Viewpoint Yang Wang Deepayan Chakrabarti Chenxi Wang Christos Faloutsos.
Online Graph Avoidance Games in Random Graphs Reto Spöhel Diploma Thesis Supervisors: Martin Marciniszyn, Angelika Steger.
Network Resilience: Exploring Cascading Failures Vishal Misra Columbia University in the City of New York Joint work with Ed Coffman, Zihui Ge and Don.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Convergence Speed of Binary Interval Consensus Moez Draief Imperial College London Milan Vojnović Microsoft Research IEEE Infocom 2010, San Diego, CA,
Advanced Topics in Data Mining Special focus: Social Networks.
On the Effectiveness of Automatic Patching Milan Vojnović & Ayalvadi Ganesh Microsoft Research Cambridge, United Kingdom WORM’05, Fairfax, VA, USA, Nov.
The structure of the Internet. How are routers connected? Why should we care? –While communication protocols will work correctly on ANY topology –….they.
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
1 Random Walks in WSN 1.Efficient and Robust Query Processing in Dynamic Environments using Random Walk Techniques, Chen Avin, Carlos Brito, IPSN 2004.
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
1 Introduction to Approximation Algorithms Lecture 15: Mar 5.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Mixing Times of Markov Chains for Self-Organizing Lists and Biased Permutations Prateek Bhakta, Sarah Miracle, Dana Randall and Amanda Streib.
Mixing Times of Self-Organizing Lists and Biased Permutations Sarah Miracle Georgia Institute of Technology.
Information Networks Power Laws and Network Models Lecture 3.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
1 Algorithmic Performance in Complex Networks Milena Mihail Georgia Tech.
Percolation in self-similar networks Dmitri Krioukov CAIDA/UCSD M. Á. Serrano, M. Boguñá UNT, March 2011.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 Oblivious Routing in Wireless networks Costas Busch Rensselaer Polytechnic Institute Joint work with: Malik Magdon-Ismail and Jing Xi.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Epidemics on graphs: Thresholds and curing strategies A. J. Ganesh Microsoft Research, Cambridge.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
15-853:Algorithms in the Real World
Markov Chains and Random Walks. Def: A stochastic process X={X(t),t ∈ T} is a collection of random variables. If T is a countable set, say T={0,1,2, …
Percolation Processes Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopPercolation Processes1.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Workshop on Optimization in Complex Networks, CNLS, LANL (19-22 June 2006) Application of replica method to scale-free networks: Spectral density and spin-glass.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Relevant Subgraph Extraction Longin Jan Latecki Based on : P. Dupont, J. Callut, G. Dooms, J.-N. Monette and Y. Deville. Relevant subgraph extraction from.
KPS 2007 (April 19, 2007) On spectral density of scale-free networks Doochul Kim (Department of Physics and Astronomy, Seoul National University) Collaborators:
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Complexity and Efficient Algorithms Group / Department of Computer Science Testing the Cluster Structure of Graphs Christian Sohler joint work with Artur.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Internet Quarantine: Requirements for Containing Self-Propagating Code
Random Walk for Similarity Testing in Complex Networks
Sequential Algorithms for Generating Random Graphs
Peer-to-Peer and Social Networks
The Effect of Network Topology on the Spread of Epidemics
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Worms, Viruses, and Cascading Failures in networks D. Towsley U. Massachusetts Collaborators: W. Gong, C. Zou (UMass) A. Ganesh, L. Massoulie (Microsoft)

o Internet as enabler of terrific apps

o … but also of malicious behavior  worms, viruses o Internet as a complex system  critical DNS, BGP infrastructures

Worms and failures o Code Red worm  more than 360,000 infected in less than one day  disrupted parts of BGP infrastructure o SQL Slammer  less than 15 minutes to infect 75,000 hosts  congested parts of Internet  BGP errors in one network → cascade of faults in BGP in another network

Goals o what are appropriate models?  deterministic  stochastic o what makes worm/virus/failure virulent? o how does topology affect virulence?

Outline o worms, deterministic models o cascading failures, stochastic models o summary

Worm spreading behavior o scan for vulnerable hosts  sequential, random, topological  uniform, local preference o virulence sensitive to  scanning strategy  host speed, bandwidth  protocol  …

Worm spreading model  address space, size  o N vulnerable hosts  scan rate (per host),   N

Simple worm spreading model I(t) - number of infected hosts at time t Epidemic model: with initial condition I(0)

Code Red: model o measurements from two Class A networks  scan rate  I(t) o epidemic model matches increasing part of observed Code Red data (Staniford) What about decrease? o human countermeasures o congestion Zou, etal, 2002 time scan rate D. Goldsmith K. Eichman

Assumptions o classic epidemic model  ignore countermeasures  ignore congestion o Code Red parameters   = 358/min  N = 360,000  uniform scan,  2 32 o I(0) = 10 o 100s minutes to spread

Worm virulence  increase  o increase I(0)  decrease 

Worm virulence  increase  o increase I(0)  decrease  o smarter scanning

The perfect worm o perfect worm  scan vulnerable nodes exactly once o flash worm (Staniford,…)  uniform scan of vulnerable nodes (  N)

Perfect Code Red worm o I(0) = 10   = 358/min o N = 360,000 o all hosts infected within 2 sec. o add 2 sec. infection delay -> six-fold slowdown o random scan almost perfect!

o I(0) = 10   = 358/min o N = 360,000 o all hosts infected within 2 sec. o add 2 sec. infection delay -> six-fold slowdown o random scan almost perfect! Perfect Code Red worm

Hitlist, routing worms o hitlist worm  increases I(0) o routing worm  decreases   BGP table information:  =.29  2 32 –29% of IP address space

Hitlist, routing worms o Code Red style worm   = 358/min o N = 360,000 o hitlist, I(0) = 10,000 o routing worm as effective as hitlist worm o hitlist/routing worm extremely virulent

1 Local preference worm o K subnetworks o p – probability scan local subnet o (1-p) – prob. scan outside local subnet 2 K 1-p p …

Local preference worm o N k, no. vulnerable hosts in subnet k o I k (t), no. infected hosts in subnet k o fits epidemic model for interacting groups set of coupled ODEs

Local preference worm o K = 116 o N k = 360,000/K o I 1 (0) = 10; I k (0) = 0, k>1   = 358/min o provides some of the locality of a routing worm

Questions o topological worms o sequential scan o bandwidth constraints

o topology? o failure recovery?

Topology and fast/slow recovery o model description o general network topologies  conditions for fast-slow recovery o specific network topologies  complete graphs (BGP routers)  hypercubes (peer-to-peer networks)  power-law graphs (Internet AS graph; E- mail address book graph)

Susceptible-Infective-Susceptible (SIS) epidemic model Also known as contact process; see [Liggett] o topology: undirected, finite graph G=(V,E), connected ; o X v = 1 if node v down (infected) X v = 0 if node v up (healthy)

Model o {X v v  V} Markov process on {0,1} V with jump rates:  X v → 1 with rate  w → v X w  X v → 0 with rate  o unique absorbing state at 0 o all other states communicate, 0 is reachable

Time to absorption o system eventually recovers o how long does this take? o T = time to hit 0 (from a given initial condition)  how does E[T] depend on  G?

Example o G = line segment or ring with n nodes  Fix   Theorem (Durrett and Liu): There is critical  c > 0 such that,  if  c, then E[T] = O(log n)  if  c, then log E[T] ≈ n a o signature of phase transition in infinite 1-D lattice.

Fast recovery, spectral radius  - spectral radius of graph adjacency matrix, A; n=|V|. Then, P(X(t)  0) ≤ c n ½ exp([   -  ]t) Hence, when   < , Survival time T satisfies: E(T) ≤ [log(n)+1]/[  -  ]

Coupling proof Consider “Branching Random Walk”, i.e. Markov process {Y v } v  V  Y v → Y v +1 with rate  w ~ v Y w =  (AY) v  Y v → Y v -1 with rate  Y v Can couple processes so that, for all t, X(t) ≤ Y(t).

Branching random walk bound By “linearity” of Y, dE[Y(t)]/dt = (  A -  I) Y(t), so E[Y(t)] = exp(  A -  I) Y(0) ; Use P(X(t)  0) ≤  v  V E[Y v (t)]

Slow recovery Graph isoperimetric constant: “perimeter” “area” S

Generalized isoperimetric constant

Slow die-out and isoperimetric constant Suppose for some m ≤ n/2, r := [   m ] /  > 1 Then, with positive probability, epidemics survive for time at least r m /[2  m] Hence, if m = n , survival time T satisfies log (E[T]) =  (n a )

Coupling proof Let |X| =  v X v. Then |X| dominates process Z on {0,…,m} with transition rates: z → z+1 at rate   z, z → z-1 at rate  z. Then study absorption time for Z

Complete graph Here,  = n-1,  m = n-m By picking m = n a, a < 1, Thresholds: fast recovery if  /  < 1/(n-1) slow recovery if  /  > 1/(n-n a )

Hypercube {0,1} d Here, d = log 2 (n) and  = d For m=2 k, k < d,  m = d-k Hence, for k =  d, Thresholds:, fast recovery if  /  < 1/d slow recovery if  /  > 1/[d(1-  )]

Erdős-Rényi random graph o edge between each pair of nodes present with probability p n independent of others o dense: d n := np n = Ω(log n)  then ρ ~  ~ d n with high probability

Star network o spectral radius: n 1/2  isoperimetric constant:  m = 1 for all m < n/2 o general results not useful Specialized analysis yields:  for arbitrary constant c > 0, if  < c/n 1/2, fast recovery, E[T] = O(log(n))  if  /  > n a-1/2, for a > 0, slow recovery, log(E[T]) =  (n a )

Power-law random graph Power-law graph with exponent  : number of degree k vertices  k -  E.g. Internet AS graph with  = 2.1 Expected degree PLRG [Chung et al] : o expected degrees w 1 > ··· > w n : edge (i,j) present w.p. w i w j /  k w k  particular choice: w i = c 1 (i+c 2 ) - 1/(  -1)

Power-law random graph (2) Spectral radius of PLRG [Chung et al.,03]: Denote by m max. expected degree (m=w 1 ), and by d average of expected degrees. Then:

PLRG,  > 2.5 Epidemics on full graph live longer than on sub-graph. Look at star induced by node 1: slow die-out for  /  > m  -1/2 Compare to spectral radius condition: Fast die-out for  /  < m -1/2 Two thresholds differ by m  ; same gap as for star

PLRG, 2 <  < 2.5 Consider top N nodes, for suitable N; Erdős-Rényi core, with isoperimetric constant:  = F(  )  Gap between thresholds  and  : constant factor, F(  )

Open problems o gap between upper and lower bounds in  sparse ER graphs  power law random graphs for  < 2.5 o spectral radius bound tight in examples, always true? o conditioned on slow recovery, how many nodes are down at intermediate times? o extensions to other graphs and to SIR epidemics

Observations o neither parameter tight o gap for topologies with diverse degrees  spectral radius “seems” to be right o nothing between log n and exp(n  ) ?

Hitlist, routing worms o hitlist worm  increase I(0) o routing worm  decrease   BGP table information:  =.29  2 32 –29% of IP address space  /8 aggregation:  =.45  2 32 –116 out of 256 possible 8 bit prefixes 0110…0xxx 8

The appearance of phase transitions N=200, k s =1, k l =0.01 Mean time to absorption goes down from 10 47, to about 0 in a matter of few states

Accuracy of fluid model o population: 360,000  scan rate  = N(358/min, 1002) normal distr. o scanning space: 2 32 o I(0) =1 o 100 simulations

Accuracy of fluid model o population: 360,000  scan rate  = N(358/min, 1002) normal distr. o scanning space: 2 32 o I(0) =10 o 100 simulations

Accuracy of fluid model o population: 360,000  scan rate  = N(358/min, 1002) normal distr. o scanning space: 2 32 o I(0) =10 o 100 simulations

Local preference worm o  - local scan rate o  ’- global scan rate o initial conditions I k (0)

Erdős-Rényi random graph o edge between each pair of nodes present with probability p n independent of others o sparse: p n = c log(n)/n, c > 1.  then ρ ≤ c’ log(n),  ≥ c’’ log(n) with high probability, for some c’’ < c < c’ o dense: d n := np n = Ω(log n)  then ρ ~  ~ d n with high probability