1 Large Scale Malicious Code: A Research Agenda N. Weaver, V. Paxson, S. Staniford, R. Cunningham Presented by Stefan Birrer.

Slides:



Advertisements
Similar presentations
Security Issues of Peer-to-Peer Systems February 14, 2001 OReilly Peer-to-Peer Conference Nelson Minar, CTO POPULAR POWER.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Nicholas Weaver Vern Paxson Stuart Staniford UC Berkeley ICIR
Ensuring Operating System Kernel Integrity with OSck By Owen S. Hofmann Alan M. Dunn Sangman Kim Indrajit Roy Emmett Witchel Kent State University College.
Guide to Network Defense and Countermeasures Second Edition
By Hiranmayi Pai Neeraj Jain
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
USING EMET TO DEFEND AGAINST TARGETED ATTACKS PRESENTED BY ROBERT HENSING – SENIOR CONSULTANT – MICROSOFT CORPORATION MICHAEL MATTES – SENIOR CONSULTANT.
{ Best Practice Why reinvent the wheel?.   Domain controllers   Member servers   Client computers   User accounts   Group accounts   OUs 
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Univ. Massachusetts, Amherst.
Breno de MedeirosFlorida State University Fall 2005 Buffer overflow and stack smashing attacks Principles of application software security.
The State of Security Management By Jim Reavis January 2003.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham.
1 Large Scale Malicious Code: A Research Agenda N. Weaver, V. Paxson, S. Staniford, R. Cunningham.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Methods For The Prevention, Detection And Removal Of Software Security Vulnerabilities Jay-Evan J. Tevis Department of Computer Science and Software Engineering.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Lecture 11 Intrusion Detection (cont)
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
Proposed mid-term Security Strategies for CERN Prepared by ad-hoc working group members: Lionel Cons, Francois Fluckiger, Denise Heagerty, Jan Iven, Jean-Michel.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Honeypot and Intrusion Detection System
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Module 14: Configuring Server Security Compliance
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Determina DARPA PI meeting Page 2Confidential © Determina, Inc. Agenda LiveShield –Product and Technology –Current Status Applications to Application.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
1 A Secure Access Control Mechanism against Internet Crackers Kenichi Kourai* Shigeru Chiba** *University of Tokyo **University of Tsukuba.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Advanced Anti-Virus Techniques
Role Of Network IDS in Network Perimeter Defense.
MIT/Determina Application Communities, page 1 Approved for Public Release, Distribution Unlimited - Case 9649 Collaborative learning for security and repair.
© 2006, iPolicy Networks, Inc. All rights reserved. Security Technology Correlation Proneet Biswas Sr. Security Architect iPolicy Networks
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
CS703 - Advanced Operating Systems By Mr. Farhan Zaidi.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Critical Security Controls
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Introduction to Internet Worm
Presentation transcript:

1 Large Scale Malicious Code: A Research Agenda N. Weaver, V. Paxson, S. Staniford, R. Cunningham Presented by Stefan Birrer

2 Motivation and Goal ● Networking infrastructure is essential to many activities – Address the “worm thread” ● Establish taxonomy for worms ● Motivate Cyber “CDC” ● Establish a road map for research efforts

3 Challenges ● Prevention – i.e. Non-executable stacks ● Avoidance – i.e. Filter ports ● Detection – i.e. Network telescopes ● Recovery – i.e. Fix vulnerability

4 Challenges ● Spread speed is faster than human reaction time ● Further generations of worms address previous counter measurements – Smart guys behind the scene ● Monocultures in today Internet ● People are not sensitive to security

5 Taxonomy ● Activation techniques ● Propagation strategies ● Propagation carriers ● Motivation and Attackers ● Payloads

6 Ecology of Worms ● Application Design ● Buffer Overflows ● Privileges – Mail worms ● Application Deployment ● Economic Factors ● Monocultures

7 Cooperative Information Technology Org. ● CERT/CC – Human analysis and aggregation ● IIAP – Human-time analysis ● ISAC – Practices and background ● FIRST ● Public Mailing Lists

8 Commercial Entities ● Anti-virus Companies ● Network based IDS Vendors ● Centralized Security Monitoring ● Training Organizations ● Limited Scope of Commercial Response

9 Cyber CDC ● Identify outbreaks ● Rapidly analyzing pathogens ● Fighting infections ● Anticipating new vectors ● Proactively devising detectors for new vectors ● Resisting future threats

10 Vulnerability Prevention Defenses ● Programming Languages and Compilers – Safe C Dialects (C, active area) ● Enforcing type- and memory-safety ● Ccured / Cyclone ● [future] extending to C++ – Software Fault Isolation (C, active area) ● Memory safe sandboxes ● Lack of availability of SFI-based systems – StackGuard (C, active area) ● Compiler calling-convention ● Works well against conventional stack attacks

11 Vulnerability ● Programming Languages and Compilers – Nonexecutable Stacks and Heaps w/ Randomized Layouts (B, mostly engineering) ● Randomizing layout ● Guard pages, exception when accessed ● No attempt to build such a complete system – Monitoring for Policy- and Semantics-Enforcement (B, opportunities for worm specific monitoring) ● System call patterns (“mimicry” attack) ● Static analysis ● [future] increase performance and precision

12 Vulnerability ● Automatic vulnerability analysis (B, highly difficult, active area) – Discover buffer overflow in C – Sanitized integers – User-supplied pointers for kernel – [future] assemply level – [future] specific patterns of system calls

13 Vulnerability Prevention Defenses ● Privilege Issues – Fine-grained Access Control (C, active area) ● [future] integrating into commodity OS – Code Signing (C, active area) ● Publi-key authentication – Privilege Isolation (C, some active research, difficult) ● Mach kernel

14 Vulnerability ● Protocol Design – Design Principles (A, difficult, low cost, high reward) ● Open problem – Proving Proto Properties (A, difficult, high reward) ● Worm resistant properties -> verify ● [future] interpreter detects violation of protocol – Distributed Minable Topology (A, hard but critical) ● Match subset, not the entire list – Network Layout (C, costly) ● Never co-occur (i.e. strictly client / server)

15 Vulnerability ● Network Provider Practices – Machine Removal (C, already under development) ● No standard protocol ● Implementation Diversity – Monoculture is a dangerous phenomena

16 Vulnerability ● Synthetic Polycultures – Synthetic polycultures (C, difficult, may add unpredictability) ● [future] techniques to develop synthetic polycultures ● [future] Code obfuscation ● Economic and Social – Why is Security Hard (B, active area of research) ● [future] understanding of why practices remain so poor

17 Automatic Detection of Malicous Code ● Host-based detectors – Host-based Worm Detection (A, Critical) ● Contagion worms ● IDS – Existing Anti-virus Behavior Blocking (A, Critical) ● Behavior blocking (usability and false positives) – Wormholes / honeyfarms (A, Low Hanging Fruit) ● Excellent detector / machine cost ● Must target the cultured honepots...

18 Detection ● Network-level detectors – Edge Network Detection (A, critical, powerfull) ● Large number of scans – Backbone Level Detection (B, hard, difficult to deplay) ● Routing is highly asymmetric ● Correlation of Results – Centralized (B, Some commercial work) – Distributed (A, powerful, flexible) – Worm Traceback (A, high risk, high payoff) ● No attention to date in research community ● [future] Network telescopes

19 Automated Response to Malicious Code ● Host-Based (B, overlaps with personal firewall) – Open question ● Edge Network (A, poweful, flexible) – [future] Filter traffic (side effects...) ● Backbone/ISP Level (B, difficult, deployment issues) – [future] Limitation of outbound scanning ● National Boundaries (C, too coarse grained) ● Graceful Degradation and Containment (B, mostly engineering) – [future] Quarantine sections

20 Aids to Manual Analysis of Malicious Code ● Collaborative Code Analysis Tool (A, scaling is important, some ongoing research) ● Higher Level Analysis (B, important, Halting problem imposes limitations ● Hybrid Static-Dynamic Analysis (A, hard but valuable) ● Visualization (B, mostly educational value) – [future] Real-time analysis – [future] what information might be gathered

21 Aids to Recovery ● Anti-worms (C, impractical, illegal) ● Patch distribution in a hostile environment (C, already evolving commercially) ● Updating in a hostile environment (C, hard engineering, already evolving) – Metamorphic code to insert a small bootstrap program

22 Policy considerations ● Privacy and Data Analysis ● Obscurity ● Internet Sanitation – Scan limiters ● The “Closed” Alternative – Apply restrictions

23 Challenging Problems ● Common evaluation framework ● Milestones for detection – False positive ● Milestones for analysis – Capture – Understand ● Detecting targeted worms ● Tools for validating defenses – Internet Wide Worm Testbed (A, essential) – Testing in the Wild (A, essential)

24 Conclusions ● Worms are a significant thread ● Limited number of strategies ● Inadequate defensive infrastructure ● Cyber CDC – Prevention role ● Huge potential damage

25 Problems ● Build tomorrows security system based on todays worm technologies – Will always be one step behind – Reactive ● Need to address root cause instead of patching things – Prevention

26 ?