Stamping out worms and other Internet pests Miguel Castro Microsoft Research.

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

Remote Procedure Call (RPC)
By Hiranmayi Pai Neeraj Jain
Bouncer securing software by blocking bad input Miguel Castro Manuel Costa, Lidong Zhou, Lintao Zhang, and Marcus Peinado Microsoft Research.
1 Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code (DOME) Subha Ramanathan & Arun Krishnamurthy Nov 15, 2005.
Design of a Framework for Testing Security Mechanisms for Program-Based Attacks Ben “Security” Breech and Lori Pollock University of Delaware.
Vigilante: End-to-End Containment of Internet Worms Paper by: Manuel Costa, Jon Crowcroft, Miguel Castro, Ant Rowstron, Lidong Zhou, Lintao Zhang, Paul.
Securing software by enforcing data-flow integrity Manuel Costa Joint work with: Miguel Castro, Tim Harris Microsoft Research Cambridge University of Cambridge.
Stopping Worm/Virus Attacks Chiu Wah So (Kelvin).
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
An Integrated Framework for Dependable Revivable Architectures Using Multi-core Processors Weiding Shi, Hsien-Hsin S. Lee, Laura Falk, and Mrinmoy Ghosh.
Vigilante and Potemkin Presenter: Ýmir Vigfússon Based in part on slide sets from Mahesh Balakrishnan and Raghavan Srinivasan.
Achieving Trusted Systems by Providing Security and Reliability Ravishankar K. Iyer, Zbigniew Kalbarczyk, Jun Xu, Shuo Chen, Nithin Nakka and Karthik Pattabiraman.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Analyzing Cooperative Containment Of Fast Scanning Worms Jayanthkumar Kannan Joint work with Lakshminarayanan Subramanian, Ion Stoica, Randy Katz.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
Vigilante: End-to-End Containment of Internet Worms M. Costa et al. (MSR) SOSP 2005 Shimin Chen LBA Reading Group.
March 24, 2003Upadhyaya – IWIA A Tamper-resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors R. Chinchani.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Lecture 11 Intrusion Detection (cont)
An Overview Zhang Fu Outline What is DDoS ? How it can be done? Different types of DDoS attacks. Reactive VS Proactive Defence.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Vulnerability-Specific Execution Filtering (VSEF) for Exploit Prevention on Commodity Software Authors: James Newsome, James Newsome, David Brumley, David.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Survey “Intrusion Detection: Systems and Models” “A Stateful Intrusion Detection System for World-Wide Web Servers”
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Resisting Denial-of-Service Attacks Using Overlay Networks Ju Wang Advisor: Andrew A. Chien Department of Computer Science and Engineering, University.
Vulnerability-Specific Execution Filtering (VSEF) for Exploit Prevention on Commodity Software Authors: James Newsome, James Newsome, David Brumley, David.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz.
Highly Scalable Distributed Dataflow Analysis Joseph L. Greathouse Advanced Computer Architecture Laboratory University of Michigan Chelsea LeBlancTodd.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Intrusion Detection System
Sampling Dynamic Dataflow Analyses Joseph L. Greathouse Advanced Computer Architecture Laboratory University of Michigan University of British Columbia.
Autonomic Response to Distributed Denial of Service Attacks Paper by: Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
An Active Security Infrastructure for Grids Stuart Kenny*, Brian Coghlan Trinity College Dublin.
A Validation System for the Complex Event Processing Directives of the ATLAS Shifter Assistant Tool G. Anders (CERN), G. Avolio (CERN), A. Kazarov (PNPI),
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa Joint work with: Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang,
Network Security Lab Jelena Mirkovic Sig NewGrad presentantion.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Outline Introduction Characteristics of intrusion detection systems
Detecting Targeted Attacks Using Shadow Honeypots
Authors: Helen J. Wang, Chuanxiong Guo, Daniel R
All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) Edward J. Schwartz, Thanassis.
Introduction to Internet Worm
Sampling Dynamic Dataflow Analyses
Presentation transcript:

Stamping out worms and other Internet pests Miguel Castro Microsoft Research

The challenge worms are bad –worms can infect many machines –attacker gains control of infected machines –worm propagation disrupts Internet traffic it is crucial to prevent these attacks –not a new challenge but no solution yet –the problem is as serious as ever

Preventing worm infections techniques to prevent bugs are important –type safe languages, static analysis, … –but unlikely to remove all bugs from services need research on worm containment –worms spread too fast for human response –worm containment must be automatic

Automatic worm containment previous solutions are network centric –they analyze network traffic –block suspect packets no vulnerability information at network level –false negatives: worm traffic appears normal –false positives: good traffic misclassified –fundamental problem false positives are a barrier to automation

End-to-end worm containment host-based cooperative detection –detector runs instrumented software –analyzes infection attempt to generate an alert –distributes alert to other hosts host-based protection –hosts analyze exploit described by alert –generate protection mechanism automatically for example, a filter to block worm packets first steps: Vigilante [Costa et al, SOSP 2005]

Better host-based detectors existing detectors are not sufficient –easily bypassed (e.g., stack canaries, NX) –high overhead (e.g., program shepherding) –poor coverage of some attack classes better instrumentation to detect more worms –low false positives and false negatives –widely applicable (ideally to any binary) –low overhead (no alerts if negligible overhead)

Better host-based protection robust automatic protection –block all polymorphic variants of detected worms –no false positives –fast inoculation: fast alert distribution, fast deployment of protection efficient protection –provide good performance for legitimate requests –existing high coverage detectors are too expensive –recovery after detection is also expensive

Better survivability worm containment will not be perfect must survive compromised hosts –without disruptions to critical services –without loss of critical data better Byzantine fault tolerant replication –keep faults below threshold with high probability

Conclusion worms and viruses must be stopped need more research to stop them proposed a new research focus requires research spanning –operating systems, networking, programming languages, and distributed systems

Vigilante’s components Detection SCA generation SCA distribution SCA verification Protection

Outline self-certifying alerts detection and generation of self-certifying alerts generation of vulnerability filters evaluation next steps

Self-certifying alerts identify an application vulnerability –describe how to exploit a vulnerability –contain a log of events, verification information enable hosts to verify if they are vulnerable –hosts modify events to signal verification success –hosts replay events in sandboxed application –there are no false positives enable cooperative worm containment without trust

SCA types arbitrary execution control (AEC) –attacker can load a value in message into the PC arbitrary code execution (ACE) –attacker can execute code in message arbitrary function argument (AFA) –attacker can call function with arbitrary argument

Verifying an AEC alert vulnerable process normal code verified SCA: message log verification information 0x ReceiveMessage() 0x proves that external interfaces allow arbitrary control of the execution

SCA generation log events generate SCA when worm is detected –compute verification information –search log for relevant events –generate tentative version of SCA –repeat until verification succeeds detectors may guide search –dynamic dataflow analysis is one such detector

Dynamic dataflow analysis high coverage and low false positive rate allows direct extraction of verification information return address msg buffer (a)Memory before vulnerable code (b)Memory after vulnerable code id100 id400 stack pointer return address msg buffer id100 id400 id100 id400 stack

Cooperative worm containment SCA enables cooperative containment –any host can be a detector –hosts can run high-overhead detection engines –hosts can run different detection engines NX, … –small TCB for SCA verification cooperation enables low false negative rate

SCA broadcast uses secure Pastry –hosts join overlay –detectors flood alerts over overlay links denial-of-service prevention –per-link rate limiting –per-hop filtering and verification can reach vulnerable hosts with high probability

Protection hosts generate filter from SCA dynamic data and control flow analysis –run vulnerable application in a sandbox –track control and data flow from input messages –compute conditions that determine execution path –filter blocks messages that satisfy conditions filters can block polymorphic worms no false positives by design

Vulnerability filter generation mov al,[netbuf] mov cl,0x31 cmp al,cl jne out xor eax,eax loop: mov [esp+eax+4],cl mov cl,[eax+netbuf+1] inc eax test cl,cl jne loop out: Conditions: netbuf[0] == 0x31 netbuf[1] != 0 netbuf[2] != 0 0x310x240x670x420x0 netbuf

Evaluation three real worms: –Slammer (SQL server), Blaster (RPC), CodeRed (IIS) measurements of prototype implementation –SCA generation and verification –filter generation –filtering overhead simulations of SCA propagation with attacks

Time to generate SCAs

Time to verify SCAs

Time to generate filters

Filtering overhead

Containing Slammer

Increasing infection rate ß is Slammer’s infection rate (the rate at which a host infects new hosts)

Increasing verification time

Increasing seed hosts

Conclusion Vigilante can contain worms automatically –requires no prior knowledge of vulnerabilities –no false positives –low false negatives