Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,

Slides:



Advertisements
Similar presentations
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Advertisements

Fast Worm Propagation In IPv6 Networks Malware Project Presentation Jing Yang
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Modeling the spread of active worms Zesheng Chen, Lixin Gao, and Kevin Kwiat bearhsu - INFOCOM 2003.
Internet Quarantine: Requirements for Containing Self- Propagating Code David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage.
1 BGP Security -- Zhen Wu. 2 Schedule Tuesday –BGP Background –" Detection of Invalid Routing Announcement in the Internet" –Open Discussions Thursday.
Network Security Testing Techniques Presented By:- Sachin Vador.
The Phoenix Recovery System: Rebuilding from the ashes of an Internet catastrophe Flavio Junqueira, Ranjita Bhagwan, Keith Marzullo, Stefan Savage, and.
Very Fast containment of Scanning Worms Presenter: Yan Gao Authors: Nicholas Weaver Stuart Staniford Vern.
Copyright Silicon Defense Worm Overview Stuart Staniford Silicon Defense
Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.
Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Honeypot and Intrusion Detection System
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Stamping out worms and other Internet pests Miguel Castro Microsoft Research.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Networks Worms Research and Engineering Challenges Stefan Savage Department of Computer Science and Engineering University of California, San Diego Joint.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
SPYCE/May’04 coverage: A Cooperative Immunization System for an Untrusting Internet Kostas Anagnostakis University of Pennsylvania Joint work with: Michael.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
HoneyStat: Local Worm Detection Using Honeypots David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, et al from Georgia Institute of Technology Authors: The.
Role Of Network IDS in Network Perimeter Defense.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Vigilante: End-to-End Containment of Internet Worms Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang and Paul Barham.
Epidemic Profiles and Defense of Scale-Free Networks L. Briesemeister, P. Lincoln, P. Porras Presented by Meltem Yıldırım CmpE
Internet Quarantine: Requirements for Containing Self-Propagating Code
EN Lecture Notes Spring 2016
Filtering Spoofed Packets
Worm Origin Identification Using Random Moonwalks
DDoS Attack Detection under SDN Context
Effective Social Network Quarantine with Minimal Isolation Costs
Modeling, Early Detection, and Mitigation of Internet Worm Attacks
Jonathan Griffin Andy Norman Jamie Twycross Matthew Williamson
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California, San Diego Published: IEEE Infocom 03, San Francisco Presented By: Darshan Purandare

Outline  Introduction  Background  What’s worm, especially Code-Red  Prevention, Treatment and Containment of the worm  Model  SI epidemic model and Code Red propagation model  Idealized Deployment  Practical Deployment  Conclusion

Introduction  Dramatic Increase of “worm” outbreaks  Code-Red recovery cost in excess of $2.6 billion  Still unequipped to tackle such system and software vulnerabilities  Factors for the spread of epidemic infections  Vulnerability of population  Length of Infectious period  Rate of Infection  These map to  Prevention  Treatment  Containment

Prevention  Reduces the size of the vulnerable population  Limits the worm outbreak  Vulnerability == function (Insecure S/W Engg Practices)  System and Software security are widely researched  Pro-active prevention measures are not enough

Treatment  Virus detectors and system update feature in MS Windows  Reduces vulnerable population  Reduces rate of infection  Can’t provide short-term relief during acute outbreak  Time to design, develop and test security update  Insignificant for actively spreading worms  Took on an average 16 days to eliminate Code-Red vulnerability, many were pending till 6 weeks later

Containment  Containment is used to protect individual networks, and isolate infected hosts  Firewalls, Content Filters and Automated routing blacklists  Reduce/Stops spread of infection  During Code-Red epidemic  Blocking inbound access to TCP port 80  Content filtering based on Code-Red specific signature  Isolating infected hosts (blocking hosts outbound access to TCP port 80)  These quarantine measures gave limited protection to portions of the internet, if not halt the spread of infection

Why Containment is so important ???  Most viable alternative among all three  It can be completely automated  Can be deployed in the network  Its possible to implement a solution w/o requiring universal deployment on every internet hosts

Aims and Approach  To investigate use of widespread containment mechanisms  Authors don’t propose any particular technology for detection and containment of worms “How effectively can any containment approach counter a worm epidemic on the internet?”……  Consider containment systems in 3 abstract properties  Detection and Reaction Time  Strategy for Identification and Containment of the pathogen  Breadth and Topological Placement of Containment System  Used Code-Red empirical Internet topology data for simulation and analysis of a worm spread under various defense mechanisms

SI Epidemic Model  A vulnerable machine is described as susceptible (S) machine.  A infected machine is described as infected (I)  Let N be the number of vulnerable machines.  Let S(t) be the number of susceptible host at time t, and s(t) be S(t)/N, where N = S(t) + I(t).  Let I(t) be the number of infected hosts at time t, and i(t) = I(t)/N  Let be the contact rate of the worm.  Define:

SI Model Solving the differential equation: where T is a constant

Code Red Propagation Model Code Red generates IPv4 address randomly. Thus, there are totally 2^32 addresses Let r be the probe rate of a Code Red worm

Code Red Propagation Model  Two problems  Cannot model preferential targeting algorithm e.g. select targets form address ranges closer to the infected host  The rate only represents average contact rate e.g. a particular epidemic may grow significantly more quickly by making a few lucky targeting decisions in early phase.

Code Red Propagation Model  Example on 100 simulations on Code Red propagation model: After 4 hours: 55% on average 80% in 95 th percentiles 25% in 5 th percentiles

Modeling Containment Systems A containment system has three important properties:  Reaction Time  Containment Strategy  Deployment Scenario

Reaction Time  Detection of malicious activity  Propagation of the containment information to all hosts participating the system  Activating any containment strategy

Containment Strategy I. Address blacklisting  Maintain a list of IP addresses that have been identified as being infected.  Drop all the packets from one of the addresses in the list.  E.g. Mail filter.  Advantage: can be implemented easily with existing firewall technology  Limitation: Needs to be updated continuously

Containment Strategy II Content filtering  Requires a database of content signatures known to represent particular worms  This approach requires additional technology to automatically create appropriate content signatures  Advantage: a single update is sufficient to describe any number of instances of a particular worm implementation  Works well with unintended DoS attack

Deployment scenarios  Ideally, a global deployment is preferable.  Practically, a global deployment is impossible.  Can be deployed  At the edge of the corporate networks like firewalls  By ISPs at the access points and exchange points in the network

Idealized Deployment Simulation goal To find how short the reaction time is necessary to effectively contain the Code-Red style worm. Simulation Parameters  360,000 vulnerable hosts out of 2 32 hosts.  Probe rate of a worm : 10 per sec Containment strategy implementation –Address blacklisting Send IP addresses of infected hosts to all participating hosts. –Content filtering Send signature of the worm to all participating hosts.

Idealized Deployment Result: Content filtering is more effective… 20 min 2 hr Number of susceptible host decreases Worms unchecked

Idealized Deployment Next goal  To find the relationship between containment effectiveness and worm aggressiveness.  Figures are in log-log scale.

Idealized Deployment Percentage of infected hosts Address blacklisting is hopeless when encountering aggressive worms.

Practical Deployment  Network Model –AS sets in the Internet:  routing table on July 19, 2001 from Route Views  1 st day of the Code Red v2 outbreak. –A set of vulnerable hosts and ASs:  Use the hosts infected by Code Red v2 during the initial 24 hours of propagation.  A large and well-distributed set of vulnerable hosts.  338,652 hosts distributed in 6,378 ASs.

Practical Deployment  Deployment Scenarios  Use content filtering only.  Filtering firewall are deployed on the borders of both the customer networks, and ISP’s networks. Deployment of containment strategy.

Practical Deployment  Reaction time: 2hrs Difference in performance because of the difference in path coverage.

Practical Deployment System fails to contain the worm.

Conclusion Explored the properties of the containment system  Reaction time  Containment strategy  Deployment scenario In order to contain the worm effectively  Require automated and fast methods to detect and react to worm epidemics.  Content filtering is the most preferable strategy.  Have to cover all the Internet paths when deploying the containment systems

Strengths Simple, very well written Reasonable assumptions and real world data for simulation Quantified the quarantine properties of worm epidemics Gives head-start for developers and security people by quantifying reaction time at hand for various scenarios Recommendations to ISPs and ASs, more cooperation and coordination among ISPs needed

Weak Links Simulator details and source code not public SI epidemic model doesn’t capture all the dynamics Pessimistic picture ahead

Questions, Concerns, Issues ???