Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Authors: Oleg Kolensnikov and Wenke Lee Published: Technical report, 2005, College.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Greg Williams CS691 Summer Honeycomb  Introduction  Preceding Work  Important Points  Analysis  Future Work.
Impeding Malware Analysis Using Conditional Code Obfuscation Paper by: Monirul Sharif, Andrea Lanzi, Jonathon Giffin, and Wenke Lee Conference: Network.
Polymorphic Viruses A brief survey Joseph Hamm Shirlan Johnson.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
1 Polymorphic Blending Attacks By Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov and Wenke Lee Presented by Jelena Mirkovic Topic 1.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
IDS/IPS Definition and Classification
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Intrusion Detection Systems and Practices
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
HUNTING FOR METAMORPHIC ENGINES Mark Stamp & Wing Wong August 5, 2006.
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic Worm Exploits.
seminar on Intrusion detection system
Pairwise Alignment of Metamorphic Computer Viruses Student:Scott McGhee Advisor:Dr. Mark Stamp Committee:Dr. David Taylor Dr. Teng Moh.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Building Survivable Systems based on Intrusion Detection and Damage Containment Paper by: T. Bowen Presented by: Tiyseer Al Homaiyd 1.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A Statistical Anomaly Detection Technique based on Three Different Network Features Yuji Waizumi Tohoku Univ.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by:Manoj Kumar Gantayat CS: Technical Seminar Presentation by MANOJ KUMAR GANTAYAT.
Vulnerability-Specific Execution Filtering (VSEF) for Exploit Prevention on Commodity Software Authors: James Newsome, James Newsome, David Brumley, David.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES By: Eric Chien and Peter Szor Presented by: Jesus Morales.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
Detection of ASCII Malware Parbati Kumar Manna Dr. Sanjay Ranka Dr. Shigang Chen.
Structure Classifications &
DoWitcher: Effective Worm Detection and Containment in the Internet Core S. Ranjan et. al in INFOCOM 2007 Presented by: Sailesh Kumar.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Hunting for Metamorphic Engines Wing Wong Mark Stamp Hunting for Metamorphic Engines 1.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Telecommunications Networking II Lecture 41f Viruses and Worms.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
CISC Machine Learning for Solving Systems Problems Presented by: Sandeep Dept of Computer & Information Sciences University of Delaware Detection.
Module 7: Advanced Application and Web Filtering.
Intrusion Detection System (IDS). What Is Intrusion Detection Intrusion Detection is the process of identifying and responding to malicious activity targeted.
DETECTING TARGETED ATTACKS USING SHADOW HONEYPOTS AUTHORS: K. G. Anagnostakisy, S. Sidiroglouz, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytisz.
Cryptography and Network Security Sixth Edition by William Stallings.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Polygraph: Automatically Generating Signatures for Polymorphic Worms Presented by: Devendra Salvi Paper by : James Newsome, Brad Karp, Dawn Song.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Intrusion Detection/Prevention Systems. Objectives and Deliverable Understand the concept of IDS/IPS and the two major categorizations: by features/models,
Intrusion Detection System
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Effective Anomaly Detection with Scarce Training Data Presenter: 葉倚任 Author: W. Robertson, F. Maggi, C. Kruegel and G. Vigna NDSS
Polygraph: Automatically Generating Signatures for Polymorphic Worms Authors: James Newsome (CMU), Brad Karp (Intel Research), Dawn Song (CMU) Presenter:
CS5261 Information Security CS 526 Topic 15 Malware Defense & Intrusion Detection Topic 15: Malware Defense.
Some Great Open Source Intrusion Detection Systems (IDSs)
Internet Quarantine: Requirements for Containing Self-Propagating Code
POLYGRAPH: Automatically Generating Signatures for Polymorphic Worms
Techniques, Tools, and Research Issues
Operating system Security
Chap 10 Malicious Software.
Hardware Security – Highlevel Survey Review for Exam 4
Intrusion Detection system
Chap 10 Malicious Software.
Introduction to Internet Worm
Intrusion Detection Systems
Presentation transcript:

Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Authors: Oleg Kolensnikov and Wenke Lee Published: Technical report, 2005, College of Computing, Georgia Institute of Technology Presented By: Sherri Sparks

Computer Worms Worms are to networks as viruses are to hosts. Worms replicate & infect network nodes in the same sense viruses replicate & infect applications on a local computer system Worms, are unlike viruses, in the sense that they are autonomous (i.e. they are capable of spreading without human intervention)

Historical Overview of Computer Worm Evolution Worm Developer Simple (nonobsfucated) worms Polymorphic (obsfucated) worms Advanced worms (obsfucated and anti- detection coutermeasures) Worm Detector Misuse (signature) detection Anomaly (heuristic) detection ? Coevolutionary Adaptation & Response We are here!

Simple Worms Components Payload  Worm code body Exploit vector  System weakness whereby the worm “gets in” (usually some underlying vulnerability in the Operating System or a common application) NOTE: the code body and exploit vectors for simple worms are invariant Scan / Compromise / Replicate pattern of behavior 1. Scan for vulnerable system 2. Infect system (inject payload) via exploit vector 3. Goto 1

Misuse Detection i.e. “fingerprinting” (1) Network traffic is scanned for a sequence of bytes that matches a binary pattern unique to a particular worm payload Pros Simple implementation Highly accurate for detecting existing worms Cons Can be fooled by polymorphism and VMM hooking techniques Not capable of detecting new worms! Assumes code body invarience (i.e. non polymorphic code)

Polymorphic Worms Violate the misuse detectors assumption that the worm code body is invarient A polymorphic worm is capable of mutating the appearance of its binary code from one version to the next Difficult / Impossible to find a reliable, consistent signature across all worm versions Semantically different, but functionally equivalent code Analogy to English “synonyms” Polymorphic worms may also have varient exploit vectors

Polymorphism Weakness: The code body is encrypted differently, but the decryptor may remain invarient making it possible to obtain a signature from the decryptor. …Unless Metamorphism is used…

Metamorphism NOTE: A decryptor which uses matamorphism may be even more difficult to obtain a signature because the decryptor is now varient in addition to the encrypted code body !

How do they do that? Junk code insertion Interleaving useful instructions with junk instructions (nop, inc reg / dec reg pairs) Instruction Substitution Using different instructions to achieve the same result Register Renaming Shuffeling the register set used by the polymorphic worm

Writing polymorphic worms is getting easier… Why reinvent the wheel? …When ready made polymorphic “toolkits” exist for drag n’ drop worm creation ;) ADMutate CLET JempiScodes

Anomaly Detection Heuristic Detectors Work by recognizing deviations in “normal” system or network patterns or which are indicative of worm behaviors Average size and rate of normal packets Byte frequency districtutions Time information Useful for detecting polymorphic worms where it is difficult to obtain a reliable signature Pros Can identify compromises by new, previously unknown worms! Cons Can identify general worm activity but not specific worms Sometimes difficult to define “normal” activity Problems with false positives

Taking it to the next level… Introducing Advanced Polymorphic Worms Attack the heuristics used by anomaly based IDS The goal of this paper is to show proof of concept that this is possible: i.e. to show that it is feasible to gather a normal traffic profile and use it to evade an anomaly based IDS

Experimental Design 3 Components 1. Implementation of a “test” polymorphic worm 2. Design & implementation of a “traffic blender” capable of generating network traffic that can defeat the heuristics used by anomaly based IDS 3. Testing of the polymorphic worm / traffic blender against several known network IDS

Implementation of the “test” polymorphic worm Exploit Vector Windows Media Services Exploit (MS03-022) Simple buffer overflow exploit on port 80 Malformed HTTP request packets cause overflow Polymorphic Worm Design Simple decryptor / loader design using existing toolkits and technologies Implemented w/ Visual C++.NET using CLET engine

Traffic Blender Design (1) Goal: Exploit statistical properties of network traffic used by IDS to differentiate between “normal” and “attack” traffic. These include… Maximum & average size and rate of packets Byte frequency distributions Ranges for values present at different offsets Time information Precedence / Antecedents (i.e. when a packet must be followed by a specific response or sequence of packets) The authors choose 3 metrics for blending Byte frequencies Ranges for values at different offsets Packet size

Traffic Blender Design (2) “Exploit Invarients” Parts or properties that must be present for an exploit to work. In this case, the exploit is based upon a malformed HTTP request packet…Thus, Exploit invariants include the “POST” request line and strings such as “Content-type”, “Content- length”, and “Mx_stats_logline) The position of exploit invariant strings in the packet may be either fixed or not fixed

Traffic Blender Design (3) “Rules” Obtained by analyzing 4 anomaly based IDS The input binary is “encoded” such that it adheres to the following rules… Easy to encode the worm body May be difficult to encode the “decryptor” which must consist of executable assembly instructions! Rule 1 The output must only consist of bytes that have non-zero frequency in normal traffic Rule 2 The frequency of bytes in the output must be equal or close to the bytes’ frequencies in normal traffic Rule 3 The output must use the bytes within the allowed range for any given offset, if possible

View of Blended Exploit Buffer

Testing The Traffic Blender Worm Tested against 4 anomaly IDS NETAD PAYL distance-based Anomaly IDS Service-specific Anomaly IDS Abstract Payload Execution (APE) All tested IDS were evaded using the traffic blending worm

Paper Strengths Innovative and Interesting “offensive” slant for an academic paper ;) It is refreshing to see some “good guys” capable of thinking like the “bad guys”! Serves as an early warning and gives researchers a “head start” on detection for next generation worms!

Paper Weaknesses Could have used a bit more background information Related work should have been at the beginning of the paper! Do polymorphic worms exist in the “wild” or are they only theoretical at this point? Designed their worm based only upon a-priori knowledge of the heuristics used by the IDS they tested it against (a little circular here ;)

Future Extensions Blind testing of their “traffic blender” against other IDS for which the exact heuristics are unknown More representative of success of such a worm “in the wild” since it is unlikely a wild worm would have reverse engineered the heuristics of all network IDS Further study of how “exploit invariants” affect a worm’s ability to “blend in” Is this a significant problem for a worm in a majority of exploits? …Or is it a more isolated, theoretical problem when considered in the practical realm? How would “traffic blending” affect the rate of worm propagation on the internet ?

?