The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics.

Slides:



Advertisements
Similar presentations
Buffer Overflows Nick Feamster CS 6262 Spring 2009 (credit to Vitaly S. from UT for slides)
Advertisements

Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 3. Program Security -- Part I.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 URL: Security.
C risis And A ftermath Eugene H. Spafford 발표자 : 손유민.
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
CSE331: Introduction to Networks and Security Lecture 32 Fall 2002.
Week 6 - Friday.  What did we talk about last time?  Viruses and other malicious code.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Lecturer: Fadwa Tlaelan
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
October 15, 2002Serguei A. Mokhov, 1 UNIX Security 2: A Quick Recap SOEN321 - Information Systems Security Revision 1.3 Date: September.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
The Internet Worm Crisis and Aftermath Miyu Nakagawa Cameron Smithers Ying Han.
F HEPNT/HEPIX Sept, 1999 Use of SPQuery and STAT At FNAL.
CSE331: Introduction to Networks and Security Lecture 33 Fall 2002.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
1 Lecture 7 Security Problems and Virus 2 Contents u How things go wrong u Change in environment u Bound and syntax checking u Convenient but dangerous.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
Introduction of Internet security Sui Wang IS300.
1 Viruses and Worms. ECE Agenda How viruses work Virus detectors How worms work Example viruses/worms  Melissa  Morris  My_SQL Lab discussion.
Terminology Worm –A computer program that duplicates itself over computer networks. Virus –A computer program that inspects it’s environment and copies.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
Security at NCAR David Mitchell February 20th, 2007.
Security CS Introduction to Operating Systems.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Topic 5: Basic Security.
Crisis And Aftermath Eugene H. Spafford 이희범.  Introduction  How the worm operated  Aftermath Contents.
Programmed Threats Richard Newman. What is a Programmed Threat? Potential source of harm from computer code May be in form of - Executable program - Executable.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
(Mis)Use Cases for the Grid Dane Skow Fermilab September 29, 2004.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
A Failure to Learn from the Past Presented by Chad Frommeyer CSC 493/593 Professors Charles E. Frank/James Walden.
A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
An Evening with Berferd Bill Cheswick, USENIX 1990 Presented by Chris Grier.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Introduction to Computer Systems. Stacks and Buflab Recitation 3 Monday September 21th, 2009.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Network Attacks Instructor: Dr. X. Outline Worms DoS.
The Internet Worm Compromising the availability and reliability of systems through security failure.
Author: Matthew M. Williamson, HP Labs Bristol
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Internet Worms, SYN DOS attack
Security.
Chap 10 Malicious Software.
Operating System Concepts
Crisis and Aftermath Eugene H. Spafford
Crisis and Aftermath Morris worm.
Presentation transcript:

The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics for Discussion –Major Security Flaws that were exploited, etc.  Brief Chronology of reaction

Attack Format Worm vs. Virus  Worm: –A program that can run independently and can propagate a fully working version of itself to other machines  Virus: –Code that injects itself into other programs. It cannot run independently –its “host” program must run to activate it

Worm Format  Worm is named by its method of propagation  Worms are not necessarily bad!  It wriggles from machine to machine, but could do useful work –Clean up –Compare security experience across machines –Accumulate application data related to people on a 24 hour schedule

Attack Specifications Overview  Infected the Internet on November 2 nd, 1988  Systems affected –Unix BSD (4 variants) Sun Microsystems Sun 3 DEC VAX Systems  Note that one strength of the net (& computer systems in general) lies in heterogeneity

Attack Specifications Overview (Cont)  Net community surprised at pervasiveness –UVa was affected  Overall effect was heavily loaded machines -- they stopped doing productive work  End Result –Less than 5% of the machines on an insecure network were affected for less than a few days –Slowed and occasionally crashed the infected machines

Generalized Worm Operation  Two main parts: –Bootstrap or Vector Program Acts as a hook. It is injected first. It contacts the infected “server” and uploads the main program. It then complies and runs the main program –Main Program Collected data on other networked machines to which the current machine could connect The main program then used 3 main attacks to infect other systems with the bootstrap

Main Program Method of Attacks  Fingerd and gets –Overran the finger command input buffer -- wrote stack –On Vax machines this resulted in a remote shell for the worm via the TCP connection by overwriting part of the stack.  Sendmail –Issued a DEBUG option often left usable by administrators for testing the mail service. It gained access to the mail server and onto the system. Then continued with infection of system.

Main Program Method of Attacks cont…  Passwords –Worm read through etc/hosts.equiv and /.rhosts to find names other machines –Also read /etc/passwd and.forward for account information –Then, attempted to crack passwords using several different methods

Passwords  The worm first tried simple choices. For example: Account, User Name, Tnuocca (acct backwards), etc. including lowercase variations  Next it tested the passwords against an internal dictionary of 432 words  Finally, it tested the passwords against an online dictionary using upper and lower case variations

Timeline  A long several of days  Commenced 5pm, 2 November, 1988  Spread rapidly –8am (3 Nov) UVa CS machines fully loaded doing nothing  Systems started disconnecting from net  Afternoon (3 Nov) sys admins exchanging attack halt patches

Timeline (cont)  11:30 pm (3 Nov) DCA inhibits mailbridges between ArpaNet and MilNet  Attack method getting to be understood  Software patches posted via mailing lists  Nov 4: Perpetrator identified, Robert Morris at Cornell  By Nov 8 (one week later), most machines were re-connected to Net; traffic patterns were normal –3 weeks later some machines still not back

Hiding  Worm checked for copies of self –attempted to connect to others via predetermined TCP socket –Told others to quit  One in 7 worms never checked -- ah, immortality  Worm forked and killed parent ==> one process ID did not appear to be the CPU time hog

Aftermath  Damage was loss of (stolen) resources  Motive was, I suppose, just to try it  Cornell Provost labels actions unethical-- suspended for a year  Debate at the time -- some considered hacking to be “ok” -- “its there!”  Court case

Aftermath (cont)  Worm halted because informal communication between sys admins and research community  Evidenced clear need for community reaction capability  Prompted DARPA to create CERT -- Computer Emergency Response Team (CMU)