Download presentation
Presentation is loading. Please wait.
1
Worm Defense
2
Outline Worm “How to Own the Internet in Your Spare Time” Worm defense Discussions
3
What is a worm? An independent program that seeks out new hosts, from an existing host in order to further spread itself. Other definition: Programs which are able to replicate themselves (usually across computer networks) as stand alone programs (or sets of programs) and which do not depend on the existence of a host program are called computer worms Self-propagation and self-replication What is the differences between a worm and a virus? By different ways of infecting systems?
4
History of Worms: The Origins Science fiction references (i.e. Brunner’s “tapeworm” program in “shockwave rider” 1976 Xerox work in 1982, Shock and Hepp coined the use of the term “worm” and carried out experiments with worm like programs [6] CHRISTMA EXEC from 1987 that spread via email and required the user to execute it. Internet worm in 1988. The morris worm infects close to 10% of the then internet (6000 machines). IRC Worms, from 1987 to present day worms have targeted IRC clients (Mirc and PIRC)
5
History of Worms : Email worms Melissa (March 1999) A worm/virus hybrid that sent mail to the first 50 users in the outlook address book, containing the worm/virus. Could also spread as a conventional macro virus. KAK (February 2000) A VBS worm similar to bubbleboy that exploited a hole in outlook to autoexecute on receipt. Love Letter (May 2000) Another VBS worm that worked like Melissa, but was also able to spread via IRC
6
History of Worms: resurgence In the last two years we have seen a resurgence of non email distributed worms Code Red and variants (from July 13th, 2001) Code Red (CRv1) Code Red I (CRv2) Code Red II Nimda ( Sep 18 th, 2001) Slammer / Sapphire worm (January 2003)
7
What worms could do? some of them could be… Launch Distributed Denial of Service (DDoS) attacks Bring down Electronic commerce site Cut off New outlets Disable Root name servers Access Sensitive Material on any host Passwords, credit card numbers and address book Sow Confusion and Disruption Send out false information Make messages appear authentic
8
Replication methods of Worm Two main methods exist for worms to spread: Use legitimate services Email Sircam + previous examples File Shares Sircam + Deloder Exploit system vulnerabilities Webservers NIMDA and CODERED MS SQLServer Slammer
9
Why Worms can Spread? Homogeneous software base Exploit software design flaws of commonly used Internet tools Microsoft controls more than 90% of PCs High-bandwidth interconnections Machines are “close” to each other Makes it easy for a virus to spread
10
Outline Worm “How to Own the Internet in Your Spare Time” Worm defense Discussions
11
Main Ideas Analyzing current worms, Code Red and Nimda Develop some new, highly virulent techniques, including hit-list scanning, permutation scanning and use of Internet- sized hit-lists Envision a “Cyber-Center for Disease Control”
12
Code Red I (CRv1) Released July 13, 2001 Exploited vulnerability in Microsoft IIS Web Server Generated 100 Threads 99 Threads comprised random IP address 1 Threads defaced the web server Contained a bug Random number initialized with a fixed seed Always compromised same sequence of machine
13
Random Constant Spread Model a quantitative theory for the spread of Code Red I worm N Total number of vulnerable servers Assume fixed K Initial comprise rate The number of vulnerable hosts an infected host can compromise Measured in infections/hours a Fraction of vulnerable machines compromised t Time (in hours)
14
RCS (con’t) N da = (N a) K (1 - a) dt So the differential equation is da/dt = K a (1 - a) With a solution of
15
Comments For an early t, a grows exponentially For a large t, a goes to 1 The rate only depends on K and has nothing to do with N at all! From the graph, K = 1.8, T = 11.9 Maximum 510,000 scans an hour! Why the scan rate instead of the number of distinct IPs be fit?
16
Code Red II Release August 4 th, 2001 Was Unrelated code base with Code Red Exploited vulnerability in a buffer overflow of Microsoft IIS Web Server Installed a root backdoor allowing unrestricted remote access Localized scanning strategy 3/8 IP address within the class B network ½ within the class A network 1/8 the whole Internet
17
Nimda Released on Sep 18 th, 2001 Five method to spread at least From infect client to server, probing for a Microsoft IIS vulnerability (again MS!) Emailing itself as an attachment Copying itself across open network shares From infected server to client Scanning for the backdoors by Code Red II
18
Better worms The virulence of a worm could be further increased if Faster scanning More targets
19
Hit-list Scanning To “getting off the ground” Hit-list scanning Collect a list of 10,000 to 50,000 vulnerable machines before releasing the worm Half the list with the new infected host How to collect them? Stealthy scans ( same as portscan ) Distributed scanning DNS searches Spiders Public surveys Just listen, waiting others to knock the door
20
Permutation Scanning Assumption: a worm could detect that a particular target is already infected Share a pseudo random permutation of the IP address space Use a 32-bit block cipher and a key Any host starts just after its point If meet an infected one, start randomly Self-coordinated, comprehensive, also random A partitioned permutation scan, for attacking multiple security hole (how?)
21
A Simulation: Warhol Worm Combination of hit-list and permutation scanning A simulation of Warhol worm’s spread 2^32 entry address space A 32-bit, 6-round variant of RC5 Sharply reduce the infection time to 15 minutes So called “Warhol”, from the quotation ”In the future, everyone will have 15 minutes of fame”
22
Num of Instance Time Red: Warhol Green: Fast Scanning Black: Conventional Hit-list scanning improves the initial spread, while Permutation scanning keep infection rate high
23
Topological Scanning Use information contained on the victim machine to find new targets Neighbors Peers URLs
24
A compact worm: Flash worm Mass coverage inside 30 seconds? Flash worms ‘in theory’ can achieve this. Each copy of the worm carries with it a set of targets, it uses some to target new hosts, and sends along a portion of the remaining addresses to each of its ‘children’. The result being as a worm makes more copies of itself, each copy get smaller, keeping the worms network load predictable. Requires high bandwidth for first few infections (10 million addresses = 40 megs!)
25
Flash worm (con’t) 200k 100k 50k = Infected computer. = computer that could be infected, but hasn’t = computer that wasn’t sucessfully infected
26
Stealth worms What the difference? Avoiding detection by having a slow replication rate. Hiding infection mechanism by appearing to be ‘normal’ traffic. Slowly building up a large infection base, with the hope of payload triggering at a set date. Or store record of infection to allow worms to be ‘activated’ in future, by an authorized signed message sent instantly along the infection path. Popular with diseases that show no symptoms, harder to achieve in the world of IDS.
27
Stealth Worm on P2P systems P2P systems suited to contagion worms All running the same software A client = a server Interconnectivity Transferring large files Pay less attention by the intrusion detection systems … And potentially immense size
28
Updates and Control How to control and modify a worm after its release Worm-to-worm communication A list of other known, running worm Encrypted communication channels Degree of connectivity Programmable updates Dynamic code loading supported by OS
29
Cyber-Center for Disease Control Mission: Identifying outbreaks Rapidly analyzing pathogens Fighting infections Anticipating new vectors Proactively devising detectors for new vectors Resisting future threat
30
Outline Worm “How to Own the Internet in Your Spare Time” Worm defenses Discussions
31
Approach for worm defense Prevention Containment Cleanup
32
Worm defense - prevention Prevention by Reduce the size of vulnerable hosts Limit the speed at which a worm spread Limitations Depend on current software vulnerabilities Related research Matthew M.Williamson “Throttling Viruses: Restricting Propagation to Defeat Malicious Mobil Code”
33
Worm defense - containment Block the infectious communication between infected and uninfected hosts, by Firewalls Content filters blacklists Related work David Moore “Internet Quarantine: Requirements for Containment Self-Propagating Code” Stuart Staniford “Containment of Scanning Worms in Enterprise Networks”
34
Worm defense - cleanup Cleanup by Disinfection tools System update, patches Limitations Limited to human time scales Can not handle an acute outbreak Related work ?
35
Discussions
36
Thank you.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.