Download presentation
Presentation is loading. Please wait.
1
Analyzing Cooperative Containment Of Fast Scanning Worms Jayanthkumar Kannan Joint work with Lakshminarayanan Subramanian, Ion Stoica, Randy Katz
2
Motivation Automatic containment of worms required Slammer infected about 95% of vulnerable population within 10 mins Easier to write: Worm = “Propagation” toolkit + new exploit
3
Worm containment strategies End-host instrumentation: CCCSRB 04, NS 05 specialized end-points end-hosts firewalls core routers Core-router augmentation: WWSGB 04 Specialized end-points (honeyfarms): P 04 Firewall-level containment: WSP 04, WESP 04
4
Decentralized Cooperation Internet firewalls exchange information with each other to contain the worm Suggested in recent work: WSP 04, NRL 03, AGIKL 03 Pros of decentralization: Scales with the system size No single point of failure / administrative control Efficacy and limitations not well understood
5
Questions we seek to answer Cost of decentralization Effect of finite communication rate between firewalls on containment Effect of malice Impact of malicious firewalls on containment Performance under partial deployment
6
Roadmap Abstract model of cooperation Analysis of cooperation model Numerical Results Analytical, Simulation Conclusion
7
Model of Cooperation Each firewall in the cooperative performs following actions: Local Detection: Identify when its network is infected by analyzing outgoing traffic Signaling: Informs other firewalls of its own infection along with filters Filtering: A informed firewall drops incoming packets
8
Firewall states Infected Normal Alerted/Uninfected Detected Successful worm scan Local Detection Signals Sent Signal Received
9
Model of Signaling Two kinds of signaling: Implicit: Piggyback signals on outgoing packets Explicit: Signals addressed to other firewalls Setup attacks: Challenge-response verification of signals Firewall sends false signal: Thresholding: Enter “alerted” state after receiving signals from T different firewalls Firewall suppresses signal: Even if up to 25% firewalls behave this way, good containment is possible
10
Roadmap Abstract model of cooperation Analysis of cooperation model Numerical Results Analytical, Simulation Conclusion
11
Analytical results Main focus: Containment metric C: C = fraction of networks that escape infection Is Signaling Necessary? Cost of Decentralization: Dependence of containment on signaling rate Effect of malice: Dependence of containment on Threshold T
12
Parameters used in analysis Worm model: Scanning: Topological scanning (zero time) followed by global uniform scanning Probability of successful probe = p Scanning rate = s Vulnerable hosts uniformly distributed behind these firewalls Local detection model: After infection, the time required for the infection to be detected is an exponential variable with time t d Signaling model: Explicit signals sent at rate E
13
Detection and Filtering Worm probes only in interval between “infection” and “detection” λ is the expected number of successful infections made by a infected network before detection λ = p s t d Result: If λ < 1, C = 1 for large N Analogy to birth-death process Implications Earlier worms like Blaster satisfied this constraint
14
Detection and Filtering (2) Surprisingly, even if λ > 1, containment can be achieved without signaling Intuition: As the infection proceeds, harder to find new victims λ (= p s t d ) effectively decreases over time For λ = 1.5, about 40% containment For λ = 2.0, about 20% containment λ = 2.0 for a Slammer-like worm
15
Analyzing Signaling Signaling required if λ > 1 Differential equation model For λ > 1 and σ = (λ-1)/t d, the containment metric C is at least
16
Asympotic Variations Implicit Signaling: Worm spreads at rate “ps” Signals sent at rate “s” Linear drop with time to detection ( t d ) Linear drop with threshold (T) Explicit Signaling: Implicit signaling relies on (p << 1) Explicit signals essential for high p Linear drop with 1/E Tunable parameter
17
Roadmap Abstract model of cooperation Analysis of cooperation model Numerical Results Analytical, Simulation Conclusion
18
Numerical Results Parameter Settings: Scan rate set to that of Slammer Size of vulnerable population = 2 x Blaster 1,00,000 networks: 20 vulnerable hosts per network Start out with 10 infected networks and track worm propagation
19
Cost of Decentralization Higher the detection time, lower the containment
20
Effect of Malice Defends against a few hundred malicious firewalls
21
Conclusions Contribution: Further the understanding of cooperative worm containment Cost of Decentralization: With moderate overhead, good containment can be achieved Effect of Malice: Can handle a few hundred malicious firewalls in the cooperative Cost of Deployment: Even with deployment levels as low as 10%, good containment can be achieved
22
Detection and Filtering
23
Signaling
24
Containment vs Vulnerable population size
25
Containment vs Signaling Rate
26
Containment vs Deployment
27
Internet-like Scenario Works well even under non-uniform distributions
28
Conclusions Main result: with moderate overhead, cooperation can provide good containment even under partial deployment For earlier worms, cooperation may have been unnecessary Required for the fast scanning worms of today Our results can be used to benchmark local detection schemes in their suitability for cooperation Our model and results can be applied to: Internet-level / enterprise-level cooperation More sophisticated worms like hit-list worms Room for improvement in terms of robustness Verifiable signals Hybrid architecture: Fit in “well-informed” participants in the cooperative
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.