Download presentation
Presentation is loading. Please wait.
1
1 Large Scale Malicious Code: A Research Agenda N. Weaver, V. Paxson, S. Staniford, R. Cunningham
2
2 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
3
3 Motivation and Goal ● Networking infrastructure is essential to many activities – Address the “worm threat” ● Establish taxonomy for worms ● Motivate Cyber “CDC” ● Establish a road map for research efforts
4
4 Challenges ● Prevention – i.e. Non-executable stacks ● Avoidance – i.e. Filter ports ● Detection – i.e. Network telescopes ● Recovery – i.e. Fix vulnerability
5
5 Challenges ● Spread speed is faster than human reaction time ● Further generations of worms address previous counter measurements – Smart guys behind the scene ● Monocultures in today Internet ● People are not sensitive to security
6
6 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
7
7 Taxonomy ● Activation techniques – Human – Scheduled process – Self ● Propagation strategies – Scanning – Pre-generated Target Lists – Externally Generated Target Lists – Internal Target Lists – Passive ● Propagation carriers – Self, Embedded
8
8 Taxonomy Motivation and Attackers – Pride and Power – Commercial Advantage – Extortion, – Random Protest – Political Protest – Terrorism – Cyber Warfare Payloads – None – Opening Backdoors – Remote DOS – Receive Updates – Espionage – Data Harvesting – Data Damage – Hardware Damage – Coercion
9
9 Ecology of Worms ● Application Design ● Buffer Overflows ● Privileges – Mail worms ● Application Deployment ● Economic Factors ● Monocultures
10
10 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
11
11 Cooperative Information Technology Org. ● CERT/CC – Human analysis and aggregation ● IIAP – Human-time analysis ● ISAC – Practices and background ● FIRST ● Public Mailing Lists
12
12 Commercial Entities ● Anti-virus Companies – Computer Anti-Virus Researchers Organization (CARO) ● Network based IDS Vendors ● Centralized Security Monitoring ● Training Organizations ● Limited Scope of Commercial Response – Worm has yet to cause significant damage – No clear way to generate additional revenue
13
13 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
14
14 Cyber CDC ● Identify outbreaks – Develop mechanism for gathering information – Sponsor research in automated detection ● Rapidly analyzing pathogens – Develop analysis tools – Understand the harm and spread of pathogens ● Fighting Infections – Deploy agent that detect, terminate or isolate worms
15
15 Cyber CDC ● Anticipating new vectors – Analyze the threat potential of new applications ● Proactively devising detectors for new vectors – Develop analysis modules for IDS ● Resisting future threats – Foster research into resilient application design paradigms ● How open?
16
16 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
17
17 Vulnerability Prevention Defenses ● Grading potentials – A: high potential, lower cost – B: medium potential or significant cost – C: low potential but high risk
18
18 Vulnerability Prevention Defenses ● Programming Languages and Compilers – Safe C Dialects (C, active area) ● Enforcing type and memory safety ● Ccured / Cyclone ● [future] extending to C++ – Software Fault Isolation (C, active area) ● Memory safe sandboxes ● Lack of availability of SFI-based systems – StackGuard (C, active area) ● Compiler calling-convention ● Works well against conventional stack attacks
19
19 Vulnerability ● Programming Languages and Compilers – Nonexecutable Stacks and Heaps w/ Randomized Layouts (B, mostly engineering) ● Randomizing layout ● Guard pages, exception when accessed ● No attempt to build such a complete system – Monitoring for Policy- and Semantics-Enforcement (B, opportunities for worm specific monitoring) ● System call patterns (“mimicry” attack) ● Static analysis ● [future] increase performance and precision
20
20 Vulnerability ● Automatic vulnerability analysis (B, highly difficult, active area) – Discover buffer overflow in C – Sanitized integers from untrusted source – User-supplied pointers for kernel – [future] assemply level – [future] specific patterns of system calls
21
21 Vulnerability Prevention Defenses ● Privilege Issues – Fine-grained Access Control (C, active area) ● [future] integrating into commodity OS – Code Signing (C, active area) ● Publi-key authentication – Privilege Isolation (C, some active research, difficult) ● Mach kernel
22
22 Vulnerability ● Protocol Design – Design Principles (A, difficult, low cost, high reward) ● Open problem – Proving Proto Properties (A, difficult, high reward) ● Worm resistant properties -> verify ● [future] interpreter detects violation of protocol – Distributed Minable Topology (A, hard but critical) ● Match subset, not the entire list – Network Layout (C, costly) ● Never co-occur (i.e. strictly client / server)
23
23 Vulnerability ● Network Provider Practices – Machine Removal (C, already under development) ● No standard protocol ● Implementation Diversity – Monoculture is a dangerous phenomena
24
24 Vulnerability ● Synthetic Polycultures – Synthetic polycultures (C, difficult, may add unpredictability) ● [future] techniques to develop synthetic polycultures ● [future] Code obfuscation ● Economic and Social – Why is Security Hard (B, active area of research) ● [future] understanding of why practices remain so poor
25
25 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
26
26 Automatic Detection of Malicous Code ● Host-based detectors – Host-based Worm Detection (A, Critical) ● Contagion worms ● IDS – Existing Anti-virus Behavior Blocking (A, Critical) ● Behavior blocking (usability and false positives) – Wormholes / honeyfarms (A, Low Hanging Fruit) ● Excellent detector / machine cost ● Must target the cultured honepots...
27
27 Detection ● Network-level detectors – Edge Network Detection (A, critical, powerfull) ● Large number of scans – Backbone Level Detection (B, hard, difficult to deplay) ● Routing is highly asymmetric ● Correlation of Results – Centralized (B, Some commercial work) – Distributed (A, powerful, flexible) – Worm Traceback (A, high risk, high payoff) ● No attention to date in research community ● [future] Network telescopes
28
28 Automated Response to Malicious Code ● Host-Based (B, overlaps with personal firewall) – Open question ● Edge Network (A, poweful, flexible) – [future] Filter traffic (side effects...) ● Backbone/ISP Level (B, difficult, deployment issues) – [future] Limitation of outbound scanning ● National Boundaries (C, too coarse grained) ● Graceful Degradation and Containment (B, mostly engineering) – [future] Quarantine sections
29
29 Aids to Manual Analysis of Malicious Code ● Collaborative Code Analysis Tool (A, scaling is important, some ongoing research) ● Higher Level Analysis (B, important, Halting problem imposes limitations ● Hybrid Static-Dynamic Analysis (A, hard but valuable) ● Visualization (B, mostly educational value) – [future] Real-time analysis – [future] what information might be gathered
30
30 Aids to Recovery ● Anti-worms (C, impractical, illegal) ● Patch distribution in a hostile environment (C, already evolving commercially) ● Updating in a hostile environment (C, hard engineering, already evolving) – Metamorphic code to insert a small bootstrap program
31
31 Policy considerations ● Privacy and Data Analysis ● Obscurity ● Internet Sanitation – Scan limiters ● The “Closed” Alternative – Apply topological restrictions
32
32 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
33
33 Challenging Problems ● Common evaluation framework – DARPA IDS evaluation – Finding proper level of abstraction for analysis – Limit resource available to attacker ● Milestones for detection – Sensitivity to presence – False positive – Distortion resistant
34
34 Challenging Problems ● Milestones for analysis – Strategize vs. Understanding – State of practice: Identifying vs. Reverse engineering – Metrics: accuracy, completeness, speed, usability – Milestone: progressively bigger variety of worms ● Detecting targeted worms ● Tools for validating defenses – Worm Simulation Environment – Internet Wide Worm Testbed (A, essential) – Testing in the Wild (A, essential)
35
35 Contents ● Overview ● Worms: Type, Attackers, Enabling Factors ● Existing Practices and Models ● Cyber CDC ● Vulnerability Prevention Defenses ● Automatic Detection of Malicious Code ● Automated Response to Malicious Code ● Aid to Manual Analysis of Malicious Code ● Aid to Recovery ● Policy Considerations ● Validation and Challenging Problems ● Conclusion
36
36 Conclusions ● Worms are a significant thread ● Limited number of strategies ● Inadequate defensive infrastructure ● Cyber CDC – Prevention role ● Huge potential damage
37
37 Problems ● Build tomorrows security system based on todays worm technologies – Will always be one step behind – Reactive ● Need to address root cause instead of patching things – Prevention
38
38 ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.