+ All Categories
Home > Documents > Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Date post: 20-Dec-2015
Category:
View: 212 times
Download: 0 times
Share this document with a friend
Popular Tags:
29
Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003
Transcript
Page 1: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worm Defenses

Zach Lovelady and Nick Oliver

cs239 – Network Security – Spr2003

Page 2: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worms – what are they?

• Self-propagating code that spreads via the network– Can have malicious payload– Or not

• slammer worm

• Not viruses – which require some sort of user action to propagate

Page 3: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Recent Example

• Code red v2 (July 19th, 2001)– 360,000 hosts compromised in 14 hours

• Doubled in size every 37 minutes

– Peak infection rate of 2000 hosts/min– Costs of recovery ~ $2.6 billion– Exploited buffer overflow in MS IIS

• Patch had been released

Page 4: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Recent Example• Saphire/Slammer worm – Jan 25, 2003

– Fastest spreading worm yet– Affected at least 75,000 hosts

• 90% compromised in first 10 minutes• Doubled in size every 8.5 seconds (first minute)

– Peak scanning rate of 55 million scans/sec after 3 minutes– No malicious payload

• 1 UDP packet• Overloaded networks• Took database servers out of operation• Cancelled airline flights, Out-of-service ATMs, interference with elections

– Exploited buffer overflow in MS SQL Server or MSDE• Patch had been released July 24th, 2002

Page 5: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Recent Example

Page 6: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worms – Framework for understanding

• Biological Model– SI Model from study of

infectious diseases

– Describes rate of growth of epidemics in finite systems

N

IS

dt

dI N

IS

dt

dS

)1( iidt

di

)(

)(

1)(

Tt

Tt

e

eti

2 equations describebehavior of population:

Or, equivalently:

Solving this equation gives:(for some constant of integration T)

Page 7: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Biological model – accuracy

Figure: Hourly probe rate data for inbound port 80 at the Chemical Abstracts Service, for Code Red I's reemergenceon August 1st. The x-axis the time of day on August 1st

(Central US Time). The y-axis shows the monitored probe rate.

Code Red 1 (re-emergance)

Figure: The early moments of the DShield dataset, matched against the behavior of a random-scanning worm

Slammer/Saphire

Page 8: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worm – scanning strategies

• Model presented assumes random scanning for other hosts to infect.

• Other, more efficient scanning techniques possible– Localized– Hit-list– Permutation– Warhol worm

Page 9: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Localized Scanning—Code Red II

• A single stage scanning worm that chose random IP addresses and attempted to infect them.

• Also used a localized scanning strategy where it was more likely to attempt to infect addresses relatively close to it. With probability 3/8 it chooses a random IP from with the class B address space of the infected network, ½ for class A, and 1/8 from the whole internet.

• Very successful strategy. Allows the worm to spread very rapidly within a internal network with multiple hosts having the same vulnerability.

Page 10: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Multi-vector worms--Nimda

• Worms are not restricted to a single method of propagation. Nimda used five methods.

• Infecting web servers from infected client hosts via probing for vulnerabilities.

• Bulk e-mailing of itself to addresses found on the host.

• Copied itself across open network shares.• Adding code to web pages to infect clients that

browsed the pages.• Scanning for backdoors left by Code Red II.

Page 11: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Hit-list Scanning

• Worms spend most of their time “getting off the ground”. They spread exponentially but that means the majority of the attack only affects the first tens of thousands of victims.

• Hit-list scanning overcomes this problem by compiling a list of potentially vulnerable hosts before the worm is released. The worm scans the list and divides the list in two when a new host is infected.

• Lists can be created using several methods: stealthy scans, distributed scans from zombies, DNS searches, web crawlers, public surveys, and listening for advertisements.

Page 12: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Permutation Scanning

• Random scanning is naturally inefficient and can not detect when all potential hosts have been attacked.

• Permutation allows a worm to detect when a host is already infected, is self-coordinated, comprehensive, and looks like it is conducting a random scan.

• Worms share a common pseudo random permutation of the IP address space generated by a 32-bit block cipher and a preselected key.

• An infected machine starts scanning just after their position in the permutation. When the worm sees an infected machine is chooses a new random start point.

Page 13: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Warhol Worm

• Combination of a hit-list and permutation scanning.

• “Capable of attacking most vulnerable targets in well under an hour, possibly less than 15 minutes.”

Page 14: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worms – how to stop them

• From epidemiology – 3 factors determine the spread of an infectious pathogen– Vulnerability of population

– Length of infectious period

– Rate of infection

Page 15: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worms – how to stop them (2)Factor Intervention Example

Vulnerability of population

(size of vulnerable population)

Prevention - Patch software- Engineer software with fewer vulnerabilities (don’t use gets() )- Increase heterogeneity of software on internet (get rid of Microsoft, and all popular networked software)

Length of infectious period Treatment - software patches (after outbreak) – but human timescales are too slow (16 days for most hosts to eliminate code red vulnerability)- automatic patches ( virus software model)

Rate of infection containment -firewalls, content filters, automated routing blacklists-Coordination among pervasive systems-Slow or stop spread of infection

Page 16: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Containment Approach

• Paper (“Internet Quarantine: Reqmts for Containing Self Propagating Code” )seeks to establish how well any containment approach can hope to perform against worms

• Looks at 3 main parameters– Reaction time– Containment strategy

• Address blacklisting– Requires continuous updates

• Content filtering– Requires effective signatures

– Deployment

Page 17: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Containment strategies – Simulation Results

• Idealized deployment– Every node on network has

containment software

• Info distributed instantly

• Code Red v2 style worm– 360,000 vulnerable hosts

out of 2^32

– 10 probes/sec per infected host

Page 18: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Containment strategies – Simulation Results

Percentage of infected hosts after 24 hours.

Page 19: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Containment strategies – Simulation Results

• Practical deployment• Use real internet topology

of AS connectivity• Look at 2 deployment

strategies– Filter at customer edge

networks– Filter in exchange point

routers of major (highest outdegree) Ass

• Same worm

All customer networks in XX% of ASs implement containment filtering

Page 20: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Containment strategies – Simulation Results

• Reaction times required for effective worm containment

• Notice that near-total containment is virtually impossible with aggressive worms in either deployment scenario

Page 21: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Worm Defenses

• One possible approach– Peer-to-peer defense network

Page 22: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Cooperative Response Strategies for Large Scale Attack Mitigation

D. Norjiri, J. Rowe, K. Levitt

UC Davis

Page 23: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Cooperative Peer-to-peer Strategies

• Direct cooperation occurs only between a limited number of friend organizations.

• Organizations receiving an alert report act according to their own local policy—there are no central authorities.

• “When a site detects suspicious worm-like behavior, its initial cooperation strategy is to share the information with its friend organizations…sharing produces a propagating mitigating response whose rate of spread is similar to that of the worm itself.”

Page 24: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Simulated Models of Mitigation Strategies

• Investigate the global properties when complex decision making by cooperating members is involved.

• Topology: Thousands of vulnerable hosts and hundreds of cooperating members are simulated. Members share worm reports. When the number of worm reports exceed some threshold a member’s response device protects its collection of vulnerable hosts from infection. Response devices are directly connected.

Page 25: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Response Devices

• Two states: normal and alerted.• Normal: receives alerts and raises alert level but does not

send alerts.• Alerted: Blocks worm infection attempts using ingress and

egress filtering and shares alerts with neighbors.• In the abscense of worm activities the device backs off its

alert level and can return to normal.• Model parameters: 1) average number of vulnerable hosts

protected by device, 2) number of cooperating friends, 3) threshold for state change, 4) back-off rate, 5) alert severity.

Page 26: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

False Alarms

• Always a problem with security systems including this model.

• See figure 6. Assume that 5% of all members incorrectly report a worm attack to their friends. With a lower alert threshold as many as 75% of all members begin blocking ‘worm’ attacks.

• Reducing the sensitivity reduces the poor operation of false positives but increases the risk of succumbing to attack.

Page 27: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Conclusion

• Mathematical model shows that large scale worm attacks can be slowed by unleashing a controlled “white worm” that propagates at a faster rate.

• Simulations model more complex response and shows that some defense benefits can be achieved when cooperating directly with peers.

• Slow, stealthy worms and false positives are not well received.

Page 28: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

Closing thoughts/Questions

• Containing worms difficult – especially in partial deployment– All or most IP-IP paths should be filtered

• Containment/Prevention/Treatment? What’s best? • How do we contain multi-vector worms?• How do we deal with stealthy, slow spreading

worms?• A more malicious Slammer – how much damage

could it do?

Page 29: Worm Defenses Zach Lovelady and Nick Oliver cs239 – Network Security – Spr2003.

References• BGP picture: http://www.research.att.com/~griffin/bgp_monitor/sql_worm.html

• Vern Paxson, Stuart Staniford, and Nicholas Weaver, How to 0wn the Internet in Your Spare Time, Proceedings of the 11th USENIX Security Symposium (Security '02).

• David Moore, Colleen Shannon, Geoffrey Voelker and Stefan Savage, Internet Quarantine: Requirements for Containing Self-Propagating Code, to appear in Proceedings of the 2003 IEEE Infocom Conference, San Francisco, CA, April 2003

• D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, The Spread of the Sapphire/Slammer Worm, technical report, February 2003


Recommended