1 / 31

Summary From the Last Lecture

Summary From the Last Lecture. Well-publicized worms Worm propagation curve Scanning strategies (uniform, permutation, hitlist , subnet). Worm Defense. Three factors define worm spread: Size of vulnerable population Prevention – patch vulnerabilities, increase heterogeneity

teo
Download Presentation

Summary From the Last Lecture

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Summary From the Last Lecture • Well-publicized worms • Worm propagation curve • Scanning strategies (uniform, permutation, hitlist, subnet)

  2. Worm Defense • Three factors define worm spread: • Size of vulnerable population • Prevention – patch vulnerabilities, increase heterogeneity • Rate of infection (scanning and propagation strategy) • Deploy firewalls • Distribute worm signatures • Length of infectious period • Patch vulnerabilities after the outbreak

  3. How Well Can Containment Do? • This depends on several factors: • Reaction time • Containment strategy – address blacklisting and content filtering • Deployment scenario – where is response deployed • Evaluate effect of containment 24 hours after the onset “Internet Quarantine: Requirements for Containing Self-Propagating Code”, Proceedings of INFOCOM 2003, D. Moore, C. Shannon, G. Voelker, S. Savage

  4. How Well Can Containment Do?Code Red Idealized deployment: everyone deploysdefenses after given period

  5. How Well Can Containment Do?Depending on Worm Aggressiveness Idealized deployment: everyone deploysdefenses after given period

  6. How Well Can Containment Do?Depending on Deployment Pattern

  7. How Well Can Containment Do? • Reaction time needs to be within minutes, if not seconds • We need to use content filtering • We need to have extensive deployment on key points in the Internet

  8. Detecting and Stopping Worm Spread • Monitor outgoing connection attempts to new hosts • When rate exceeds 5 per second, put the remaining requests in a queue • When number of requests in a queue exceeds 100 stop all communication “Implementing and testing a virus throttle”, Proceedings of Usenix Security Symposium 2003,J. Twycross, M. Williamson

  9. Detecting and Stopping Worm Spread

  10. Detecting and Stopping Worm Spread

  11. Cooperative Strategies for Worm Defense • Organizations share alerts and worm signatures with their “friends” • Severity of alerts is increased as more infection attempts are detected • Each host has a severity threshold after which it deploys response • Alerts spread just like worm does • Must be faster to overtake worm spread • After some time of no new infection detections, alerts will be removed “Cooperative Response Strategies for Large-Scale Attack Mitigation”, Proceedings of DISCEX 2003, D. Norjiri, J. Rowe, K. Levitt

  12. Cooperative Strategies for Worm Defense • As number of friends increases, response is faster • Propagating false alarms is a problem

  13. Early Worm Detection • Early detection would give time to react until the infection has spread • The goal of this paper is to devise techniques that detect new worms as they just start spreading • Monitoring: • Monitor and collect worm scan traffic • Observation data is very noisy so we have to filter new scans from • Old worms’ scans • Port scans by hacking toolkits C. C. Zou, W. Gong, D. Towsley, and L. Gao. "The Monitoring and Early Detection of Internet Worms," IEEE/ACM Transactions on Networking. 

  14. Early Worm Detection • Detection: • Traditional anomaly detection: threshold-based • Check traffic burst (short-term or long-term). • Difficulties: False alarm rate • “Trend Detection” • Measure number of infected hosts and use it to detect worm exponential growth trend at the beginning

  15. Assumptions • Worms uniformly scan the Internet • No hitlists but subnet scanning is allowed • Address space scanned is IPv4

  16. Worm Propagation Model • Simple epidemic model: Detect wormhere. Shouldhave exp. spread

  17. Monitoring System

  18. Monitoring System • Provides comprehensive observation data on a worm’s activities for the early detection of the worm • Consists of : • Malware Warning Center (MWC) • Distributed monitors • Ingress scan monitors – monitor incoming traffic going to unused addresses • Egress scan monitors – monitor outgoing traffic

  19. Monitoring System • Ingress monitors collect: • Number of scans received in an interval • IP addresses of infected hosts that have sent scans to the monitors • Egress monitors collect: • Average worm scan rate • Malware Warning Center (MWC) monitors: • Worm’s average scan rate • Total number of scans monitored • Number of infected hosts observed

  20. Worm Detection • MWC collects and aggregates reports from distributed monitors • If total number of scans is over a threshold for several consecutive intervals, MWC activates the Kalman filter and begins to test the hypothesis that the number of infected hosts follows exponential distribution

  21. Code Red Simulation • Population: N=360,000, Infection rate:  = 1.8/hour, • Scan rate  = 358/min, Initially infected: I0=10 • Monitored IP space 220, Monitoring interval:  = 1 minute Infected hosts  estimation

  22. Slammer Simulation • Population: N=100,000 • Scan rate  = 4000/sec, Initially infected: I0=10 • Monitored IP space 220, Monitoring interval:  = 1 second Infected hosts  estimation

  23. Dynamic Quarantine • Worms spread very fast (minutes, seconds) • Need automatic mitigation • If this is a new worm, no signature exists • Must apply behaviour-based anomaly detection • But this has a false-positive problem! We don’t want to drop legitimate connections! • Dynamic quarantine • “Assume guilty until proven innocent” • Forbid network access to suspicious hosts for a short time • This significantly slows down the worm spread C. C. Zou, W. Gong, and D. Towsley. "Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense," ACM CCS Workshop on Rapid Malcode (WORM'03),

  24. Dynamic Quarantine • Behavior-based anomaly detection can point out suspicious hosts • Need a technique that slows down worm spread but doesn’t hurt legitimate traffic much • “Assume guilty until proven innocent” technique will briefly drop all outgoing connection attempts (for a specific service) from a suspicious host • After a while just assume that host is healthy, even if not proven so • This should slow down worms but cause only transient interruption of legitimate traffic

  25. Dynamic Quarantine • Assume we have some anomaly detection program that flags a host as suspicious • Quarantine this host • Release it after time T • The host may be quarantined multiple times if the anomaly detection raises an alarm • Since this doesn’t affect healthy hosts’ operation a lot we can have more sensitive anomaly detection technique

  26. Dynamic Quarantine • An infectious host is quarantined after time units • A susceptible host is falsely quarantined after time units • Quarantine time is T, after that we release the host • A few new categories: • Quarantined infectious R(t) • Quarantined susceptible Q(t)

  27. Simulation Setup • Initially 75,000 vulnerable hosts • Quarantine rate of infectious host is per second • Infectious host will be quarantined after 5 seconds on average • Quarantine rate of susceptible host is per second • There are 2 false alarms per host per day • T=10 seconds

  28. Slammer With DQ

  29. DQ With Large T? T=30sec T=10sec

  30. DQ And Patching?

  31. Patch Only Quarantined Hosts Cleaning R(t) Cleaning I(t)

More Related