WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli



Similar documents
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

Security Toolsets for ISP Defense

Firewalls and Intrusion Detection

Intelligent Worms: Searching for Preys

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

A SURVEY OF INTERNET WORM DETECTION

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Denial of Service (DoS) Technical Primer

How To Mitigate A Ddos Attack

How To Attack A Server With A Ddos Attack On A Zombie Army Of Your Computer (For A Free Download)

Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík

Network Incident Report

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

2010 Carnegie Mellon University. Malware and Malicious Traffic

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

The Spread of the Sapphire/Slammer Worm

Computer Security DD2395

Firewalls, Tunnels, and Network Intrusion Detection

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Chapter 9 Firewalls and Intrusion Prevention Systems

Blended Security Assessments

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Real-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)

Denial of Service. Tom Chen SMU

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

How To Classify A Dnet Attack

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

ANTIVIRUS BEST PRACTICES

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Seminar Computer Security

Hack Your SQL Server Database Before the Hackers Do

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Intruders and viruses. 8: Network Security 8-1

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Flashback: Internet design goals. Security Part Two: Attacks and Countermeasures. Security Vulnerabilities. Why did they leave it out?

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Network Service, Systems and Data Communications Monitoring Policy

Network Penetration Testing and Ethical Hacking Scanning/Penetration Testing. SANS Security Sans Mentor: Daryl Fallin

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

SECURING APACHE : DOS & DDOS ATTACKS - II

Multifaceted Approach to Understanding the Botnet Phenomenon

Network Instruments white paper

Lecture 13 - Network Security

BlackRidge Technology Transport Access Control: Overview

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

A Critical Investigation of Botnet

Phone Fax

Configuring Allied Telesyn Equipment to Counter Nimda Attacks

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Modern Denial of Service Protection

A Firewall Network System for Worm Defense in Enterprise Networks

Attack and Defense Techniques

Second-generation (GenII) honeypots

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Security of IPv6 and DNSSEC for penetration testers

DoS/DDoS Attacks and Protection on VoIP/UC

EU FP6 LOBSTER. personal view on the future of ero-day Worm Containment. European Infrastructure for accurate network monitoring

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

Transcription:

WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli

What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across a network exploiting security or policy flaws. A computer virus requires some sort of user action to abet their propagation The line between worms and viruses is not all that sharp : contagion worms

Outline A Taxonomy of Computer Worms The Slammer Worm What does the future have in store?

A Taxonomy of Computer Worms: know thy enemy To understand the worm threat, it is necessary to under the various types of worms. Taxonomy based on: target discovery carrier activation payloads attackers

Target Discovery: the mechanism by which a worm discovers new targets to infect : scanning, hit-list scanning Scanning : entails probing a set of addresses to identify vulnerable hosts. sequential : working through a IP address block using an ordered set of addresses random : trying address out of a block in a pseudo-random fashion Code-Red, Nimda, Slammer Worm

Optimizations to scanning Localized scanning strategy : (Code- Red II) With probability 3/8 choose a random IP address from within the class B address (/16 network) of the infected machine. With probability 1/2 choose randomly from the class A (/8 network) of the infected machine. With probability 1/8 choose a random address from the whole Internet.

Hit-list Scanning getting off the ground Provide the worm with a list of potentially vulnerable machines. The worm, when released onto an initial machine on this hit-list, begins scanning down the list. When it infects a machine, it divides the hitlist in half, communicating half to the recipient worm, keeping the other half.

Permutation Scanning Random scanning is inefficient : many addresses are probed multiple times no means for a randomly scanning worm to effectively determine when all vulnerable machines are infected Permutation scanning a worm can detect that a particular target is already infected all worms share a common pseudo random permutation of the IP address space

Spread of Scanning Worms The speed of scanning worms is limited by: Density of vulnerable machines Design of the scanner The ability of edge routers to handle a potentially significant increase in new, diverse communication. Scanning is highly anomalous behavior. Effective detection; defenses designed to stop an entire family of worms

How fast do the spread?

Topological Worms : Internal Target Lists Many applications contain information about other hosts providing vulnerable services. Topological worm searches for local information to find new victims by trying to discover the local communication topology The original Morris worm used topological techniques including Network Yellow pages, /etc/hosts, and other sources to find new victims.

Topological Worms The spread is slower as compared to scanning worms. Can bypass defenses by communicating information known by one instance to other instances. May present a global anomaly, the local traffic may appear normal. Highly distributed sensors may be needed to detect topological worms

Target Discovery : Passive Worms A passive worm does not seek out victim machines. Instead, it either waits for potential victims to contact the worm or rely on user behavior to discover new targets Gnuman : Operates by acting as a Gnutella node which replies to all queries with copies of itself. If this copy is copy is run, the Gnuman starts on the victim and repeats itself.

Passive Worms continued CRclean : the anti-worm This worm waits for a Code Red II related probe. When it detects an infection attempt, it responds by launching a counterattack. If this counterattack is successful, it removes Code Red II and installs itself on the machine. Never released.

Stealth worms --- contagion

P2P systems : susceptible to contagion worms Likely need only a single exploit, not a pair Often, peers running identical software Rich interconnection pattern Often used to transfer large files Not mainstream less vulnerability assessment, monitoring

P2P network susceptibility continued Often give access to user s desktop rather than server; sensitive data grey content : users less inclined to draw attention to unusual behavior Come with built-in control/ dissemination plain and can be Very Large

Toolkit Potential toolkits : large reusable structures where a small amount of additional code can be added to create a worm. Application-independent and applicationdependent toolkits seen in the wild. Application independent toolkit can contain: Code for scanning Transporting payloads

Toolkits continued Scanning worms are not application specific. The Slapper worm: attacker inserted a new exploit into the Scalper worm source code. scanning worms can be released as soon as a vulnerability is published

Distribution Mechanisms affects the speed and stealth of a worm Mechanisms: Self-carried Second channel : Blaster worm Embedded : contagion worm An embedded strategy only makes sense when the target selection strategy is also stealthy. Distribution: One-to-many Many-to-many Hybrid

Activation Self-Activation Human Activation rely on social engineering techniques Human Activity-Based Activation Logging in and therefore executing login scripts Opening a remotely infected file Scheduled Process Activation

Payloads None/nonfunctional : Morris, Slammer Disruption through traffic and machine load; by actively advertising vulnerable machines Internet Remote Control Code-Red II opened a trivial-to-use privileged backdoor on victim machines; exploited by anti- Code-Red worms

Payloads continued Spam-Relays: Sobig worm Spammers can avoid mechanisms which block known-spamming IP addresses HTML-proxies: Redirect web requests (through DNS) to randomly selected proxy machines Internet DOS

Payloads continued. Data Collection Access for sale Data damage : Chenobyl, Klez Worm Maintenance: W32/sonic

Code-Red

The Slammer Worm Spread nearly two orders of magnitude faster than Code-Red In approx. 3 minutes, the worm achieved its full scanning rate (more than 55 million scans per second) The spread was so aggressive that the worm quickly interfered with its own growth

Why Slammer was so fast? Code-Red was latency limited: Spreads via many threads, each invoking connect() to open a TCP session to random addresses Consequently, each thread s scanning rate was limited by the network latency

Latency limitation of Code-Red Thread is blocked while waiting to receive SYN/ACK Worms can compensate this by invoking large number of threads Operating system limitations : Context-switching overhead Kernel stack memory consumption

Slammer was bandwidth limited UDP-based A single packet to UDP port 1434 could exploit the SQL server s vulnerability Smaller size Slammer : 404 bytes Code-Red : 4 Kbytes Nimda : 60 Kbytes

Slammer opens a for more worms Smaller susceptible populations are now more attractive Need to automate worm defenses Filtering provides no benefit for actually limiting the number of infected machines What is Slammer propagated only for 10 minutes? 75,000 compromised machines Many might never have been identified!!!

Multi-vector worms---nimda By active probing By bulk e-mailing itself as an attachment By copying itself across open network shares By adding exploit code to Web pages on compromised servers By scanning for backdoors left by Code-Red II

Code Red 2 kills off Code Red 1 CR 1 returns thanks to bad clocks Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed

Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back!, still exhibiting monthly pattern