Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.

Similar presentations


Presentation on theme: "A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation."— Presentation transcript:

1 A Case Study on Computer Worms Balaji Badam

2 Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation  Payloads  Attackers

3 Target Discovery Mechanism by which a worm discovers new targets to infect Techniques  Scanning  Pre-generated Target Lists  Externally Generated Target Lists  Internal Target Lists  Passive

4 Scanning Probing a set of addresses to identify vulnerable hosts  Sequential  Random Simple so most common propagation strategy. Efficiency Factors  Density of vulnerable machines  Design of the scanner  Ability of edge routers to forward the worm traffic

5 Pre-Generated Target Lists Pre-assembled list of probable victims Not easy to generate  Small scale lists can be generated from public sources  Comprehensive lists require either a distributed scan or a compromise of a complete database

6 Externally Generated Target Lists Maintained by a separate server, such as a metaserver  Dynamic list of active servers A metaserver worm queries the metaserver to determine new targets  Half-Life  Google

7 Internal Target Lists Generated from local information  /etc/hosts Topological worms spread based on local information  Morris worm Advantages  Can spread quickly for machines that are highly connected  Machines being contacted are already known machines, thus traffic seems normal

8 Passive Worms Do not seek out victim machines  Wait for potential victims to establish contact  Rely on user behavior to discover new targets Example: Contagion Worms Advantage  no anomalous traffic patterns Disadvantage  potentially slow

9 Carriers Means by which propagation occurs Types  Self-Carried Actively transmits itself as part of the infection process  Second Channel Passive version of self-carried carrier  Embedded Hides inside a normal communication channel Stealthy with contagion strategy Speed dependent on the communication type

10 Activation Means by which worm is activated on host Types  Human Activation Activated by local user interaction  Human Activity-Based Activation Activated on user-initiated computer task  Scheduled Process Activation Activated through Scheduled System processes Faster than the other two activation methods

11 Self Activation Initiate own execution by exploiting known vulnerabilities Execution happens as soon as the worm can locate a copy of the vulnerable service and transmit the code Advantage: Fastest of the activation methods

12 Payloads Code on worm other than propagation code Reflects the goal of the attacker Classification of Payloads None/nonfunctional - Most common Internet Remote Control Ex: Code Red II Spam Relays - relay spammers, block anti-spam Access for Sale Data Damage Data Collection - targets sensitive data

13 Classification of Payloads… HTML-Proxies - redirects web requests to randomly selected proxies Internet DOS - Attacks specific sites, most common Time delayed data erasers Physical-world remote control - Air Traffic Control Physical-world DOS - Dialing 911 via modem Physical-world Reconnaissance - Scanning telephone numbers for answering modems

14 Attackers People who write the worm code Many different reasons for developing worms Experimental Curiosity  IloveYou – thesis project  Morris Worm – accident Pride and Power Extortion and Criminal Gain  Sobig – linking to illegal activities

15 Attackers… Commercial Advantage Random Protest  Unabomber for computers Political Protest  Yaha worm Terrorism  Economic disruption Cyber Warfare

16 The Ecology of worms Application Design Buffer Overflows – smashing the stack Privileges Application Deployment – Microsoft XP Economic Factors - cheaper to release buggy code Patch Deployment - cheaper to bundle patches Monocultures – monopolies have common design


Download ppt "A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation."

Similar presentations


Ads by Google