Modeling, Early Detection, and Mitigation of Internet Worm Attacks

Slides:



Advertisements
Similar presentations
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Univ. Massachusetts, Amherst.
Fusing Intrusion Data for Pro-Active Detection and Containment Mallikarjun (Arjun) Shankar, Ph.D. (Joint work with Nageswara Rao and Stephen Batsell)
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
 Well-publicized worms  Worm propagation curve  Scanning strategies (uniform, permutation, hitlist, subnet) 1.
Modeling the spread of active worms Zesheng Chen, Lixin Gao, and Kevin Kwiat bearhsu - INFOCOM 2003.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Worms: Taxonomy and Detection Mark Shaneck 2/6/2004.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Worm Defense. Outline  Internet Quarantine: Requirements for Containing Self-Propagating Code  Netbait: a Distributed Worm Detection Service  Midgard.
Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts
Defending Against Flooding Based DoS Attacks : A tutorial - Rocky K.C. Chang, The Hong Kong Polytechnic University Presented by – Ashish Samant.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
A Study of Mass- mailing Worms By Cynthia Wong, Stan Bielski, Jonathan M. McCune, and Chenxi Wang, Carnegie Mellon University, 2004 Presented by Allen.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Active Worm and Its Defense1 CSE651: Network Security.
1 Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
Denial of Service A Brief Overview. Denial of Service Significance of DoS in Internet Security Low-Rate DoS Attacks – Timing and detection – Defense High-Rate,
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
Carleton University School of Computer Science Detecting Intra-enterprise Scanning Worms based on Address Resolution David Whyte, Paul van Oorschot, Evangelos.
1 Modeling, Analysis, and Mitigation of Internet Worm Attacks Presenter: Cliff C. Zou Dept. of Electrical & Computer Engineering University of Massachusetts,
Code Red Worm Propagation Modeling and Analysis Zou, Gong, & Towsley Michael E. Locasto March 21, 2003.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
1 An Advanced Hybrid Peer-to-Peer Botnet Ping Wang, Sherri Sparks, Cliff C. Zou School of Electrical Engineering & Computer Science University of Central.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
1 Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense Cliff C. Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
1 On the Performance of Internet Worm Scanning Strategies Authors: Cliff C. Zou, Don Towsley, Weibo Gong Publication: Journal of Performance Evaluation,
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
SPYCE/May’04 coverage: A Cooperative Immunization System for an Untrusting Internet Kostas Anagnostakis University of Pennsylvania Joint work with: Michael.
1 On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst.
1 Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
1 Monitoring and Early Warning for Internet Worms Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Defending against Hitlist Worms using NASR Khanh Nguyen.
1 Monitoring and Early Warning for Internet Worms Authors: Cliff C. Zou, Lixin Gao, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst Publish: 10th.
1 Modeling and Measuring Botnets David Dagon, Wenke Lee Georgia Institute of Technology Cliff C. Zou Univ. of Central Florida Funded by NSF CyberTrust.
2016/3/13 1 Peer-to-peer system-based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications.
Exact Propagation Modeling of Permutation-Scanning Worms Parbati Kumar Manna Dr. Shigang Chen Dr. Sanjay Ranka University of Florida.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Internet Quarantine: Requirements for Containing Self-Propagating Code
DDoS Attacks on Financial Institutions Presentation
CNT 4704 Computer Communication Networking (not “analysis”)
Defending Against DDoS
Defending Against DDoS
Internet Worm propagation
Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai
Modeling and Measuring Botnets
Adaptive Defense Against Various Network Attacks
Modeling Botnet Propagation Using Time Zones
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
Brad Karp UCL Computer Science
Mapping Internet Sensors With Probe Response Attacks
THE INTERNET MOTION SENSOR: A Distributed Blackhole Monitoring System
DDoS Attack and Its Defense
Jonathan Griffin Andy Norman Jamie Twycross Matthew Williamson
CSE551: Introduction to Information Security
Statistical based IDS background introduction
Introduction to Internet Worm
Presentation transcript:

Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff Changchun Zou Assistant professor School of Computer Science University of Central Florida Orlando, FL Email: czou@cs.ucf.edu Web: http://www.cs.ucf.edu/~czou

Worm propagation process Find new targets IP random scanning Compromise targets Exploit vulnerability Newly infected join infection army

Worm research motivation Code Red (Jul. 2001) : 360,000 infected in 14 hours Slammer (Jan. 2003) : 75,000 infected in 10 minutes Congested parts of Internet (ATMs down…) Blaster (Aug. 2003) : 150,000 ~ 8 million infected DDOS attack (shut down domain windowsupdate.com) Witty (Mar. 2004) : 12,000 infected in half an hour Attack vulnerability in ISS security products Sasser (May 2004) : 500,000 infected within two days Infection faster than human response !

How to defend against worm attack? Automatic response required First, understanding worm behavior Basis for worm detection/defense Next, early warning of an unknown worm Detection based on worm model Prediction of worm damage scale Last, autonomous defense Dynamic quarantine Self-tuning defense

Outline Worm propagation modeling Early warning of an unknown worm Autonomous defense Summary and current work

Outline Worm propagation modeling Early warning of an unknown worm Autonomous defense Summary and current work

Simple worm propagation model address space, size W N : total vulnerable It : infected by time t N-It vulnerable at time t scan rate (per host), h W Prob. of a scan hitting vulnerable # of increased infected in a unit time

Simple worm propagation

Code Red worm modeling Simple worm model matches observed Code Red data “Ideal” network condition No human countermeasures No network congestions First model work to consider these [CCS’02]

Witty worm modeling Witty’s destructive behavior: 1). Send 20,000 UDP scans to 20,000 IP addresses 2). Write 65KB in a random point in hard disk Consider an infected computer: Constant bandwidth  constant time to send 20,000 scans Random point writing  infected host crashes with prob. Crashing time approximate by Exponential distribution ( )

Witty worm modeling hours # of vulnerable at t : # of crashed infected computers at time t Memoryless property # of vulnerable at t hours *Witty trace provided by U. Michigan “Internet Motion Sensor”

Advanced worm modeling — hitlist, routing worm Hitlist worm — increase I0 Contains a list of known vulnerable hosts Infects hit-list hosts first, then randomly scans Lasts less than a minute Routing worm — decrease W Only scan BGP routable space BGP table information: W = .32£ 232 32% of IPv4 space is Internet routable

Hitlist, routing worm Code Red style worm h = 358/min N = 360,000 hitlist, I(0) = 10,000 routing, W=.29£ 232

Botnet-based Diurnal Modeling North America Europe Eastern Asia Diurnal property of online infectious hosts Determined by time zone

Worm Propagation Diurnal Model Divide Internet hosts into groups Each group has hosts in one or several nearby time zones  same diurnal property Consider modeling in one group: : diurnal shaping function (fraction of online hosts) : # of infected : # of online infected : # of online susceptible : # of susceptible

Optimal Worm Releasing Time based on Diurnal Model Diurnal property affects a worm’s speed Speed prediction derived based on diurnal model

Outline Worm propagation modeling Early warning of an unknown worm Autonomous defense Summary and current work

How to detect an unknown worm at its early stage? Monitor: Worm scans to unused IPs TCP/SYN packets UDP packets Also called “darknet” Internet Monitored traffic Monitored data is noisy Unused IP space Local network

Can we take advantage of worm model to detect a worm? Reflection Worm anomaly  other anomalies? A worm has its own propagation dynamics Deterministic models appropriate for worms Can we take advantage of worm model to detect a worm?

Worm model in early stage 1% 2% Initial stage exhibits exponential growth

“Trend Detection”  Detect traffic trend, not burst Trend: worm exponential growth trend at the beginning Detection: estimated exponential rate a be a positive, constant value Monitored illegitimate traffic rate Worm traffic Non-worm burst traffic Exponential rate a on-line estimation

Why exponential growth at the beginning? Attacker’s incentive: infect as many as possible before people’s counteractions If not, a worm does not reach its spreading speed limit Slow spreading worm detected by other ways Security experts manual check Honeypot, …

Model for estimate of worm exponential growth rate a Exponential model: : monitoring noise Zt : # of monitored scans at time t yield

Estimation by Kalman Filter System: where Kalman Filter for estimation of Xt :

Code Red simulation experiments Population: N=360,000, Infection rate: a = 1.8/hour, Scan rate h = N(358/min, 1002), Initially infected: I0=10 Monitored IP space 220, Monitoring interval: 1 minute Consider background noise At 0.3% (157 min): estimate stabilizes at a positive constant value

Damage evaluation — Prediction of global vulnerable population N yield Accurate prediction when less than 1% of N infected

Damage evaluation — Estimation of global infected population It Monitoring 214 IP space (p=4£ 10-6) : cumulative # of observed infected hosts by time t : per host scan rate : fraction of address space monitored : Prob. an infected to be observed by the monitor in a unit time # of unobserved Infected by t # of newly observed (tt+1)

Outline Worm propagation modeling Early warning of an unknown worm Autonomous defense Summary and current work

Autonomous defense principles Principle #1  Preemptive Quarantine Compared to attack potential damage, we are willing to tolerate some false alarm cost Quarantine upon suspicious, confirm later Basis for our Dynamic Quarantine [WORM’03] Principle #2  Adaptive Adjustment More serious attack, more aggressive defense At any time t, minimize: (attack damage cost) + (false alarm cost)

Self-tuning defense against various network attacks Principle #2 : Adaptive Adjustment More severe attack, more aggressive defense Self-tuning defense system designs: SYN flood Distributed Denial-of-Service (DDoS) attack Internet worm infection DDoS attack with no source address spoofing

Motivation of self-tuning defense 1 : False positive prob. blocking normal traffic Severe attack : False negative prob. missing attack traffic : Detection sensitivity Light attack : Fraction of attack in traffic Q: Which operation point is “good”? A: All operation points are good Optimal one depends on attack severity p

Estimation of attack severity p Incoming Filter Passed Dropped : Fraction of detected traffic # of incoming normal traffic attack traffic Unbiased

Self-tuning defense design Incoming Filter Passed Self-tuning optimization Attack estimation Discrete time k  k+1 Optimization: Fraction of passed attack dropped normal : Cost of dropping a normal traffic : Cost of passing an attack traffic

Self-tuning defense structure Attack Severity Operation Settings Detection Defense More severe attack, more aggressive defense

Outline Worm propagation modeling Early warning of an unknown worm Autonomous defense Summary and current work

Worm research contribution Worm modeling: Two-factor model: Human counteractions; network congestion Diurnal modeling; worm scanning strategies modeling Early detection: Detection based on “exponential growth trend” Estimate/predict worm potential damage Autonomous defense: Dynamic quarantine (interviewed by NPR) Self-tuning defense (patent filed by AT&T) Email-based worm modeling and defense