A Case Study on Computer Worms Balaji Badam. Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
By Hiranmayi Pai Neeraj Jain
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Cyber Threat Analysis  Intrusions are actions that attempt to bypass security mechanisms of computer systems  Intrusions are caused by:  Attackers accessing.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
A Taxonomy of Computer Worms Ashish Gupta Network Security April 2004.
Worms By: Aaron Stahler. Difference Between a Worm and A Virus Viruses are computer programs that are designed to spread themselves from one file to another.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Viruses, Worms and Spam Definitions Virus - unauthorized software, embedded in other programs and with the ability to propagate when the host program is.
How do worms work? Vivek Ramachandran Nagraj – An Indian comic book hero, who commands all the snakes of the world.
Active Worm and Its Defense1 CSE651: Network Security.
Introduction to Honeypot, Botnet, and Security Measurement
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Honeypot and Intrusion Detection System
Copyright 2004 Sheng Bai The Classification and Detection of Computer Worms ( survey report) Instructor: Dr. A. K. Aggarwal Session: Winter 2004.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
A Taxonomy of Computer Worms Nicholas Weaver, Vern Paxson, Stuart Staniford, and Robert Cunningham ACM WORM 2003 Speaker: Chang Huan Wu 2008/8/8.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
--Harish Reddy Vemula Distributed Denial of Service.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
How to Own the Internet in Your Spare Time (Stuart Staniford Vern Paxson Nicholas Weaver ) Giannis Kapantaidakis University of Crete CS558.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Security at NCAR David Mitchell February 20th, 2007.
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Topic 5: Basic Security.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Blackhat 2001 Las Vegas, Nazario, “The Future of Internet Worms” The Future of Internet Worms Jose Nazario Crimelabs Research.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
By: Austen Perelman-Hall COSC 101 Presentation.  What is a worm? What is a virus?  What is the Red Worm?  Where did it come from? Causes  Effects.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Botnets A collection of compromised machines
Internet Quarantine: Requirements for Containing Self-Propagating Code
Viruses and Other Malicious Content
Botnets A collection of compromised machines
A Distributed DoS in Action
Brad Karp UCL Computer Science
CSE551: Introduction to Information Security
Introduction to Internet Worm
Presentation transcript:

A Case Study on Computer Worms Balaji Badam

Computer worms A self-propagating program on a network Types of Worms  Target Discovery  Carrier  Activation  Payloads  Attackers

Target Discovery Mechanism by which a worm discovers new targets to infect Techniques  Scanning  Pre-generated Target Lists  Externally Generated Target Lists  Internal Target Lists  Passive

Scanning Probing a set of addresses to identify vulnerable hosts  Sequential  Random Simple so most common propagation strategy. Efficiency Factors  Density of vulnerable machines  Design of the scanner  Ability of edge routers to forward the worm traffic

Pre-Generated Target Lists Pre-assembled list of probable victims Not easy to generate  Small scale lists can be generated from public sources  Comprehensive lists require either a distributed scan or a compromise of a complete database

Externally Generated Target Lists Maintained by a separate server, such as a metaserver  Dynamic list of active servers A metaserver worm queries the metaserver to determine new targets  Half-Life  Google

Internal Target Lists Generated from local information  /etc/hosts Topological worms spread based on local information  Morris worm Advantages  Can spread quickly for machines that are highly connected  Machines being contacted are already known machines, thus traffic seems normal

Passive Worms Do not seek out victim machines  Wait for potential victims to establish contact  Rely on user behavior to discover new targets Example: Contagion Worms Advantage  no anomalous traffic patterns Disadvantage  potentially slow

Carriers Means by which propagation occurs Types  Self-Carried Actively transmits itself as part of the infection process  Second Channel Passive version of self-carried carrier  Embedded Hides inside a normal communication channel Stealthy with contagion strategy Speed dependent on the communication type

Activation Means by which worm is activated on host Types  Human Activation Activated by local user interaction  Human Activity-Based Activation Activated on user-initiated computer task  Scheduled Process Activation Activated through Scheduled System processes Faster than the other two activation methods

Self Activation Initiate own execution by exploiting known vulnerabilities Execution happens as soon as the worm can locate a copy of the vulnerable service and transmit the code Advantage: Fastest of the activation methods

Payloads Code on worm other than propagation code Reflects the goal of the attacker Classification of Payloads None/nonfunctional - Most common Internet Remote Control Ex: Code Red II Spam Relays - relay spammers, block anti-spam Access for Sale Data Damage Data Collection - targets sensitive data

Classification of Payloads… HTML-Proxies - redirects web requests to randomly selected proxies Internet DOS - Attacks specific sites, most common Time delayed data erasers Physical-world remote control - Air Traffic Control Physical-world DOS - Dialing 911 via modem Physical-world Reconnaissance - Scanning telephone numbers for answering modems

Attackers People who write the worm code Many different reasons for developing worms Experimental Curiosity  IloveYou – thesis project  Morris Worm – accident Pride and Power Extortion and Criminal Gain  Sobig – linking to illegal activities

Attackers… Commercial Advantage Random Protest  Unabomber for computers Political Protest  Yaha worm Terrorism  Economic disruption Cyber Warfare

The Ecology of worms Application Design Buffer Overflows – smashing the stack Privileges Application Deployment – Microsoft XP Economic Factors - cheaper to release buggy code Patch Deployment - cheaper to bundle patches Monocultures – monopolies have common design