Presentation is loading. Please wait.

Presentation is loading. Please wait.

Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts

Similar presentations


Presentation on theme: "Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts"— Presentation transcript:

1 Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts lgao@ecs.umass.edu http://www-unix.ecs.umass.edu/~lgao Joint Work with Z.Chen, J. Wu, S. Vangala and K. Kwiat

2 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 2 Traffic Analyzer Traffic Analyzer Traffic Analyzer Black Hole Black Hole Black Hole Detection Center Monitoring Component Monitoring Architecture

3 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 3 What to monitor?  Inactive addresses  Inactive ports  # of victims  Total scan traffic  # of flows  Distribution of destination addresses  Outbound traffic  ?

4 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 4 How to monitor?  Aggregate data from inactive addresses and ports  Address space  Address and port selection  Learn trend and determine anomalies  Selectively monitoring  Adaptive monitoring  Feedback based

5 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 5 Potential Issues  Spoofed IP  Multi-vector worm  Aggressive scan  Stealth scan  Detecting only large scale attack

6 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 6 Analytical Active Worm Propagation (AAWP) Model  T: size of the address space worm scans  N: total number of vulnerable hosts in the space  S: scan rate  n i: number of infected machines at time i

7 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 7 Monitoring Random Scan

8 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 8 Detection Time vs. Monitoring Space

9 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 9 Local Subnet Scan  The worms preferentially scan for targets on the “local” address space  Nimda worm: 50% of the time, choose an address with the same first two octets 25% of the time, choose an address with the same first octet 25% of the time, choose a random address AAWP model is extended to understand the characteristics of local subnet scanning

10 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 10 Compare Local Subnet Scan with Random Scan

11 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 11 More Malicious Scan  Random Scan Wastes too much power Easier to get caught  More malicious scan techniques Probing hosts are chosen more carefully?

12 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 12 Scan Methods  Selective Scan  Routable Scan  Divide-Conquer Scan  Hybrid Scan

13 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 13 Selective Scan  Randomly selected destinations  Selective Random Scan Slapper worm Picks 162 /8 networks  Benefit: Simplicity, small program size

14 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 14 Selective Scan

15 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 15 Routable Scan  Scan only routable addresses from global BGP table  How to reduce the payload? 112K prefixes  merge address segments, and use 2^16 threshold = 15.4 KB database Only 20% segments contribute 90% addresses  3KB database  Further compression

16 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 16 Spread of Routable Scan

17 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 17 Monitoring Routable Scan

18 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 18 Divide-Conquer Scan  An extension to routable scan  Each time a new host gets infected, it will get half of the address space.  Susceptible to single point of failure  Possible overlapping address space

19 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 19 Divide-Conquer Scan

20 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 20 Monitoring Divide-Conquer Scan

21 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 21 Hybrid Scan  A combination of the simple scan methods above  For example: Routable + Hitlist + Local Subnet Scan Divide-Conquer + Hitlist

22 DIMACS workshop on Large-Scale Internet Attack, Sept 23-24, 2003 22 More Details  See Modeling the Spread of Active Worms, Z.Chen, L. Gao, K. Kwiat, INFOCOM 2003 at http://www-unix.ecs.umass.edu/~lgao/paper/AAWP.pdf An Effective Architecture and algorithm for Detecting Worms with Various Scan Techniques, J. Wu, S. Vangala, L.Gao, K.Kwiat, at http://rio.ecs.umass.edu/gao/paper/final.pdf


Download ppt "Modeling/Detecting the Spread of Active Worms Lixin Gao Dept. Of Electrical & Computer Engineering Univ. of Massachusetts"

Similar presentations


Ads by Google