Top Banner
Network-based and Attack- resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1 , Lanjia Wang 2 , Yan Chen 1 and Judy Fu 3 1 Lab for Internet and Security Technology (LIST), Northwe stern Univ. 2 Tsinghua University, China 3 Motorola Labs, USA
25

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

Jan 12, 2016

Download

Documents

owena

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. Zhichun Li 1 , Lanjia Wang 2 , Yan Chen 1 and Judy Fu 3. 1 Lab for Internet and Security Technology (LIST), Northwestern Univ. 2 Tsinghua University, China 3 Motorola Labs, USA. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

Zhichun Li1, Lanjia Wang2, Yan Chen1 and Judy Fu3

1 Lab for Internet and Security Technology (LIST), Northwestern Univ.

2 Tsinghua University, China

3 Motorola Labs, USA

Page 2: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

2

The Spread of Sapphire/Slammer Worms

Page 3: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

3

Limitations of Exploit Based Signature

1010101

10111101

11111100

00010111

Our network

Traffic Filtering

Internet

Signature: 10.*01

XX

Polymorphic worm might not have exact exploit based signature

Polymorphism!

Page 4: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

4

Vulnerability Signature

Work for polymorphic wormsWork for all the worms which target thesame vulnerability

Vulnerability signature traffic filtering

Internet

XX Our network

UnknownVulnerability

XX

Better!

Page 5: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

5

Benefits of Network Based Detection

• At the early stage of the worm, only limited worm samples.

• Host based sensors can only cover limited IP space, which might have scalability issues.

Gateway routersInternet

Our network

Host baseddetection

Early Detection!

Page 6: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

6

Design Space and Related Work

• Most host approaches depend on lots of host information, such as source/binary code of the vulnerable program, vulnerability condition, execution traces, etc.

[Polygraph-SSP05][Hamsa-SSP06][PADS-INFOCOM05]

[CFG-RAID05]

[Nemean-Security05]

[DOCODA-CCS05]

[TaintCheck-NDSS05]

LESG (this paper)

[Vulsig-SSP06]

[Vigilante-SOSP05]

[COVERS-CCS05]

[ShieldGen-SSP07]

Vulnerability Based

Exploit Based

Network Based Host Based

Page 7: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

7

Outline

• Motivation and Related Work

• Design of LESG

• Problem Statement

• Three Stage Algorithm

• Attack Resilience Analysis

• Evaluation

• Conclusions

Page 8: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

8

Basic Ideas

• At least 75% vulnerabilities are due to buffer overflow

• Intrinsic to buffer overflow vulnerability and hard to evade

• However, there could be thousands of fields to select the optimal field set is hard

Vulnerable buffer

Protocol message

Overflow!

Page 9: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

9

FrameworkProtocolClassifier

UDP1434

LESGWormFlow

Classifier

TCP137

. . .TCP80

TCP53

TCP25

NormalTraffic Pool

SuspiciousTraffic Pool

Signatures

NetworkTap

KnownWormFilter

Normal traffic reservoir

Real time

Policy driven

ICDCS06, INFOCOM06, TON

Page 10: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

10

LESG Signature Generator

Page 11: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

11

Outline

• Motivation and Related Work

• Design of LESG

• Problem Statement

• Three Stage Algorithm

• Attack Resilience Analysis

• Evaluation

• Conclusions

Page 12: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

12

Field Hierarchies

DNS PDU

Page 13: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

13

Length-based Signature Definition

Name Type Class TTL RDlength RDATA

Length Signature (Name,100)

100

Length Signature

Signature Set{(Name,100), (Class,50), (RDATA,300)}

“OR” relationship

Ground truth signature(RDATA,315)

Buffer length!

Vulnerable

RDATA

Page 14: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

14

Problem Formulation

LESG

Worms which are not covered in the suspicious pool are at most

Minimize the false positives in the normal pool

Suspicious pool

Normal pool

Signature

With noise NP-Hard!

Page 15: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

15

Outline

• Motivation and Related Work

• Design of LESG

• Problem Statement

• Three Stage Algorithm

• Attack Resilience Analysis

• Evaluation

• Conclusions

Page 16: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

16

Stages I and II

Stage I: Field Filtering Stage II: Length Optimization

COV≥1%FP≤0.1%

Trade off between specificity and sensitivityScore function Score(COV,FP)

Page 17: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

17

Stage III• Find the optimal set of fields as the

signature with high coverage and low false positive

• Separate the fields to two sets, FP=0 and FP>0– Opportunistic step (FP=0)– Attack Resilience step (FP>0)

• The similar greedy algorithm for each step

Page 18: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

18

Stage III (cont.)

suspicious normal

Name Type Class TTL Comments RDATA

(Name,100) [40%,0.03%]

(Class,50) [35%,0.09%]

(RDATA,300) [50%,0.05%]

(Comments,2000) [10%,0.1%]

Stage I COV0≥1%FP0≤0.1%

50% 0.05% Residual coverage≥5%

Page 19: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

19

Stage III (cont.)

suspicious normal

Name Type Class TTL Comments RDATA

(Class,50) [25%,0.02%]

(Name,100) [3%,0.08%]

{(RDATA,300)}

(Comments,2000) [1%,0.05%]

Stage I COV0≥1%FP0≤0.1%

50% 0.05% Residual coverage≥5%

Page 20: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

20

Stage III (cont.)

suspicious normal

Name Type Class TTL Comments RDATA

(Class,50) [25%,0.02%]

(Name,100) [3%,0.08%]

{(RDATA,300),(Class,50)}

(Comments,2000) [1%,0.05%]

Stage I COV0≥1%FP0≤0.1%

(50+25)%(0.05+0.02)% Residual coverageγ≥5%

Page 21: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

21

Attack Resilience Bounds

• Depend on whether deliberated noise injection (DNI) exists, we get different bounds

• With 50% noise in the suspicious pool, we can get the worse case bound FN<2% and FP<1%

• In practice, the DNI attack can only achieve FP<0.2%

• Resilient to most proposed attacks (proposed in other papers)

Page 22: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

22

Outline

• Motivation and Related Work

• Design of LESG

• Problem Statement

• Three Stage Algorithm

• Attack Resilience Analysis

• Evaluation

• Conclusions

Page 23: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

23

Methodology• Protocol parsing with Bro and BINPAC (I

MC2006)

• Worm workload– Eight polymorphic worms created based on r

eal world vulnerabilities including CodeRed II and Lion worms.

– DNS, SNMP, FTP, SMTP

• Normal traffic data– 27GB from a university gateway and 123GB

email log

Page 24: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

24

Results• Single/Multiple worms with noise

– Noise ratio: 0~80%– False negative: 0~1% (mostly 0)– False positive: 0~0.01% (mostly 0)

• Pool size requirement– 10 or 20 flows are enough even with 20% noises

• Speed results– With 500 samples in suspicious pool and 320K s

amples in normal pool, For DNS, parsing 58 secs, LESG 18 secs

Page 25: Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

25

Conclusions

• A novel network-based automated worm signature generation approach– Work for zero day polymorphic worms with

unknown vulnerabilities – First work which is both Vulnerability based

and Network based using length signature for buffer overflow vulnerabilities

– Provable attack resilience– Fast and accurate through experiments