Top Banner
A Project Review 1 On MODELING AND DETECTION OF COMOUFLAGING WORM
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PPT for Project Review 1

A Project Review 1

On

MODELING AND DETECTION OF COMOUFLAGING WORM

Page 2: PPT for Project Review 1

Abstract Active worms pose major security threats to the Internet.

Active worms continuously compromise computers on the Internet.

The C-Worm is different from traditional worms.

We analyze characteristics of the C-Worm.

We design a novel spectrum-based scheme to detect the C-Worm.

Page 3: PPT for Project Review 1

Cont…

Power Spectral Density (PSD) distribution and Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic.

The generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well.

Page 4: PPT for Project Review 1

Literature Review Code-Red Worm

Slammer Worm

Witty Worm

Page 5: PPT for Project Review 1

Code Red Worm From July 12, 2001, the Code-Red I worm began to exploit.

The worm generates a random list of IP addresses.

The 1st version of the Code-Red worm (Code-Red I v1) which is memory resistant.

Began to infect hosts running unpatched versions of Microsoft’s IIS web server.

The 2nd version is Code- Red I v2 uses a random seed in its pseudo-random number generator.

Page 6: PPT for Project Review 1

Methodology

Page 7: PPT for Project Review 1

Cont…

Page 8: PPT for Project Review 1

Cont…

Page 9: PPT for Project Review 1

Cont…

Page 10: PPT for Project Review 1

Slammer Worm Slammer (sometimes called Sapphire) was the fastest

computer worm in history. The worm infected more than 90 percent of vulnerable hosts

within 10 minutes. Slammer’s most novel feature is its propagation speed. By comparison, Slammer was two orders of magnitude faster

than the Code Red worm. The worm’s spreading strategy uses random scanning. For a random-scanning worm to be effective, it needs a good

source of random numbers to select new attack targets.

Page 11: PPT for Project Review 1

Cont… Slammer uses a linear congruent, or power residue,

pseudo random number generation (PRNG) algorithm. These algorithms take the form: x' = (x × a + b) mod m, where x' is the new pseudo random number to be generated, x is the last pseudo random number generated, m represents the range of the result, and a

and b are carefully chosen constants.

Page 12: PPT for Project Review 1

Cont…

Page 13: PPT for Project Review 1

Cont…

Page 14: PPT for Project Review 1

Cont…

Page 15: PPT for Project Review 1

Cont…

Page 16: PPT for Project Review 1

Witty Worm The worm took advantage of a security flaw in these firewall

applications.

Network telescope ISS vulnerability Witty worm details Witty worm spread

Page 17: PPT for Project Review 1

Cont…

Page 18: PPT for Project Review 1

Cont…

Page 19: PPT for Project Review 1

Cont…

Page 20: PPT for Project Review 1

Introduction to Proposed ProjectAn active worm refers to a malicious software program

that propagates itself on the Internet to infect other computers.

1. Launch massive Distributed Denial-of-Service (DDoS) attacks that disrupt the Internet utilities,

2. Access confidential information that can be misused through large-scale traffic sniffing, key logging, identity theft, etc.,

3. Destroy data that has a high monetary value, and 4. Distribute large-scale unsolicited advertisement

emails (as spam) or software (as malware).

Page 21: PPT for Project Review 1

Cont… Worms that adopt such smart attack strategies could exhibit

overall scan traffic patterns different from those of traditional worms.

We conduct a systematic study on a new class of such smart-worms denoted as Camouflaging Worm (C-Worm in short).

The camouflage is achieved by manipulating the scan traffic volume of worm infected computers.

Page 22: PPT for Project Review 1

Cont… A novel spectrum-based detection scheme that uses

the Power Spectral Density (PSD) distribution of scan traffic volume in the frequency domain and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from non worm traffic (background traffic).

Page 23: PPT for Project Review 1

Cont… Furthermore, we demonstrate the effectiveness of our

spectrum-based detection scheme in comparison with existing worm-detection schemes. We define several new metrics. Maximal Infection Ratio (MIR) is the one to quantify the infection damage caused by a worm before being detected. Other metrics include Detection Time (DT) and Detection Rate (DR).

Page 24: PPT for Project Review 1

Existing System Existing detection schemes are based on a tacit

assumption that each worm-infected computer keeps scanning the Internet and propagates itself at the highest possible speed.

Threshold based detection and trend-based detection have been developed to detect the large scale propagation of worms in the Internet .

The scheme adopts the distribution of attack targets as the basic detection data to capture the key feature of worm propagation.

Page 25: PPT for Project Review 1

Proposed System We demonstrate effectiveness of the C-Worm against

existing traffic volume-based detection schemes; our detection scheme captures the distinct pattern of the C-Worm in the frequency domain.

To identify the C-Worm propagation we use the distribution of Power Spectral Density (PSD) and its corresponding Spectral Flatness Measure (SFM) of the scan traffic.

Page 26: PPT for Project Review 1

Software Requirement SpecificationsHARDWARE REQUIREMENTS

PROCESSOR : PENTIUM IV 2.6 GHz, Intel Core 2 Duo. RAM : 512 MB DD RAM MONITOR : 15” COLOR HARD DISK : 40 GB CDDRIVE : LG 52X

SOFTWARE REQUIREMENTS

Front End : JAVA (SWINGS) Back End : MS SQL 2000/05 Operating System : Windows XP/07 IDE : Net Beans, Eclipse

Page 27: PPT for Project Review 1

References1. D. Moore, C. Shannon, and J. Brown, “Code-Red: A Case Study

on the Spread and Victims of an Internet Worm,” Proc. Second Internet Measurement Workshop (IMW), Nov. 2002.

2. D. Moore, V. Paxson, and S. Savage, “Inside the Slammer Worm,” Proc. IEEE Magazine of Security and Privacy, July 2003.

3.  CERT, CERT/CC Advisories, http://www.cert.org/advisories/,2010. 

4. J. Ma, G.M. Voelker, and S. Savage, “Self-Stopping Worms,” Proc. ACM Workshop Rapid Malcode (WORM), Nov. 2005.

Page 28: PPT for Project Review 1
Page 29: PPT for Project Review 1

Presented byM. Nagaraju

M.Tech(CSE) 2nd Year