Top Banner
WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli
34

WORMS : attacks, defense and models - Boston University

Sep 12, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WORMS : attacks, defense and models - Boston University

WORMS : attacks, defense and models

Presented by:Abhishek SharmaVijay Erramilli

Page 2: WORMS : attacks, defense and models - Boston University

What is a computer “worm” ? Is it not the same as a computer “virus” ?

A computer worm is a program that self-propagates across a network exploiting security or policy flaws.A computer virus requires some sort of user action to abet their propagationThe line between worms and viruses is not all that sharp : contagion worms

Page 3: WORMS : attacks, defense and models - Boston University

Outline

A Taxonomy of Computer Worms

The “Slammer” Worm

What does the future have in store?

Page 4: WORMS : attacks, defense and models - Boston University

A Taxonomy of Computer Worms:“know thy enemy”To understand the worm threat, it is necessary to under the various types of worms.Taxonomy based on:

target discoverycarrieractivationpayloadsattackers

Page 5: WORMS : attacks, defense and models - Boston University

Target Discovery: the mechanism by which a worm discovers new targets to infect

: scanning, hit-list scanning

Scanning : entails probing a set of addresses to identify vulnerable hosts.

sequential : working through a IP address block using an ordered set of addressesrandom : trying address out of a block in a pseudo-random fashion

Code-Red, Nimda, Slammer Worm

Page 6: WORMS : attacks, defense and models - Boston University

Optimizations to scanning

Localized scanning strategy : (Code- Red II)With probability 3/8 choose a random IP address from within the class B address (/16 network) of the infected machine.With probability 1/2 choose randomly from the class A (/8 network) of the infected machine.With probability 1/8 choose a random address from the whole Internet.

Page 7: WORMS : attacks, defense and models - Boston University

Hit-list Scanning

“getting off the ground”Provide the worm with a list of potentially vulnerable machines.The worm, when released onto an initial machine on this hit-list, begins scanning down the list. When it infects a machine, it divides the hit-list in half, communicating half to the recipient worm, keeping the other half.

Page 8: WORMS : attacks, defense and models - Boston University

Permutation Scanning

Random scanning is inefficient : many addresses are probed multiple timesno means for a randomly scanning worm to effectively determine when all vulnerable machines are infected

Permutation scanninga worm can detect that a particular target is already infectedall worms share a common pseudo random permutation of the IP address space

Page 9: WORMS : attacks, defense and models - Boston University

Spread of Scanning Worms

The speed of scanning worms is limited by:Density of vulnerable machinesDesign of the scannerThe ability of edge routers to handle a potentially significant increase in new, diverse communication.

Scanning is highly anomalous behavior.Effective detection; defenses designed to stop an entire family of worms

Page 10: WORMS : attacks, defense and models - Boston University

How fast do the spread?

Page 11: WORMS : attacks, defense and models - Boston University

Topological Worms : Internal Target Lists

Many applications contain information about other hosts providing vulnerable services.Topological worm searches for local information to find new victims by trying to discover the local communication topology

The original “Morris” worm used topological techniques including Network Yellow pages, /etc/hosts, and other sources to find new victims.

Page 12: WORMS : attacks, defense and models - Boston University

Topological Worms

The spread is slower as compared to scanning worms.Can bypass defenses by communicating information known by one instance to other instances.May present a global anomaly, the local traffic may appear normal.

Highly distributed sensors may be needed to detect topological worms

Page 13: WORMS : attacks, defense and models - Boston University

Target Discovery : Passive Worms

A passive worm does not seek out victim machines. Instead, it either waits for potential victims to contact the worm or rely on user behavior to discover new targetsGnuman : Operates by acting as a Gnutella node which replies to all queries with copies of itself. If this copy is copy is run, the Gnuman starts on the victim and repeats itself.

Page 14: WORMS : attacks, defense and models - Boston University

Passive Worms continued…

CRclean : the “anti-worm”This worm waits for a Code Red II related probe. When it detects an infection attempt, it responds by launching a counterattack. If this counterattack is successful, it removes Code Red II and installs itself on the machine.Never released….

Page 15: WORMS : attacks, defense and models - Boston University

Stealth worms --- contagion

Page 16: WORMS : attacks, defense and models - Boston University

P2P systems : susceptible to contagion worms

Likely need only a single exploit, not a pairOften, peers running identical softwareRich interconnection patternOften used to transfer large filesNot mainstream – less vulnerability assessment, monitoring

Page 17: WORMS : attacks, defense and models - Boston University

P2P network susceptibility continued…

Often give access to user’s desktop rather than server; sensitive data“grey” content : users less inclined to draw attention to unusual behaviorCome with built-in control/ dissemination plain…and can be Very Large

Page 18: WORMS : attacks, defense and models - Boston University

Toolkit Potential

toolkits : large reusable structures where a small amount of additional code can be added to create a worm.Application-independent and application-dependent toolkits seen in the wild.Application independent toolkit can contain:

Code for scanningTransporting payloads

Page 19: WORMS : attacks, defense and models - Boston University

Toolkits continued …

Scanning worms are not application specific. The Slapper worm: attacker inserted a new exploit into the Scalper worm source code.

scanning worms can be released as soon as a vulnerability is published

Page 20: WORMS : attacks, defense and models - Boston University

Distribution Mechanisms

affects the speed and stealth of a wormMechanisms:

Self-carriedSecond channel : Blaster wormEmbedded : contagion worm

An embedded strategy only makes sense when the target selection strategy is also stealthy.

Distribution:One-to-manyMany-to-manyHybrid

Page 21: WORMS : attacks, defense and models - Boston University

Activation

Self-ActivationHuman Activation

rely on social engineering techniquesHuman Activity-Based Activation

Logging in and therefore executing login scriptsOpening a remotely infected file

Scheduled Process Activation

Page 22: WORMS : attacks, defense and models - Boston University

Payloads

None/nonfunctional : Morris, SlammerDisruption through traffic and machine load; by actively advertising vulnerable machines

Internet Remote ControlCode-Red II opened a trivial-to-use privileged backdoor on victim machines; exploited by “anti-Code-Red” worms

Page 23: WORMS : attacks, defense and models - Boston University

Payloads continued…

Spam-Relays: Sobig wormSpammers can avoid mechanisms which block known-spamming IP addresses

HTML-proxies:Redirect web requests (through DNS) to randomly selected proxy machines

Internet DOS

Page 24: WORMS : attacks, defense and models - Boston University

Payloads continued….

Data Collection

Access for sale

Data damage : Chenobyl, Klez

Worm Maintenance: W32/sonic

Page 25: WORMS : attacks, defense and models - Boston University

Code-Red

Page 26: WORMS : attacks, defense and models - Boston University

The Slammer Worm

Spread nearly two orders of magnitude faster than Code-Red

In approx. 3 minutes, the worm achieved its full scanning rate (more than 55 million scans per second)

The spread was so aggressive that the worm quickly interfered with its own growth

Page 27: WORMS : attacks, defense and models - Boston University
Page 28: WORMS : attacks, defense and models - Boston University

Why Slammer was so fast?

Code-Red was latency limited:Spreads via many threads, each invoking connect() to open a TCP session to random addresses

Consequently, each thread’s scanning rate was limited by the network latency

Page 29: WORMS : attacks, defense and models - Boston University

Latency limitation of Code-Red

Thread is blocked while waiting to receive SYN/ACK

Worms can compensate this by invoking large number of threads

Operating system limitations :Context-switching overheadKernel stack memory consumption

Page 30: WORMS : attacks, defense and models - Boston University

Slammer was bandwidth limited

UDP-basedA single packet to UDP port 1434 could exploit the SQL server’s vulnerability

Smaller sizeSlammer : 404 bytesCode-Red : 4 KbytesNimda : 60 Kbytes

Page 31: WORMS : attacks, defense and models - Boston University

Slammer opens a for more worms

Smaller susceptible populations are now more attractive

Need to automate worm defensesFiltering provides no benefit for actually limiting the number of infected machinesWhat is Slammer propagated only for 10 minutes?

75,000 compromised machinesMany might never have been identified !!!

Page 32: WORMS : attacks, defense and models - Boston University

Multi-vector worms---Nimda

By active probingBy bulk e-mailing itself as an attachmentBy copying itself across open network sharesBy adding exploit code to Web pages on compromised serversBy scanning for backdoors left by Code-Red II

Page 33: WORMS : attacks, defense and models - Boston University

Code Red 2 kills off Code Red 1

Code Red 2 settles into weekly pattern

Nimda enters the ecosystem

Code Red 2 dies off as programmed

CR 1 returns thanksto bad clocks

Page 34: WORMS : attacks, defense and models - Boston University

Code Red 2 dies off as programmed

Nimda hums along, slowly cleaned up

With its predator gone, Code Red 1 comes back!, still exhibiting monthly pattern