Modeling Analysis and Mitigation of Internet Worm Attacks

  • Slides: 46
Download presentation
Modeling, Analysis, and Mitigation of Internet Worm Attacks Presenter: Cliff C. Zou Dept. of

Modeling, Analysis, and Mitigation of Internet Worm Attacks Presenter: Cliff C. Zou Dept. of Electrical & Computer Engineering University of Massachusetts, Amherst Advisor: Weibo Gong, Don Towsley Joint work with Don Towsley, Weibo Gong, Lixin Gao, and Songlin Cai 1

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 2

Epidemic Model — Simple Epidemic Model susceptible # of contacts I S : #

Epidemic Model — Simple Epidemic Model susceptible # of contacts I S : # of susceptible : # of hosts : # of infectious : infection ability Simple epidemic model for fixed population homogeneous system: infectious I(t) t 3

Epidemic Model — Kermack-Mc. Kendrick Model n State transition: susceptible infectious : # of

Epidemic Model — Kermack-Mc. Kendrick Model n State transition: susceptible infectious : # of removed from infectious n removed : removal rate Epidemic threshold theorem: Ø No outbreak happens if where : epidemic threshold t 4

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 5

Internet Worm Modeling — Consider Human Countermeasures n Human countermeasures: u u u n

Internet Worm Modeling — Consider Human Countermeasures n Human countermeasures: u u u n Reasons for: u u n Clean and patch: download cleaning program, patches. Filter: put filters on firewalls, gateways. Disconnect computers. Suppress most new viruses/worms from outbreak. Eliminate virulent viruses/worms eventually. Removal of both susceptible and infectious hosts. infectious susceptible removed 6

Internet Worm Modeling — Two-Factor Worm Model n Factor #2: Network congestion u u

Internet Worm Modeling — Two-Factor Worm Model n Factor #2: Network congestion u u u n Large amount of scan traffic. Most scan packets with unused IP addresses ( 30% BGP routable) Effect: slowing down of worm infection ability Two-factor worm model (extended from KM model): u u : Slowed down infection ability due to congestion : removal from susceptible hosts. : from infectious 7

Verification of the Two-Factor Worm Model Code Red n * Conclusion: u u *

Verification of the Two-Factor Worm Model Code Red n * Conclusion: u u * SQL Slammer Simple epidemic model overestimates a worm’s propagation At beginning, we can ignore these two factors. Figure from: D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, “Inside the Slammer Worm”, IEEE Security & Privacy, July 2003. 8

Summary of Two-Factor Model n Modeling Principle: u n Two factors affecting worm propagation:

Summary of Two-Factor Model n Modeling Principle: u n Two factors affecting worm propagation: u u n We must consider the changing environment when we model a dynamic process. Human countermeasures. Worm’s impact on Internet infrastructure. At the early stage of worm propagation, we can ignore these two factors. u Still use simple epidemic model. 9

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 10

How to detect an unknown worm at its early stage? n Monitoring: u Monitor

How to detect an unknown worm at its early stage? n Monitoring: u Monitor worm scan traffic (non-legitimate traffic). Ø Ø u Observation data is very noisy. Ø Ø n Connections to nonexistent IP addresses. Connections to unused ports. Old worms’ scans. Port scans by hacking toolkits. Detecting: u u Anomaly detection for unknown worms Traditional anomaly detection: threshold-based Ø Ø Check traffic burst (short-term or long-term). Difficulties: False alarms; threshold tuning. 11

“Trend Detection” Detect traffic trend, not burst Trend: worm exponential growth trend at the

“Trend Detection” Detect traffic trend, not burst Trend: worm exponential growth trend at the beginning Detection: the exponential rate should be a positive, constant value Monitored illegitimate traffic rate Exponential rate a on-line estimation Non-worm traffic burst Worm traffic 12

Why exponential growth at the beginning? n The law of natural growth reproduction n

Why exponential growth at the beginning? n The law of natural growth reproduction n Exponential growth — fastest growth pattern when: u u u n Negligible interference (beginning phase). All objects have similar reproductive capability. Large-scale system — law of large number. Fast worm has exponential growth pattern u u u Attacker’s incentive: infect as many as possible before people’s counteractions. If not, a worm does not reach its spreading speed limit. Slow spreading worms can be detected by other ways. 13

Code Red simulation experiments Population: N=360, 000, Scan rate h = N(358/min, 1002), Monitored

Code Red simulation experiments Population: N=360, 000, Scan rate h = N(358/min, 1002), Monitored IP space 220, Infection rate: a = 1. 8/hour, Initially infected: I 0=10 Monitoring interval: D = 1 minute Consider background noise Before 2% (223 min): estimate is already stabilized and oscillating a little around a positive constant value 14

Early detection of Blaster n Blaster: sequentially scans from a starting IP address: u

Early detection of Blaster n Blaster: sequentially scans from a starting IP address: u u n 40% from local Class C address. 60% from a random IP address. It follows simple epidemic model. After using low-pass filter 15

Bias correction for uniform-scan worms n Bernoulli trial for a worm to hit monitors

Bias correction for uniform-scan worms n Bernoulli trial for a worm to hit monitors (hitting prob. = p ). Bias correction: : Average scan rate Monitoring 217 IP space Monitoring 214 IP space Bias correction can provide unbiased estimate of I(t) 16

Prediction of Vulnerable population size N Direct from Kalman filter: Alternative method: h :

Prediction of Vulnerable population size N Direct from Kalman filter: Alternative method: h : A worm sends out h scans per D time (derived from egress scan monitor) Estimation of population N 17

Summary of Early Detection n Trend detection: non-threshold based methodology u u n Monitoring

Summary of Early Detection n Trend detection: non-threshold based methodology u u n Monitoring requirement for non-uniform scan worm: u n Principle: detect traffic trend, not burst Pros : Robust to background noise low false alarm rate Monitor many well-distributed IP blocks; low-pass filter For uniform-scan worms u Bias correction: u Forecasting N: ( IPv 4 ) : scanning IP space : scan hitting prob. Routing worm : Average scan rate : Infection rate : cumulative # of observed infectious 18

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 19

Motivation: automatic mitigation and its difficulties n Fast spreading worms pose serious challenges: u

Motivation: automatic mitigation and its difficulties n Fast spreading worms pose serious challenges: u u n SQL Slammer infected 90% within 10 minutes. Manual counteractions out of the question. Difficulty of automatic mitigation high false alarm cost. u u u Anomaly detection for unknown worm. False alarms vs. detection speed. Traditional mitigation: Ø No quarantine at all … long-time quarantine until passing human’s inspection. 20

Principles in real-world epidemic disease control n Principle #1 Preemptive quarantine Assuming guilty before

Principles in real-world epidemic disease control n Principle #1 Preemptive quarantine Assuming guilty before proven innocent u Comparing with disease potential damage, we are willing to pay for certain false alarm cost. u n Principle #2 Feedback adjustment u More serious epidemic, more aggressive quarantine action Ø Adaptive adjustment of the trade-off between disease damage and false alarm cost. 21

Dynamic Quarantine n Assuming guilty before proven innocent u u n Quarantine on suspicion,

Dynamic Quarantine n Assuming guilty before proven innocent u u n Quarantine on suspicion, release quarantine after a short time automatically reduce false alarm cost Can use any host-based, subnet-based (e. g. , Counter. Malice) anomaly detection system. Host or subnet based quarantine (not whole network-level quarantine). Quarantine is on suspicious port only. A graceful automatic mitigation: No quarantine Dynamic short-time quarantine long-time quarantine 22

Feedback Control Dynamic Quarantine Framework (host-level) Network Activities Anomaly Detection System Worm Detection &

Feedback Control Dynamic Quarantine Framework (host-level) Network Activities Anomaly Detection System Worm Detection & Evaluation Worm detection system Decision & Control n Feedback : More suspicious, more aggressive action n Predetermined constants: ( for each TCP/UDP port) n Observation variables: : # of quarantined hosts/subnets. n Worm detection and evaluation variables: Probability Damage n Control variables: Quarantine time Alarm threshold 23

Two-level Feedback Control Dynamic Quarantine Framework Malware Warning Center Local network n Network-level quarantine

Two-level Feedback Control Dynamic Quarantine Framework Malware Warning Center Local network n Network-level quarantine (Internet scale) u u n Host-level quarantine Dynamic quarantine is on routers/gateways of local networks. Quarantine time, alarm threshold are recommended by MWC. Host-level quarantine (local network scale) u u Dynamic quarantine is on individual host or subnet in a network. Quarantine time, alarm threshold are determined by: Ø Ø Local network’s worm detection system. Advisory from Malware Warning Center. 24

Host-level Dynamic Quarantine without Feedback Control n First step: no feedback control/optimization u Fixed

Host-level Dynamic Quarantine without Feedback Control n First step: no feedback control/optimization u Fixed quarantine time, alarm threshold. I(t): # of infectious S(t): # of susceptible T: Quarantine time R(t): # of quarantined infectious Q(t): # of quarantined susceptible 1: quarantine rate of infectious 2: quarantine rate of susceptible Assumptions: removed 25

Extended Simple Epidemic Model Susceptible S(t) I(t) Q(t)=p’ 2 S(t) # of contacts Infectious

Extended Simple Epidemic Model Susceptible S(t) I(t) Q(t)=p’ 2 S(t) # of contacts Infectious R(t)=p’ 1 I(t) Before quarantine: After quarantine: 26

Extended Simple Epidemic Model Vulnerable population N=75, 000, worm scan rate 4000/sec T=4 seconds,

Extended Simple Epidemic Model Vulnerable population N=75, 000, worm scan rate 4000/sec T=4 seconds, l 1 = 1, l 2=0. 000023 (twice false alarms per day per node) R(t): # of quarantined infectious Q(t): # of quarantined susceptible Law of large number 27

Summary of Feedback Dynamic Quarantine Defense n Learn the quarantine principles in real-world epidemic

Summary of Feedback Dynamic Quarantine Defense n Learn the quarantine principles in real-world epidemic disease control: u u n Preemptive quarantine: Comparing with disease potential damage, we are willing to pay certain false alarm cost Feedback adjustment: More serious epidemic, more aggressive quarantine action Two-level feedback control dynamic quarantine framework u Optimal control objective: Ø Ø n Reduce worm spreading speed, # of infected hosts. Reduce false alarm cost. Derive worm models under open-loop dynamic quarantine u u Efficiently reduce worm spreading speed Raise/generate epidemic threshold 28

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 29

BGP Routing Worm n Contains BGP routing prefixes: u n Scanning space is 28.

BGP Routing Worm n Contains BGP routing prefixes: u n Scanning space is 28. 6% of entire IPv 4 space. u n Fact: routable IP space < 30% of entire IPv 4 space. Increasing worm’s speed by 3. 5 times. Payload requirement: 175 KB u Non-overlapping prefixes: Ø u u Remove “ 128. 119. 85/24” if BGP contains “ 128. 119/16”. 140602 prefixes 62053 prefixes (Sept. 22, 2003) Big payload for Internet-scale worm propagation. 30

Class A Routing Worm n IANA provides Class A address allocations u Class A

Class A Routing Worm n IANA provides Class A address allocations u Class A (x. 0. 0. 0/8); 256 Class A in IPv 4 space. 002/8 : IANA - Reserved 003/8 : General Electric Company 056/8 : U. S. Postal Service 214/8 : US-DOD 216/8 : ARIN 217/8 : RIPE NCC 224/8 : IANA - Multicast n 116 Class A networks contain all BGP routable space. u n Scanning space: 45. 3%; payload: 116 Bytes. Routing worm based on BGP prefixes aggregation. u Trade-off: scanning space Prefix payload (“/13” 37%, 5 KB) 31

Routing Worm Propagation Study where : # of vulnerable : Scan rate : Scanning

Routing Worm Propagation Study where : # of vulnerable : Scan rate : Scanning space Comparison of the Code Red worm, a routing worm, a hitlist worm, and a hit-list routing worm N=360, 000; h=358 scans/min; I(0)=10 ( 10, 000 for the hit-list worm ) 32

Routing Worm: A Selective Attack Worm n Selective Attack u u n Different behaviors

Routing Worm: A Selective Attack Worm n Selective Attack u u n Different behaviors on different compromised hosts. Imposes damage based on geographical information of IP addresses of compromised hosts Geographical information of IP addresses u u u IP address Routing prefix AS BGP routing table Researches AS Company, ISP, Country Pinpoint attacking vulnerable hosts in a specific target Potential terrorists cyberspace attacks 33

Selective Attack: a Generic Attacking Technique n Imposes damage based on any information a

Selective Attack: a Generic Attacking Technique n Imposes damage based on any information a worm can get from compromised hosts OS (e. g. : illegal OS, OS language, time zone ) u Software (e. g. : installed a specific program) u Hardware ( e. g. : CPU, memory, network card) u n Improving propagation speed u Maximize usage of each compromised host. Ø Multi-thread worm: generates different numbers of threads based on CPU, memory, and connection speed of compromised computers. 34

Defense: Upgrading IPv 4 to IPv 6 n Routing worm idea: Reducing worm scanning

Defense: Upgrading IPv 4 to IPv 6 n Routing worm idea: Reducing worm scanning space u Effective, easier than hit-list worm to implement u Difficult to prevent: Ø n public BGP tables and IP geographical information Defense: Increasing worm scanning space Upgrading IPv 4 to IPv 6 u u u The smallest network in IPv 6 has 264 IP address space. A worm needs 40 years to infect 50% of vulnerable hosts in a network when N=1, 000, h=100, 000/sec, I(0)=1000 Limitation: for scan-based worms only 35

Summary of Routing Worm n Routing worm: a worm containing information of BGP routing

Summary of Routing Worm n Routing worm: a worm containing information of BGP routing prefixes in the worm code. n Routing worm: a faster spreading worm u u n Scans routable space (< 30%) instead of entire IPv 4 space. Increasing propagation speed by 2 ~ 3. 5 times. Routing worm: a selective attack worm u IP address routing prefix AS Ø u n ISP, Country Pinpoint attacking vulnerable hosts in a specific target Selective attack based on any information a worm can get from compromised hosts. Defense: Increase a worm’s scanning space IPv 4 upgrade to IPv 6 36

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 37

Epidemic Model Introduction n Model for homogeneous system : # of hosts : #

Epidemic Model Introduction n Model for homogeneous system : # of hosts : # of infectious : infection ability For worm modeling: Infinitesimal analysis n : scan rate : scanning space Model for interacting groups 38

Idealized Worm n Knows IP addresses of all vulnerable hosts n Perfect worm u

Idealized Worm n Knows IP addresses of all vulnerable hosts n Perfect worm u n Flash worm u n Cooperation among worm copies No cooperation; random scan Complete infection within seconds 39

Uniform Scan Worms • Hit-list worm has a hit-list of I(0)=10, 000 • Routing

Uniform Scan Worms • Hit-list worm has a hit-list of I(0)=10, 000 • Routing worm has W=0. 286£ 232 • Other parameters: N=360, 000 h=358/min I(0)=10 n Defense: Crucial to prevent attackers from u u Identifying IP addresses of a large number of vulnerable hosts Flash worm, Hit-list worm Obtaining address information to reduce a worm’s scanning space Routing worm 40

Local Preference Scan Worm Class A local scan (K=256, m=116) u u Class B

Local Preference Scan Worm Class A local scan (K=256, m=116) u u Class B local scan (K=216, m=116£ 28) Local preference scan increases speed (when vulnerable hosts are not uniformly distributed) Local scan on Class A (“/8”) networks: p* 1 Local scan on Class B (“/16”) networks: p* 0. 85 Code Red II: p=0. 5 (Class A), p=0. 375 (Class B) Smaller than p* 41

Sequential Scan Worm Simulation Study Uniform scan, sequential scan with/without local preference (100 simulation

Sequential Scan Worm Simulation Study Uniform scan, sequential scan with/without local preference (100 simulation runs) Vulnerable hosts uniformly distributed in BGP routable IP space (28. 6% of IPv 4 space) u u Local preference in selecting starting point is a bad idea. Sequential scan uniform scan (when vulnerable hosts are uniform distributed) u Mean value analysis cannot analyze variability. 42

Summary of Worm Scanning Strategies n Modeling basis: Law of large number; mean value

Summary of Worm Scanning Strategies n Modeling basis: Law of large number; mean value analysis; infinitesimal analysis. u Epidemic model: u n Conclusions: u All about worm scanning space W (or density of vulnerable population): Ø Ø Flash worm, Hit-list worm, Routing worm Local preference, divide-and-conquer, selective attack 43

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and

Outline n Introduction of epidemic models n Two-factor worm model n Early detection and monitoring n Feedback dynamic quarantine defense n Routing worm: a fast, selective attack worm n Worm scanning strategies n Summary and future work 44

Worm Research Summary n Modeling and analysis: u Two-factor worm model. Ø Human counteractions

Worm Research Summary n Modeling and analysis: u Two-factor worm model. Ø Human counteractions and network congestion. Routing worm. u Worm scanning strategies. u n Worm defense: Early detection: detect trend, not burst. u Feedback dynamic quarantine u Ø n preemptive quarantine and feedback adjustment. Papers at: http: //tennis. ecs. umass. edu/~czou 45

Future Work n Feedback dynamic quarantine defense. Enterprise network. u Cost function; optimal control.

Future Work n Feedback dynamic quarantine defense. Enterprise network. u Cost function; optimal control. u n Verification on real data. Early detection. u Statistical analysis. u n Realistic Internet-scale worm simulation. u First: distribution of on-line hosts. 46