Modeling Early Detection and Mitigation of Internet Worm

  • Slides: 36
Download presentation
Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor

Modeling, Early Detection, and Mitigation of Internet Worm Attacks Cliff C. Zou Assistant professor School of Computer Science University of Central Florida Orlando, FL Email: czou@eecs. ucf. edu Web: http: //www. cs. ucf. edu/~czou 1

Worm propagation process n Find new targets u n Compromise targets u n IP

Worm propagation process n Find new targets u n Compromise targets u n IP random scanning Exploit vulnerability Newly infected join infection army 2

Worm research motivation n Code Red (Jul. 2001) : 360, 000 infected in 14

Worm research motivation n Code Red (Jul. 2001) : 360, 000 infected in 14 hours n Slammer (Jan. 2003) : 75, 000 infected in 10 minutes Congested parts of Internet (ATMs down…) n Blaster (Aug. 2003) : 150, 000 ~ 8 million infected DDOS attack (shut down domain windowsupdate. com) n Witty (Mar. 2004) : 12, 000 infected in half an hour Attack vulnerability in ISS security products n Sasser (May 2004) : 500, 000 infected within two days Infection faster than human response ! 3

How to defend against worm attack? n Automatic response required n First, understanding worm

How to defend against worm attack? n Automatic response required n First, understanding worm behavior u n Basis for worm detection/defense Next, early warning of an unknown worm Detection based on worm model u Prediction of worm damage scale u n Last, autonomous defense Dynamic quarantine u Self-tuning defense u 4

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous defense n Summary and current work 5

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous defense n Summary and current work 6

Simple worm propagation model n address space, size W n N : total vulnerable

Simple worm propagation model n address space, size W n N : total vulnerable n It : infected by time t u n W N-It vulnerable at time t scan rate (per host), h Prob. of a scan hitting vulnerable # of increased infected in a unit time 7

Simple worm propagation 8

Simple worm propagation 8

Code Red worm modeling n n Simple worm model matches observed Code Red data

Code Red worm modeling n n Simple worm model matches observed Code Red data “Ideal” network condition No human countermeasures u No network congestions u First model work to consider these [CCS’ 02] u 9

Witty worm modeling n Witty’s destructive behavior: 1). Send 20, 000 UDP scans to

Witty worm modeling n Witty’s destructive behavior: 1). Send 20, 000 UDP scans to 20, 000 IP addresses 2). Write 65 KB in a random point in hard disk § Consider an infected computer: u Constant bandwidth constant time u Random point writing infected host crashes with prob. u Crashing time approximate by to send 20, 000 scans Exponential distribution ( ) 10

Witty worm modeling # of vulnerable at t : # of crashed infected computers

Witty worm modeling # of vulnerable at t : # of crashed infected computers at time t Memoryless # of vulnerable at t property hours *Witty trace provided by U. Michigan “Internet Motion Sensor” 11

Advanced worm modeling — hitlist, routing worm n Hitlist worm — increase I 0

Advanced worm modeling — hitlist, routing worm n Hitlist worm — increase I 0 Contains a list of known vulnerable hosts u Infects hit-list hosts first, then randomly scans u Lasts less than a minute n Routing worm — decrease W Only scan BGP routable space 32 u BGP table information: W =. 32£ 2 u Ø 32% of IPv 4 space is Internet routable 12

Hitlist, routing worm n Code Red style worm n h = 358/min n N

Hitlist, routing worm n Code Red style worm n h = 358/min n N = 360, 000 n hitlist, I(0) = 10, 000 n routing, W=. 29£ 232 13

Botnet-based Diurnal Modeling North America n Europe Eastern Asia Diurnal property of online infectious

Botnet-based Diurnal Modeling North America n Europe Eastern Asia Diurnal property of online infectious hosts u Determined by time zone 14

Worm Propagation Diurnal Model n Divide Internet hosts into groups u n Each group

Worm Propagation Diurnal Model n Divide Internet hosts into groups u n Each group has hosts in one or several nearby time zones same diurnal property Consider modeling in one group: : diurnal shaping function (fraction of online hosts) : # of infected : # of online infected : # of susceptible : # of online susceptible 15

Optimal Worm Releasing Time based on Diurnal Model n Diurnal property affects a worm’s

Optimal Worm Releasing Time based on Diurnal Model n Diurnal property affects a worm’s speed n Speed prediction derived based on diurnal model 16

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous defense n Summary and current work 17

How to detect an unknown worm at its early stage? n Monitor: u Worm

How to detect an unknown worm at its early stage? n Monitor: u Worm scans to unused IPs Ø Ø u n Internet TCP/SYN packets UDP packets Monitored traffic Also called “darknet” Monitored data is noisy Local network Unused IP space 18

Reflection n Worm anomaly other anomalies? u n A worm has its own propagation

Reflection n Worm anomaly other anomalies? u n A worm has its own propagation dynamics Deterministic models appropriate for worms Can we take advantage of worm model to detect a worm? 19

Worm model in early stage 1% 2% Initial stage exhibits exponential growth 20

Worm model in early stage 1% 2% Initial stage exhibits exponential growth 20

“Trend Detection” Detect traffic trend, not burst Trend: worm exponential growth trend at the

“Trend Detection” Detect traffic trend, not burst Trend: worm exponential growth trend at the beginning Detection: estimated exponential rate a be a positive, constant value Monitored illegitimate traffic rate Exponential rate a on-line estimation Non-worm burst traffic Worm traffic 21

Why exponential growth at the beginning? n n n Attacker’s incentive: infect as many

Why exponential growth at the beginning? n n n Attacker’s incentive: infect as many as possible before people’s counteractions If not, a worm does not reach its spreading speed limit Slow spreading worm detected by other ways u Security experts manual check u Honeypot, … 22

Model for estimate of worm exponential growth rate a Exponential model: Zt : #

Model for estimate of worm exponential growth rate a Exponential model: Zt : # of monitored scans at time t : monitoring noise yield 23

Estimation by Kalman Filter System: where Kalman Filter for estimation of Xt : 24

Estimation by Kalman Filter System: where Kalman Filter for estimation of Xt : 24

Code Red simulation experiments Population: N=360, 000, Scan rate h = N(358/min, 1002), Monitored

Code Red simulation experiments Population: N=360, 000, Scan rate h = N(358/min, 1002), Monitored IP space 220, Infection rate: a = 1. 8/hour, Initially infected: I 0=10 Monitoring interval: 1 minute Consider background noise At 0. 3% (157 min): estimate stabilizes at a positive constant value 25

Damage evaluation — Prediction of global vulnerable population N yield Accurate prediction when less

Damage evaluation — Prediction of global vulnerable population N yield Accurate prediction when less than 1% of N infected 26

Damage evaluation — Estimation of global infected population It : cumulative # of observed

Damage evaluation — Estimation of global infected population It : cumulative # of observed infected hosts by time t : per host scan rate : fraction of address space monitored : Prob. an infected to be observed by the monitor in a unit time # of newly observed (t t+1) # of unobserved Infected by t Monitoring 214 IP space (p=4£ 10 -6) 27

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous defense n Summary and current work 28

Autonomous defense principles n Principle #1 Preemptive Quarantine Compared to attack potential damage, we

Autonomous defense principles n Principle #1 Preemptive Quarantine Compared to attack potential damage, we are willing to tolerate some false alarm cost u Quarantine upon suspicious, confirm later u Basis for our Dynamic Quarantine [WORM’ 03] u n Principle #2 Adaptive Adjustment More serious attack, more aggressive defense u At any time t, minimize: u (attack damage cost) + (false alarm cost) 29

Self-tuning defense against various network attacks n Principle #2 : Adaptive Adjustment u n

Self-tuning defense against various network attacks n Principle #2 : Adaptive Adjustment u n More severe attack, more aggressive defense Self-tuning defense system designs: u u u SYN flood Distributed Denial-of-Service (DDo. S) attack Internet worm infection DDo. S attack with no source address spoofing 30

Motivation of self-tuning defense : False positive prob. blocking normal traffic 1 Severe attack

Motivation of self-tuning defense : False positive prob. blocking normal traffic 1 Severe attack : False negative prob. missing attack traffic : Detection sensitivity Light attack : Fraction of attack in traffic 0 1 Q: Which operation point is “good”? A: All operation points are good Optimal one depends on attack severity p 31

Estimation of attack severity p Filter Passed Dropped Incoming : Fraction of detected traffic

Estimation of attack severity p Filter Passed Dropped Incoming : Fraction of detected traffic # of incoming attack traffic # of incoming normal traffic Unbiased 32

Self-tuning defense design Filter Incoming Self-tuning optimization Passed Attack estimation Discrete time k k+1

Self-tuning defense design Filter Incoming Self-tuning optimization Passed Attack estimation Discrete time k k+1 Optimization: Fraction of : Cost of dropping a normal traffic passed attack dropped normal : Cost of passing an attack traffic 33

Self-tuning defense structure Self-tuning defense Operation Settings Attack Severity Detection Defense More severe attack,

Self-tuning defense structure Self-tuning defense Operation Settings Attack Severity Detection Defense More severe attack, more aggressive defense 34

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous

Outline n Worm propagation modeling n Early warning of an unknown worm n Autonomous defense n Summary and current work 35

Worm research contribution n Worm modeling: u u n Early detection: u u n

Worm research contribution n Worm modeling: u u n Early detection: u u n Detection based on “exponential growth trend” Estimate/predict worm potential damage Autonomous defense: u u n Two-factor model: Human counteractions; network congestion Diurnal modeling; worm scanning strategies modeling Dynamic quarantine (interviewed by NPR) Self-tuning defense (patent filed by AT&T) Email-based worm modeling and defense 36