Defense and detection strategies against internet worms

Download Report

Transcript Defense and detection strategies against internet worms

Defense and Detection
Strategies Against Internet
Worms
Usman Sarwar
[email protected]
Network Research Group,
University Science Malaysia.
Agenda
Basically we have two parts in the
presentation
 Understanding the worm
 Planning the strategies
Worms

A computer worm is a program that
self-propagates across a network
exploiting security or policy flaws in
widely-used services.

A computer worm is a program that
travels from one computer to another
but does not attach itself to the
operating system of the computer it
“infects.”
Destruction by worms
In recent years there were lots of massive
destruction by the worms which somehow
paralyzed the organizations
for example:
 Code red [$2 billion ]
 Love bug [$9 billion ]
Types of worms
There are two types of worms
 Host worms
 Network worms
Construction of worm







Target platform?
How it will attack the remote system
Selecting computer language
Scanning techniques
Payload delivery mechanism
Installation on target host
Establishing the worm network
Introduction mechanisms



Single point
Multiple point
Delayed trigger
Components of worms
There are five components of worms
 Reconnaissance
 Attack components.
 Communication components
 Command components
 Intelligence components
Infection patterns





Random Scanning
Random Scanning using lists
Island hoping
Directed attacking
Hit-list scanning
Worm network topologies





Hierarchical tree
Centrally connected network
Shockwave Rider-type and guerilla networks
Hierarchical networks
Mesh networks
Target vulnerabilities


Prevalence of target
Homogeneous versus heterogeneous targets
Traffic analysis




Growth in traffic volume
Rise in the number of scans and sweeps
Change in traffic patterns for some hosts
Predicting scans by analyzing the scan
engine
Pattern Matching


Port Matching
IP Address matching
Host based detection






Host firewalls
Virus detection software
Partitioned privileges
Sandboxing of applications
Disabling unneeded services and features
Patching known holes
Firewall & Network Defenses



Perimeter firewalls
Subnet firewalls
Reactive IDS deployments
Proxy Defenses




Configuration
Authentication via proxy server
Mail server proxies
Web based proxies
Software vulnerabilities

Most security vendors focus on adding
features rather than fixing existing products


SQL SERVER (Slammer worm)
Windows (blaster worm)
Attacking the worm network



Shutdown messages
Bluffing with worm
Slowing down the spread
Future worms attributes
expectations







Intelligence
Polymorphism techniques
Modular and upgradability
Better hiding techniques
Web crawlers as worms
Super worms
Political messages.
References















1- Ranum, M. J., and F. M. Avolio, “A Toolkit and Methods for Internet
Firewalls,” Proc. USENIX Summer, 1994, pp. 37–44.
2 Safford, D. R., D. L. Schales, and D. K. Hess, “The TAMU Security Package:
An
Ongoing Response to Internet Intruders in an Academic Environment,” Proc.
Fourth USENIX Security Symposium, Santa Clara, CA, 1993, pp. 91–118.
3 Wack, J., K. Cutler, and J. Pole, “Guidelines on Firewalls and Firewall Policy:
Recommendations of the National Institute of Standards and Technology,”
2001. Available at http://csrc.nist.gov/publications/nistpubs/800-41/
sp800-41.pdf.
4- Chapman, D. B., “Network (In)Security Through IP Packet Filtering,” Proc.
UNIX Security Symposium III, Baltimore, MD, 1992, pp. 63–76.
5-Mullen, T., “The Right to Defend,” 2002. Available at http:// www.
securityfocus.com/columnists/98.
6-Liston, T., “LaBrea,” 2001. Available at http://www.hackbusters.net/.
7-Defense and Detection strategies against internet worms by Jose Nazario.