A Study of Mass
Download
Report
Transcript A Study of Mass
A Study of Massmailing Worms
By Cynthia Wong, Stan Bielski, Jonathan
M. McCune, and Chenxi Wang, Carnegie
Mellon University, 2004
Presented by Allen Stone
Mass-Mailing Worms
Background (Morris, Code Red, and Slammer)
Analysis of SoBig and MyDoom worms
Anomalies
TCP
IP addresses
DNS
Traffic In General
Discussion and Conclusions
Protection
Worms – What are they?
“A self-replicating computer program, similar to a
computer virus. A virus attaches itself to, and becomes
part of, another program; however, a worm is selfcontained and does not need to be part of another
program to propagate itself. They are often designed
to exploit the file transmission capabilities found on
many computers.” - Wikipedia (wikipedia.org)
The Morris Worm
The first internet worm, written by Robert
T. Morris, Jr., a first-year Computer
Science Student at Cornell University.
Infected roughly six thousand machines
nationwide in November of 1988.
Performance of victim machines
drastically reduced because of
propagation attempts.
Scanning Worms
Typical worms use aggressive IP scanning to
find potential victim machines that are
vulnerable to the exploit it carries.
Code Red, 2001
359,000 computers infected within 14 hours.
IIS exploit – spread through web scanning.
Slammer Worm, 2002
75,000 hosts – number doubled every 8.5 seconds.
UDP packet crafted against SQL Server.
Zero Day Exploits
Mass-mailing Worms
Sends itself via email.
Usually infects with email attachments.
Harvests email addresses from address book,
web cache, and hard disk. (unlike viruses)
No need to acquire new targets.
Tricks users into running malicious code on
their own machines.
Some worms use their own SMTP engine.
Analysis
The SoBig and MyDoom mass-mailing
worms
Real network trace data, collected from
the edge router of CMU’s Electrical and
Computer Engineering Department
Two Week Periods (Aug. – Sept. 2003
and Jan. – Feb. 2004)
Infected or chatty?
Heuristics of suspicion
Outgoing SMTP connections on a
controlled network not going to an
authorized mail server.
Message payload – Similar to the
payload sizes of known worm traffic from
Symantec.
Admittedly not 100 percent accurate.
Worm Effect – TCP Traffic
Scanning worms have spikes in all kinds
of traffic, caused by scanning for other
boxes to compromise.
Mass-mailing worms use email to spread
to potential victim boxes through mail
service over TCP.
Worm Effect – TCP Traffic
Worm Effect – TCP Traffic
• Since
the worms use their own
SMTP engines, there should be no
outbound SMTP traffic spikes from
the existing mail servers.
• There is a spike in traffic with
SoBig, but not MyDoom.
• Spoofed emails from the harvest
of addresses creates false
guesses, which create backscatter.
• SoBig is more aggressive than
MyDoom during propagation.
Worm Effect – Distinct IPs
Normal boxes that are not infected touch an
average number of distinct IPs in a given day.
Infected boxes use email addresses from all
over, from the harvest.
The number of distinct IPs an infected system
touches should be noticably larger.
The number of IPs a mail server touches
should not change, intuitively, since they
already send to new IPs on a regular basis.
Worm Effect – Distinct IPs
Infected boxes experienced a rise
Mail servers did as well, despite the
expectation.
Attributed also to the spoofing effort.
Worm Effect - DNS
DNS related events expected to rise,
since SMTP needs to resolve the IP
associated with email addresses.
New cache entry, refreshed cache entry,
cache entry expiration
Worm Effect - DNS
Worm Effect – Overall
Traffic
HTTP traffic dominates the network, with
over 90% of all inbound and outbound
traffic.
Do the infected systems make a large
impact on that fact?
Worm Effect – Overall Traffic
Discussion and
Conclusions
Mass-mailing worms show significant and
noticeable impact on a network.
Prevention measures at the DNS Server,
rather than at the SMTP Server.
Detection focused on Outgoing TCP,
DNS, and Distinct IP’s, rather than on
whole-network anomaly, due to the
impact of HTTP.
Discussion and
Conclusions
Both worms overran the network.
SoBig moreso than MyDoom.
SMTP servers still affected, even with
mail clients on the worms, due to
backscatter.
Antivirus software on Mail Servers
actually counter-productive as a defense
measure.
Protection
Detect worms either at the border router
or individual systems.
Utilize DNS servers to limit the spread of
the worm, possibly quarantining
malicious email traffic.
Pay strict attention to outgoing SMTP
traffic and investigate spikes in such
traffic.
Sources
“A Study of Mass-mailing Worms”
Wong, Bielski, McCune, Wang, CMU 2004
Proceedings of the 2004 AMC workshop on rapid malcode.
“The Spread of the Sapphire/Slammer Worm”
Moore, Paxson, Savage, Shannon, Staniford, Weaver
http://www.cs.berkeley.edu/~nweaver/sapphire/
“Code-Red: a case study on the spread and victims of an Internet
worm”
Moore, Shannon, Claffy
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet
measurement.
“The Cornell Commission: On Morris and the Worm”
Eisenberg, Gries, Hartmanis, Holcomb, Lynn, Santoro
Communications of the ACM, Vol. 32, Issue 6.