Addressing The Threat of Internet Worms.ppt
《Addressing The Threat of Internet Worms.ppt》由会员分享,可在线阅读,更多相关《Addressing The Threat of Internet Worms.ppt(41页珍藏版)》请在麦多课文档分享上搜索。
1、Addressing The Threat of Internet Worms,Vern Paxson ICSI Center for Internet Researchand Lawrence Berkeley National Laboratory vernicir.orgApril 14, 2005,Outline,Worms as seen in the wild “Better” worms: likely evolutionDetection & defenseCCEID: Collaborative Center for Internet Epidemiology and Def
2、enses - UCSD (Prof. Stefan Savage) & ICSI,What is a Worm?,Self-replicating/self-propagating code. Spreads across a network by exploiting flaws in open services. As opposed to viruses, which require user action to quicken/spread Enabled by Internets open communication model plus lack of implementatio
3、n diversity,The Morris Worm: Nov. 1988,First large-scale worm Targeted VAX, Sun Unix systems Spread by Scanning the local subnet Mining /etc/passwd, /etc/hosts.equiv/ .rhosts for targets Exploiting a fingerd buffer overflow Exploiting sendmails DEBUG mode (not a bug!) Included code to Crack password
4、s (including 400-word obfuscated dictionary) Detect co-resident worm processes Die off if magic global is set Phone home to ernie.berkeley.edu (buggy) 6-10% of all Internet hosts infected,Code Red: July/Aug. 2001,Initial version released July 13, 2001.Exploited known bug in Microsoft IIS Web servers
5、.Payload: web site defacement HELLO! Welcome to http:/! Hacked By Chinese! Only done if language setting = English,Code Red of July 13, cont,1st through 20th of each month: spread. 20th through end of each month: attack. Flooding attack against 198.137.240.91 i.e., www.whitehouse.gov Spread: via ran
6、dom scanning of 32-bit IP address space.But: failure to seed random number generator linear growth.,Code Red, cont,Revision released July 19, 2001. White House responds to threat of flooding attack by changing the address of www.whitehouse.gov Causes Code Red to die for date 20th of the month due to
7、 failure of TCP connection to establish.But: this time random number generator correctly seeded. Bingo!,Measuring Internet-Scale Activity: Network Telescopes,Idea: monitor a cross-section of Internet address space to measure network traffic involving wide range of addresses “Backscatter” from DOS fl
8、oods Attackers probing blindly Random scanning from worms LBNLs cross-section: 1/32,768 of Internet Small enough for appreciable telescope lag UCSD, UWiscs cross-section: 1/256.,Spread of Code Red,Network telescopes give lower bound on # infected hosts: 360K. (Beware DHCP & NAT) Course of infection
9、fits classic logistic. Note: larger the vulnerable population, faster the worm spreads.That night ( 20th), worm dies except for hosts with inaccurate clocks! It just takes one of these to restart the worm on August 1st ,Striving for Greater Virulence: Code Red 2,Released August 4, 2001. Comment in c
10、ode: “Code Red 2.” But in fact completely different code base. Payload: a root backdoor, resilient to reboots. Bug: crashes NT, only works on Windows 2000. Localized scanning: prefers nearby addresses.Kills Code Red I.Safety valve: programmed to die Oct 1, 2001.,Striving for Greater Virulence: Nimda
11、,Released September 18, 2001. Multi-mode spreading: attack IIS servers via infected clients email itself to address book as a virus copy itself across open network shares modifying Web pages on infected servers w/ client exploit scanning for Code Red II backdoors (!)worms form an ecosystem! Leaped a
12、cross firewalls.,Code Red 2 kills off Code Red 1,Code Red 2 settles into weekly pattern,Nimda enters the ecosystem,Code Red 2 dies off as programmed,CR 1 returns thanks to bad clocks,Life Just Before Slammer,Life Just After Slammer,A Lesson in Economy,Slammer exploited connectionless UDP service, ra
13、ther than connection-oriented TCP. Entire worm fit in a single packet!When scanning, worm could “fire and forget”. Stateless!Worm infected 75,000+ hosts in 10 minutes (despite broken random number generator). At its peak, doubled every 8.5 seconds Progress limited by the Internets carrying capacity
14、(= 55 million scans/sec),Modeling Worm Spread,Often well described as infectious epidemics Simplest model: Homogeneous random contacts Classic SI model N: population size S(t): susceptible hosts at time t I(t): infected hosts at time t : contact rate i(t): I(t)/N, s(t): S(t)/N,The Usual Logistic Gro
15、wth,Slammers Bandwidth-Limited Growth,Blaster,Released August 11, 2003. Exploits flaw in RPC service ubiquitous across Windows. Payload: attack Microsoft Windows Update. Despite flawed scanning and secondary infection strategy, rapidly propagates to 8 million (?!) hosts. Actually, bulk of infections
16、 are really Nachia, a Blaster counter-worm. Key paradigm shift: the “perimeter” is gone.,Attacks on Passive Monitoring,Exploits for bugs in read-only analyzers!Suppose protocol analyzer has an error parsing unusual type of packet E.g., tcpdump and malformed optionsAdversary crafts such a packet, ove
17、rruns buffer, causes analyzer to execute arbitrary code,Witty,Released March 19, 2004. Single UDP packet exploits flaw in the passive analysis of Internet Security Systems products. “Bandwidth-limited” UDP worm ala Slammer. Vulnerable pop. (12K) attained in 75 minutes. Payload: slowly corrupt random
18、 disk blocks. Flaw had been announced the previous day. Written by a Pro. Detailed telescope analysis reveals worm targeted a US military base and was launched from a European retail ISP account.,What if Spreading Were Well-Designed?,Observation (Weaver): Much of a worms scanning is redundant. Idea:
19、 coordinated scanning Construct permutation of address space Each new worm starts at a random point Worm instance that “encounters” another instance re-randomizes.Greatly accelerates worm in later stages. Also note: worm can spread & then stop.,What if Spreading Were Well-Designed?, cont,Observation
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ADDRESSINGTHETHREATOFINTERNETWORMSPPT
