Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Investigating the Impact of Real-World Factors on Internet Worm Propagation Daniel Ray, Charles Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Computer Science University of Alabama Jun Li, Department of Computer and Information Science University of Oregon Worms: Why Do We Care? Internet worms have been costly and destructive • • • • Traffic causes network degradation Infected hosts are often unusable Repair is labor-intensive Code Red v.2 and Slammer are estimated to cost $2bn and $1bn, respectively Fast self-propagating worms • Slammer reached its peak infection rate in ~3 minutes • Infected ≥90% vulnerable hosts in ≤10 min • Theoretical maximal speed: ~15 seconds • 15 seconds to infect most vulnerable hosts 2 Analyzing Worms Analytical methods • Based on mathematical epidemiological models • Easy to compute, with limitations • Model may or may not represent that of the real-world • Some margin of error is to be expected • Also very rigid/Inflexible Empirical model • build components that act like real world components. • Coarse Granularity – abstract out individual packets or even individual nodes • Fine Granularity – Have components that simulate all elements of the network down to and including individual packets • Is where our research fits in 3 What Do We Study? The impact of real-world factors on Internet worm propagation Factors we focus on: • IP address allocation strategy • Worm scanning methods • Wireless media Use packet-Level network simulator: GTNetS 4 Wireless Internet Wireless networks • • • • WLAN Mobile ad hoc network Multihop mesh wireless network Vehicular networks Possible influences • • • • WLAN address allocation Bandwidth Use behavior – connectivity Device vulnerability – e.g. Bluetooth 5 Previous Work (a few examples) Chen, Gao, Kwiat, “Modeling The Spread of Active Worms” • give analytical model entitled Analytical Active Worm Propagation (AAWP) • do not deal specifically with connection type or network topology. • using a variant of the Code Red & NIMDA Worm, which are TCP worms Wei, Mirkovic, Swany, “Distributed Worm Simulation with a Realistic Internet Model” • • • • examine worms using a similar but less flexible packet level simulator UDP worms (TCP be approximated), random and subnet scanning network topology at AS level adjusting ratio of live hosts in address space for each AS Weaver, Staniford, Paxson, “Very Fast Containment of Scanning Worms” • employ a simulator to test worm retardation algorithm by starting with an algorithm for containment of scanning worms • focus on scanning in general, rather than specific scanning types or connection types • use a probability method to determine if an attack is likely to succeed based on the expected amount of non-attack traffic • LAN or company workstation networks instead of internet like topology. • address space adjustable through the likelihood of successful infection. 6 Previous Work (cont’d) GTNetS folks: Riley, Sharif, and Lee • “Large-Scale Network Simulations with GTNetS”, “Simulating Internet Worms” • GTNetS design to model networks • GTNetS capabilities of modeling worms • Investigated: • randomly scanning TCP worms – TCP payload size, # of Parallel TCP Connections • randomly scanning UDP worms – Length bandwidth, Scan rate, payload size More work • Self-learning worm using importance scan • Self-stopping worms • Defending hit-list worm using address space randomization 7 Previous Work: Wireless (cont’d) Khayam, Radha, VANET 04 • • • • warm spread over ad hoc vehicular network SIR (susceptible, Infected and removed) epidemic model Network: a new geometric random graph Impact: vehicle traffic density – average node degree used Hoh, Gruteser, WSPWN06 • Infection may be limited due to device diversity. • Propagate rate and infection rate. • Experiment: • Southern New Jersey highway network • SIR model, traffic simulator PARAMICS – 10min reach 11.6 km, 75m/s if 5% of vehicles are susceptible – Slower but still fast enough to make containment difficulty Worms in wireless sensors (analytical models) Not sufficient work on detailed empirical analysis 8 Why GTNetS The simulator we chose to use to facilitate our research • Fully Functional, Fully Adaptable, Packet-Level Network Simulator Has a worm packet class which is fully extensible Allows the simulation to handle worm characteristics • Support TCP or UDP connections • Varying infection lengths, infection ports, scan rate (UDP) and number of connections (TCP) • Allows for varying IP block scanning methods Network topology support (but weak for our purpose) • Simple network structure: Star, Dumbbell, Trees • Interfaces support BRITE network simulator • to generate internet like topologies. 9 Factors Currently Studying Topology (IP address allocation) • Dense vs Sparse • IPv6: The ratio of active simulated nodes in the address space can be limited in such a fashion to mimic the distribution of nodes in the early stages of IPv6. • Internet-like topology vs other topology (deeper tree or wider tree) • Wireless LAN address allocation 10 Worm Scanning Methods IP address block scanning: • Random Scan • Local Preference Scan • Hit-List Scan Connection types, worms at the packet level • UDP: they are faster, more effective • TCP: TCP connections can increase the effectiveness of worm scan over the cost of TCP overhead. Note: hit-list was the most likely to be effected positively. 11 Preliminary GTNetS Simulation Network topology: • Internet like, • Addresses are chosen randomly and assigned to topology randomly • IP address space population density – Sparse (IPv4 like): 1/35 Addresses in the space are occupied – Dense (IPv6 like): 1/135 Addresses in the space are occupied • Synthetic topology • Wide tree: backbone + local WLANs • Deep tree: more administration penetration Worm IP block Scanning method • UDP worms • uniform random and local preference based on examples • hit-list worm with local preference scanning • TCP worm: hit-list worm • Port scanning are not used 12 Preliminary GTNetS Simulation (cont’d) Network constants • Size of network • No other network traffic • Can effect worm spread but, • Largely a function of the topology • Difficult to simulate real-world situation • Individual node vulnerability Worm constants • Scan rate/number of TCP connections • Infection Length Each simulation was run until all vulnerable nodes were infected or until computer memory was consumed. 13 Worm Types: Uniform Random vs. Local Pref Uniform random dense sparse Local preference dense sparse universally quicker on dense networks 14 Worm Types: TCP Hit-List vs. UDP Hit-List TCP hit-list dense sparse UDP hit-list dense sparse TCP causes a lot of overhead but no gain in speed Local Preference and Hit-List • Worse than uniform random on dense graphs • Better than uniform random on sparse graphs 15 Dense and Sparse Graphs Dense net Blue – Uniform Random Red – Hit-list Green - Local Pref Sparse net Worms spread trend similar • • Local-pref slower than hit-list Uniform random shifted regardless of worm type, sparse networks retard spread 16 Low Bandwidth Wireless Links Uniform Wider-tree deeper-tree Local preference Wider-tree deeper-tree TCP worm Uniform vs. local preference. 100% allocated space 17 Low Bandwidth Wireless Links (cont’d) Uniform random Wider-tree deeper-tree Local preference Wider-tree UDP worm Uniform vs. local preference. deeper-tree 100% allocated space 18 Summary… Impact of real-world factors on Internet worm propagation Factors discussed: • IP address allocation strategy: dense, sparse, wider tree, deeper • Worm scanning methods: uniform random, hit-list, local preference • Wireless media: low-bandwidth in two topology Future work: More worm scanning types, e.g., • Permutation scanning, topological scanning • Hit-List with other scanning methods • Emerging ones Influence from other network traffic More topology testing, including wireless network. 19 Questions? Thanks!