141 likes | 287 Views
Defending against Hitlist Worms using NASR. Khanh Nguyen. Introduction. Worms spread fast. Code Red and slammer: thousands of computers in less than half an hr. Sapphire: 70,000computers/15min. Research studies estimated: 1 million hosts/<2sec. (Hitlist worm). Hitlist Worm Characteristics.
E N D
Defending against Hitlist Worms using NASR Khanh Nguyen
Introduction • Worms spread fast. • Code Red and slammer: thousands of computers in less than half an hr. • Sapphire: 70,000computers/15min. • Research studies estimated: 1 million hosts/<2sec. (Hitlist worm)
Hitlist Worm Characteristics • Determine a large vulnerable population before it starts spreading. • How does determine the vulnerable machines before attack makes a difference?
Defend against Worm • Monitor the “dark space” or inactive port • Does not work against Hitlist worm • Network Address Space Randomization: caused some addresses to be stale at the time of attack
NASR Issues • Size of routing table, number of routing updates, and the frequency of recomputing routes • Requires Global coordination • Easier to implement at local regions
Implementation • Modification to a DHCP server (iprand-interval) • Implemented an advanced randomization enabled DHCP server based on the standard open source. • Provides: activity monitoring and service fingerprinting
Activity Monitoring & Service Fingerprinting • Activity Monitoring: • Keeps track of open connections and tries to avoid forcing an address change • Only consider long-lived TCP connections (ex: FTP) • Service Fingerprinting: • Attemps to identify what services are running on each host (ex: TCP connection at port 80 suggests a Web server)
Measurements • Hitlist construction • Speed of addresses changed (without any form of randomization) • How address space is allocated and utilized
Hitlist Construction • Random scanning: • using ICMP ECHO msg. • Generated 20,000 addresses. • Probe the hitlist once every hour
Hitlist Construction cont. • Passive P2P snooping: • Gathered 200K IP • Do a ICMP ECHO probe
Hitlist construction cont. • Search-engine harvesting: • Search for “the”, returned millions of results. • Only 612 unique alive host • Attacker can use random keyword generator
Subnet address space utilization • The feasibility and effectiveness of network address space randomization depend on how unused addresses there are in NASR-enabled subnet. • Subnet utilize level
Conclusion • Limitation on Global scale • Effective on subnet level • Slows down hitlist worms, and forces them to exhibit scan-like behavior • It’s neither a detection mechanism nor an end-system enhancement, which makes it easy to implement.