190 likes | 304 Views
On the Performance of Internet Worm Scanning Strategies . Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst. Motivation. Hackers have tried various scanning strategies in their scan-based worms Uniform scan Code Red, Slammer Local preference scan Code Red II
E N D
On the Performance of Internet Worm Scanning Strategies Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst
Motivation • Hackers have tried various scanning strategies in their scan-based worms • Uniform scan Code Red, Slammer • Local preference scan Code Red II • Sequential scan Blaster • Possible scanning strategies: • Target preference scan (selective attack from a routing worm) • Divide-and-conquer scan • How do they affect a worm’s propagation? • Mean value analysis (based on law of large number) • Numerical solutions; Simulation studies.
Some Analysis Conclusions • Equivalent when hosts are uniformly distributed • Uniform scan • Sequential scan • Divide-and-conquer scan • Local preference scan increases a worm’s speed • When vulnerable hosts are not uniformly distributed • Optimal local scan prob. p when local network size • Sequential scan selecting starting point locally slows down worm propagation speed • Selective attack global scan or target-only scan determined by distribution of vulnerable hosts.
Two Guidelines in Defense • Prevent attackers from • Identifying IP addresses of a large number of vulnerable hosts Flash worm, Hit-list worm • Obtaining address information to reduce a worm’s scanning space Routing worm • Worm monitoring system • IP space coverage is not the only issue • Should monitor as many as possible well distributed IP blocks non-uniform scan worm
: # of hosts : # of infectious : infection ability : scan rate Epidemic Model Introduction • Model for homogeneous system • Model for interacting groups For worm modeling: : scanning space
: scan rate : # of hosts : scanning space : small time interval Infinitesimal Analysis of Epidemic Model : # of infectious • From time t to t+d: (d! 0) • Vulnerable hosts [N-I(t)]; infected hosts I(t). • An infected host infects vulnerable hosts. • Negligible of Prob. “two scans hitting the same vulnerable host”. • Newly infected hosts: • Negligible of Prob. “two infected hosts infect the same vulnerable host”. • Thus I(t+d) is Prob. p of a worm copy hitting a specific IP address during d :
Idealized Worm • Know IP addresses of all vulnerable hosts • Perfect worm • Cooperation among worm copies • Flash worm • No cooperation; random scan • Complete infection within seconds
Uniform Scan Worm • Traditional worm: Code Red, Slammer • Uniformly scans the entire IPv4 space ( W = 232) • Hit-list worm: [Staniford et al. 2002] • Knowing IP addresses of a fraction of vulnerable hosts. • Has a large number of initially infected hosts I(0). • Routing worm: [Zou et al. 2003] • Using BGP routing table to reduce worm scanning space. • Has a bigger infection ability b=h/ W
Uniform Scan Worms Comparison • Defense: Crucial to prevent attackers from • Identifying IP addresses of a large number of vulnerable hosts Flash worm, Hit-list worm • Obtaining address information to reduce a worm’s scanning space Routing worm • Hit-list worm has • a hit-list of I(0)=10,000 • Routing worm has W=0.286£ 232 • Other parameters: • N=360,000 • h=358/min • I(0)=10
Divide-and-Conquer Scan Worm • Divide-and-conquer scan: • An infected host gives half of its scanning space to its newest infected child host. • At time t, each worm copy has • Scanning space: • Vulnerable hosts: • Use infinitesimal analysis technique. • Conclusion: when vulnerable hosts are uniformly distributed, divide-and-conquer scan is equivalent to uniform scan.
Local Preference Scan Worm • Model: epidemicininteracting groups • Analysis: assume K“/n” networks • Prob. p: uniformly scan local “/n”network • Prob. (1-p): uniformly scan others • Conclusions: • Vulnerable hosts uniformly distributed: • No difference as long as the worm spreads out to every network. • Vulnerable hosts not uniformly distributed: • Analysis: hosts uniformly distributed in m out of K networks • Local preference scan increases a worm’s speed.
Local Preference Scan Worm • Local preference scan increases speed (when vulnerable hosts are not uniformly distributed) • Local scan on Class A (“/8”) networks: p* 1 • Local scan on Class B (“/16”) networks: p* 0.85 • Code Red II: p=0.5 (Class A), p=0.375 (Class B) Smaller than p* Class A local scan (K=256, m=116) Class B local scan (K=216, m=116£28)
Sequential Scan Worm • Sequential scan: • Sequentially scans IP addresses from a starting point. • Blaster worm selects its starting point locally with p=0.4 • Such local preference slows down worm propagation. • Reason: child worm copies are more likely to be wasted on repeating their parents’ scanning trails. • Sequential scan is equivalent to uniform scanwhen • Vulnerable hosts uniformly distributed in IPv4 space. • The worm selects starting point uniformly.
Sequential Scan Worm Simulation Study • Simulations agree with our analyses. • Analysis limitation (mean value analysis): • No consideration of variability. Comparison of uniform scan, sequential scan with/without local preference (100 simulation runs; vulnerable hosts uniformly distributed in entire IPv4 space)
Sequential Scan Worm Simulation Study • Observations: • Local preference in selecting starting point is a bad idea. • Mean value analysis cannot analyze variability. Uniform scan, sequential scan with/without local preference (100 simulation runs) Vulnerable hosts uniformly distributed in BGP routable IP space (28.6% of IPv4 space)
Selective Attack Worm • Target domain: • Other domains: • Target-only scan: • Global scan: • Conclusion: • Target-only scan is faster when vulnerable hosts are more densely distributed in the target domain than in other domains ( c1<c2 )
Worm Monitoring System Design • “Network telescope” monitoring system: [Moore 2002] • Observing global Internet activities based on monitored traffic on a small fraction of IP space. • Should monitor as many as possible well distributed IP blocks. Directly monitored data Worm propagation I(t) and monitored data C(t) After low-pass filter Blaster worm simulation and monitoring
Summary • Modeling basis: • Law of large number; mean value analysis; infinitesimal analysis. • Epidemic model: • Conclusions: • All about worm scanning spaceW (or density of vulnerable population): • Flash worm, Hit-list worm, Routing worm • Local preference, divide-and-conquer, selective attack • Monitoring: sequential scan worm