360 likes | 533 Views
Autograph Toward Automated, Distributed Worm Signature Detection. Internet Worm. Internet Worm Large costs due to lost productivity Code Red: $2.6 billion, Slammer: $1 billion Vulnerabilities still plentiful Smarter, faster, and more malicious worms easily possible [Staniford et al., 2002]
E N D
AutographToward Automated, Distributed Worm Signature Detection Usenix Security 2004
Internet Worm • Internet Worm • Large costs due to lost productivity • Code Red: $2.6 billion, Slammer: $1 billion • Vulnerabilities still plentiful • Smarter, faster, and more malicious worms easily possible [Staniford et al., 2002] • Internet Worm Quarantine Techniques • Destination port blocking • Infected source host IP blocking • Content-based blocking Content-based blocking [Moore et al., 2003] Usenix Security 2004
Content-based Blocking 05:45:31.912454 90.196.22.196.1716 > 209.78.235.128.80: . 0:1460(1460) ack 1 win 8760 (DF) 0x0000 4500 05dc 84af 4000 6f06 5315 5ac4 16c4 E.....@.o.S.Z... 0x0010 d14e eb80 06b4 0050 5e86 fe57 440b 7c3b .N.....P^..WD.|; 0x0020 5010 2238 6c8f 0000 4745 5420 2f64 6566 P."8l...GET./def 0x0030 6175 6c74 2e69 6461 3f58 5858 5858 5858ault.ida?XXXXXXX 0x0040 5858 5858 5858 5858 5858 5858 5858 5858 XXXXXXXXXXXXXXXX . . . . . 0x00e0 5858 5858 5858 5858 5858 5858 5858 5858 XXXXXXXXXXXXXXXX 0x00f0 5858 5858 5858 5858 5858 5858 5858 5858 XXXXXXXXXXXXXXXX 0x0100 5858 5858 5858 5858 5858 5858 5858 5858 XXXXXXXXXXXXXXXX 0x0110 5858 5858 5858 5858 5825 7539 3039 3025 XXXXXXXXX%u9090% 0x0120 7536 3835 3825 7563 6264 3325 7537 3830 u6858%ucbd3%u780 0x0130 3125 7539 3039 3025 7536 3835 3825 7563 1%u9090%u6858%uc 0x0140 6264 3325 7537 3830 3125 7539 3039 3025 bd3%u7801%u9090% 0x0150 7536 3835 3825 7563 6264 3325 7537 3830 u6858%ucbd3%u780 0x0160 3125 7539 3039 3025 7539 3039 3025 7538 1%u9090%u9090%u8 0x0170 3139 3025 7530 3063 3325 7530 3030 3325 190%u00c3%u0003% 0x0180 7538 6230 3025 7535 3331 6225 7535 3366 u8b00%u531b%u53f 0x0190 6625 7530 3037 3825 7530 3030 3025 7530 f%u0078%u0000%u0 0x01a0 303d 6120 4854 5450 2f31 2e30 0d0a 436f 0=a.HTTP/1.0..Co . . . . . Signature for CodeRed II Signature: A Payload Content String Specific To A Worm Usenix Security 2004
Content-based Blocking Signature for CodeRed II Traffic Filtering Internet Our network X • Can be used by Bro, Snort, Cisco’s NBAR, ... Usenix Security 2004
Signature derivation is too slow • Current Signature Derivation Process • New worm outbreak • Report of anomalies from people via phone/email/newsgroup • Worm trace is captured • Manual analysis by security experts • Signature generation • Labor-intensive, Human-mediated Usenix Security 2004
Goal Automatically generate signatures of previously unknown Internet worms • as quickly as possible • as accurately as possible Usenix Security 2004
Our Work • We focus on TCP worms that propagate via scanning Actually, any transport • in which spoofed sources cannot communicate successfully • in which transport framing is known to monitor • Worm’s payloads share a common substring • Vulnerability exploit part is not easily mutable Usenix Security 2004
Outline • Problem and Motivation • Automated Signature Detection • Desiderata • Technique • Evaluation • Distributed Signature Detection • Tattler • Evaluation • Related Work • Conclusion Usenix Security 2004
Desiderata • Automation: Minimal manual intervention • Signature quality: Sensitive & specific • Sensitive: match all worms low false negative rate • Specific: match onlyworms low false positive rate • Timeliness: Early detection • Application neutrality • Broad applicability Usenix Security 2004
Automated Signature Generation • Step 1: Select suspicious flows using heuristics • Step 2: Generate signature using content-prevalence analysis Internet Traffic Filtering Autograph Monitor Our network X Signature Usenix Security 2004
Reduce the work by filtering out vast amount of innocuous flows S1: Suspicious Flow Selection • Heuristic: Flows from scanners are suspicious • Focus on the successful flows from IPs who made unsuccessful connections to more than s destinations for last 24hours • Suitable heuristic for TCP worm that scans network • Suspicious Flow Pool • Holds reassembled, suspicious flows captured during the last time period t • Triggers signature generation if there are more than flows Autograph (s=2) Non-existent Non-existent This flow will be selected Usenix Security 2004
Reduce the work by filtering out vast amount of innocuous flows S1: Suspicious Flow Selection • Heuristic: Flows from scanners are suspicious • Focus on the successful flows from IPs who made unsuccessful connections to more than sdestinations for last 24hours • Suitable heuristic for TCP worm that scans network • Suspicious Flow Pool • Holds reassembled, suspicious flows captured during the last time period t • Triggers signature generation if there are more than flows Usenix Security 2004
Use the most frequent byte sequences across suspicious flows as signatures S2: Signature Generation All instances of a worm have a common byte pattern specific to the worm Rationales • Worms propagate by duplicating themselves • Worms propagate using vulnerability of a service How to find the most frequent byte sequences? Usenix Security 2004
Worm-specific Pattern Detection • Use the entire payloads • Brittle to byte insertion, deletion, reordering Flow 1 XXXXXXXX9025753930399025YYYY XXXXXXX9025753930399025YYYYY Flow 2 Usenix Security 2004
Worm-specific Pattern Detection Partition flows into non-overlapping small blocks and count the number of occurrences • Fixed-length Partition • Still brittle to byte insertion, deletion, reordering Flow 1 XXXXXXXX9025753930399025YYYY XXXXXXX9025753930399025YYYYY Flow 2 Usenix Security 2004
Worm-specific Pattern Detection • Content-based Payload Partitioning (COPP) • Determine boundaries of block using LBFS style • Partition if Rabin fingerprint of a sliding window matches Breakmark • Configurable parameters: content block size (minimum, average, maximum), breakmark, sliding window Content Blocks Flow 1 XXXXXXXX9025753930399025YYYY XXXXXXX9025753930399025YYYYY Flow 2 Breakmark = last 8bits of fingerprint (9025) Usenix Security 2004
Nimda CodeRed2 Nimda (16 different payloads) WebDAV exploit Innocuous, misclassified Why Prevalence? • Worm flows dominate in the suspicious flow pool • Content-blocks from worms are highly ranked < Prevalence Distribution in Suspicious Flow Pool> Usenix Security 2004
Select Most Frequent Content Block f0 C F C D G f1 f2 A B D f3 A C E f4 A B E A B D f5 H I J f6 I H J f7 G I J f8 Usenix Security 2004
f0 C f0 C F f1 C D G C f1 f2 A B D f2 A f3 A C E f3 A E f4 A B E f5 A B D f4 A B E f6 H I J A B f5 f7 I H J f8 G I J H I I J B C D J f6 I J E G H B C D I H J f7 I G H B C D J E I J f8 Select Most Frequent Content Block F D G B D C D A A A A F G Usenix Security 2004
f0 C F f1 C D G f2 A B D f3 A C E f4 A B E f5 A B D f6 H I J A f7 I H J f8 G I J I A B C D J I J E G H A B C D I G H A B C D J E F Select Most Frequent Content Block Signature: W≥90% p≥3 Usenix Security 2004
f0 C F f1 C D G f2 A B D f3 A C E f4 A B E f5 A B D f6 H I J A f7 I H J f8 G I J I A B C D J I J E G H A B C D I G H A B C D J E F Select Most Frequent Content Block Signature: A W≥90% p≥3 Usenix Security 2004
f0 C F f1 C D G f2 A B D f3 A C E f4 A B E f5 A B D f6 H I J f7 I H J f8 G I J A C E A C A E Select Most Frequent Content Block Signature: A W≥90% A I p≥3 B D J I J G H B D I G H B C D J F Usenix Security 2004
f0 C F f1 C D G f2 A B D f3 A C E f4 A B E f5 A B D f6 H I J f7 I H J f8 G I J I J C I J H C I G H J Select Most Frequent Content Block Signature: A I W≥90% p≥3 G D F Usenix Security 2004
f0 C F f1 C D G f2 A B D f3 A C E f4 A B E f5 A B D f6 H I J f7 I H J f8 G I J C C Select Most Frequent Content Block Signature: Signature: U A I W≥90% p≥3 G D F Usenix Security 2004
Outline • Problem and Motivation • Automated Signature Detection • Desiderata • Technique • Evaluation • Distributed Signature Detection • Tattler • Evaluation • Related Work • Conclusion Usenix Security 2004
Behavior of Signature Generation • Objectives • Effect of COPP parameters on signature quality • Metrics • Sensitivity = # of true alarms / total # of worm flows false negatives • Efficiency = # of true alarms / # of alarms false positives • Trace • Contains 24-hour http traffic • Includes 17 different types of worm payloads Usenix Security 2004
Signature Quality • Larger block sizes generate more specific signatures • A range of w (90-95%, workload dependent) produces a good signature Usenix Security 2004
Outline • Problem and Motivation • Automated Signature Detection • Desiderata • Technique • Evaluation • Distributed Signature Detection • Tattler • Evaluation • Related Work • Conclusion Usenix Security 2004
Problem: Slow Payload Accumulation • Before signature generation, • Detect scanners (possibly infected hosts) Aggressiveness (s ) of flow selection heuristics • Accumulate payloads enough for content analysis Earliness () of signature generation trigger • Infected vulnerable hosts (=5, 63 monitors) Usenix Security 2004
Faster Signature Detection • Share the scanner information with others Network C Traffic Filtering Autograph Monitor Internet Our network Network B tattler Network A Usenix Security 2004
Benefit from tattler • Objective • Measure the detection speed and the signature quality • Methodology • Trace generation • Background noise flows from the real 24hr trace • Captured worm flows from simulation (63 monitors) • Signature generation with COPP varying suspect flow pool size • Metrics • Percentage of infected hosts • Number of unspecific signatures (that causes false positives) Usenix Security 2004
Tradeoff: Speed vs. Quality Decreasing s and parameters • faster signature generation • more false positives x x = 15, s = 2, < 2% infected Usenix Security 2004
Attacks • Overload due to flow reassembly • Multiple instances of Autograph on separate HW (port-disjoint) • Suspicious flow sampling under heavy load • Abuse Autograph for DoS: pollute suspicious flow pool • Port scan and then send innocuous traffic • Distributed verification of signatures at many monitors • Source-address-spoofed port scan • Reply with SYN/ACK on behalf of non-existent hosts/services Usenix Security 2004
Related Work • EarlyBird [Singh et al. 2003] • Pure content-based approach first, then address dispersion heuristic • Targets a single high speed link; no flow reassembly • HoneyComb [Kreibich et al. 2003] • Signature detection by Honeypot & LCS algorithm • Targets host-based deployment; small number of flows • Honeyd [Provos 2003] • Use distributed honeypots to gather worm payloads & infected IP addresses quickly • Focus on harvesting malicious traffic • DOMINO [Yegneswaran et al. 2004] • Scanner IP information sharing among distributed nodes • Distributed monitoring assures earlier & more accurate detection Usenix Security 2004
Future Work • Online evaluation with diverse traces • Deployment on distributed sites • Broader set of suspicious flow selection heuristics • Non-scanning worms (ex. hit-list worms, topological worms, email worms) • UDP worms • Distributed agreement for signature quality testing Usenix Security 2004
Conclusion • Stopping spread of novel worms requires early generation of signatures • Autograph: automated signature detection system • Suspicious flow selection→ Content prevalence analysis • COPP: robustness against payload variability • Distributed monitoring: faster signature generation • Autograph finds sensitive & specific signatures early in real network traces Usenix Security 2004