a taxonomy of computer worms

24
A Taxonomy of Computer Worms Ashish Gupta Network Security April 2004

Upload: alize

Post on 18-Feb-2016

84 views

Category:

Documents


1 download

DESCRIPTION

A Taxonomy of Computer Worms. Ashish Gupta Network Security April 2004. Worm vs a virus. 1. Self propagates across the network 2. Exploits security or policy flaws in widely used services 3. Less mature defense today. +. Activation. Target Discovery. Attacker. Payload. Carrier. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Taxonomy of Computer Worms

A Taxonomy of Computer Worms

Ashish GuptaNetwork Security

April 2004

Page 2: A Taxonomy of Computer Worms

Worm vs a virus

1. Self propagates across the network

2. Exploits security or policy flaws in widely used services

3. Less mature defense today

Page 3: A Taxonomy of Computer Worms
Page 4: A Taxonomy of Computer Worms

+

AttackerTarget Discovery

Carrier

Activation

Payload

OVERVIEW

Page 5: A Taxonomy of Computer Worms

Target Discovery

Page 6: A Taxonomy of Computer Worms

Target Discovery

• Scanningsequential, random

•Target Listspre-generated, external (game servers), internal

•Passive

Page 7: A Taxonomy of Computer Worms

Target Discovery

• Internal Target Lists– Discover the local communication topology– Similar to DV algorithm– Very fast ??

• Function of shortest paths– Any example ?– Difficult to detect

• Suggests highly distributed sensors

Page 8: A Taxonomy of Computer Worms

Toolkit potential

• http://smf.chat.ru/e_dvl_news.htm• http://viruszone.by.ru/create.html• http://lcamtuf.coredump.cx/worm.txt Worm

tutorial

Page 9: A Taxonomy of Computer Worms

Carrier

Page 10: A Taxonomy of Computer Worms

Carrier• Self-Carriedactive transmission

• Second Channele.g. RPC, TFTP ( blaster worm )

• Embeddede.g. web requests

Page 11: A Taxonomy of Computer Worms

Activation

Page 12: A Taxonomy of Computer Worms

Activation

•Human ActivationSocial Enginnering e.g. MyDoom SCO Killer !

•Human activity-based activatione.g. logging in, rebooting

•Scheduled process activatione.g. updates, backup etc.

•Self Activation e.g. Code Red

Page 13: A Taxonomy of Computer Worms
Page 14: A Taxonomy of Computer Worms

                                                   

Page 15: A Taxonomy of Computer Worms
Page 16: A Taxonomy of Computer Worms
Page 17: A Taxonomy of Computer Worms

MyDoom : Fastest Ever

http://www.cnn.com/2004/TECH/internet/01/28/mydoom.spreadwed/

Page 18: A Taxonomy of Computer Worms

Payload

Page 19: A Taxonomy of Computer Worms

Payload

• Internet Remote Control

• Internet DOS : paper’s dream realized

• Data Damage: Chernobyl , Klez

• Physical World Damage

• Human control Blackmail !

Page 20: A Taxonomy of Computer Worms

Attacker

Page 21: A Taxonomy of Computer Worms

Attacker

• Curiosity

• Pride and Power

• Commercial Advantage

• Extortion and criminal gain

• Terrorism Example

• Cyber Warfare

Page 22: A Taxonomy of Computer Worms

Theodore Kaczynski

• Born in Chicago• extremely gifted as a child• American terrorist who attempted to fight against what he

perceived as the evils of technological progress• eighteen-year-long campaign of sending mail bombs to

various people, killing three and wounding 29. • The first mail bomb was sent in late 1978 to Prof. Buckley

Crist at Northwestern University

Page 23: A Taxonomy of Computer Worms

+

AttackerTarget Discovery

Carrier

Activation

Payload

CONCLUSION

Page 24: A Taxonomy of Computer Worms

???

• given the target discovery/propagation methods of worms, – how to detect it? – with only network traffic header data?  – at ISP?  at edge routers? at end hosts?