behavior-based worm detectors compared - raid … stafford.pdf · rbs trwrbs d-actm lesg trw ......

22
Behavior-based Worm Detectors Compared Shad Stafford and Jun Li University of Oregon September 15, 2010 RAID 2010 This material is based upon work supported by the National Science Foundation under Grant No. CNS-0644434. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

Upload: lythien

Post on 28-Mar-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Behavior-based WormDetectors Compared

Shad Stafford and Jun LiUniversity of OregonSeptember 15, 2010RAID 2010

This material is based upon work supported by the National Science Foundation under Grant No. CNS-0644434. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Introduction

2

Snort

Honeycomb

Netbait

Autograph Anagram HonIDS

MRW

Sweeper

Hamsa

Poseidon

PolygraphVigilante

DACODA TaintCheck

COVERS

PAYLHoneyStatEarlyBirdWEW

DSCRBS

TRWRBS

TRWd-ACTM LESG

NetworkTelescope

DarkAddresses

KalmanFilter

ICMP-Blooms

p2p-idsCUSUM

Wormboy

PGD

CoreBehaviors

Markov N-grams

STILL

ProspectorElcano

AVARE

BRO

What is the best worm detector?

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

TRWRBS

The Detectors

✦ Each of these detectors:‣ is deployable at a single point (gateway)

‣ does not require access to connection payload

‣ is in theory capable of detecting IKEE.B

3

MRWDSC

RBSTRW

PGD

The Internet

Monitor

ProtectedNetwork

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Comparing detectors

4

✦ Experiments performed against different traces

✦Different researchers use different metrics

✦We were unable to find direct comparisons of existing detectors

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Our contributions

✦ We identify easily deployed detectors that are capable of detecting modern worms like IKEE.B

✦ We measure their performance at detecting worms‣ across a variety of publicly available network traces

‣ against a number of different worm scanning strategies and speeds

✦ We report their performance using a consistent set of metrics‣ based on the scenario of a network administrator who

wants to detect a worm infection within their protected network

5

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

TRWRBS

✦ Threshold Random Walk‣ Random scanning creates high connection

failure rates

‣ Measure connection failures and compare to normal

‣ Uses sequential hypothesis testing to detect infection

MRWDSC

RBSTRW

PGD

The Detectors

6

Schechter, Jung, and Berger. Fast detection of scanning worm infections (RAID 2004)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

TRWRBS

✦ Rate-Based Sequential hypothesis test‣ Worms scan lots of destinations

‣ Non-scanners show exponential distribution of inter-scan times

‣ Uses sequential hypothesis testing to detect infection

The Detectors

7

MRWDSC

RBSTRW

PGD

Jung, Milito, and Paxson. On the adaptive real-time detection of fast-propagating network worms (DIMVA 2007)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

TRWRBS

✦ TRW + RBS‣ Product of TRW and RBS likelihood ratios

The Detectors

8

MRWDSC

RBSTRW

PGD

Jung, Milito, and Paxson. On the adaptive real-time detection of fast-propagating network worms (DIMVA 2007)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

RBS✦ Multi-Resolution Windows ‣ Monitors number of destinations contacted

over a series of time windows

‣ Each window has an associated threshold

The Detectors

9

MRWDSC

TRWRBS

TRW

PGD

Sekar, Xie, Reiter, and Zhang. A multi-resolution approach for worm detection and containment (DSN 2006)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

✦ Destination-Source Correlation ‣ Monitors hosts which receive a connection on

a given port and then begin initiating connections using that port

‣ If connection rate exceeds threshold, alarm is raised

The Detectors

10

MRWDSC

RBSTRWRBS

TRW

PGD

Gu, Sharif, Qin, Dagon, Lee, and Riley. Worm detection, early warning and response based on local victim information (ACSAC 2004)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

✦ Protocol Graph Detector ‣ Builds a graph of hosts communicating over a

given protocol (nodes are hosts)

‣ Graph size is normally distributed, abnormal graph size for a given window indicates presence of worm

The Detectors

11

MRWDSC

RBSTRWRBS

TRW

PGD

Collins and Reiter. Hit-list worm detection and bot identification in large networks using protocol graphs. (RAID 2007)

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Metrics

✦ False positive rate‣ By host: the number of false alarms raised during a time

period τ (limited to one alarm per host)

‣ By time: Percentage of minutes during time period τ when a false alarm is triggered

✦ False negative rate‣ Percentage of instances where worm infection is not

detected in time period τ

✦ Detection latency‣ The number of outbound worm connections prior to

detection

12

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

ProtectedNetwork

Measurement Setup

13

The Internet

Monitor

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Experiment Procedure

14

BalanceFalse Positives

Step 3)

Establish Thresholds

Training TraceStep 1)

EvaluationEngine Measure

False Positives

Evaluation TraceStep 2)

EvaluationEngine

MeasureFalse negativesand Latency

Evaluation Trace

Step 4)

WormTrace

EvaluationEngine

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Worm traffic

✦ Generated with our GLOWS worm emulator‣ host addresses from legitimate trace for internal network

‣ probabilistic model for rest of Internet

✦ Each scenario starts with a single host being infected by an incoming worm connection

15

The Internet(probabilistically modeled)

GatewayProtected Network(discrete event simulation)

= Active host= Dark Address

Wormflow records

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

0

1

2

3

4

5

trw rbs trwrbs mrw pgd dsc

Fals

e Al

arm

s (li

mit

1 pe

r hos

t) enterprisecampus

departmentwireless

False Positives (by host count)

16

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

F- vs. Random Scanning

17

TRW TRWRBS

RBS MRW

DSC PGD

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

F- (%

of E

xper

imen

ts)

Scans per sec.

✦TRW the most sensitive

✦RBS the least sensitive

✦PGD shows wide variation in performance

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Latency vs. Random Scanning

18

TRW TRWRBS

RBS MRW

DSC PGD

# of

sca

ns b

efor

e de

tect

ion

Scans per sec.

✦No one detector is consistently the fastest

✦ Environment again has a big impact

✦ In some scenarios the worm is detected orders of magnitude faster than in other scenarios

0 10 20 30 40 50

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 50

100 150 200 250 300

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 50

100 150 200 250 300 350 400 450

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 200 400 600 800

1000 1200 1400

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

5

10

15

20

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 200 400 600 800

1000 1200 1400

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

F- vs. Topo Scanning

19

TRW vs topo100 TRWRBS vs topo100

TRW vs topo1000 TRWRBS vs topo1000

TRW vs topoall TRWRBS vs topoall

F- (%

of E

xper

imen

ts)

Scans per sec.

✦TRW’s performance is greatly impaired even with small numbers of neighbors

‣ Unable to detect topo worm with unlimited neighbors

✦TRWRBS shows limited performance degradation

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0

20

40

60

80

100

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Latency vs. Topo Scanning

20

# of

sca

ns b

efor

e de

tect

ion

Scans per sec.

✦TRW latency increases linearly with number of neighbors

✦TRWRBS latency increases more slowly

✦TRWRBS is faster than TRW for fast Topo worms with large neighbor counts

TRW vs topo100 TRWRBS vs topo100

TRW vs topo1000 TRWRBS vs topo1000

TRW vs topoall TRWRBS vs topoall

0 20 40 60 80

100 120 140

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 200 400 600 800

1000

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

-1

-0.5

0

0.5

1

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

Not Detected

0 50

100 150 200 250 300 350 400 450

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 200 400 600 800

1000 1200 1400

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

0 100 200 300 400 500 600 700

0.005 0.01 0.02

0.05 0.1 0.2

0.5 1 2 5 10

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Conclusions

21

✦ No detector stands out as the best in all situations

✦ 1 scan every 10 seconds avoids most detectors in most circumstances‣ This is a relatively fast worm to go undetected

✦ Environment makes a big difference‣ Wireless environment shows game and file-sharing traffic

which causes problems for the detectors

Behavior-based Worm Detectors Compared Shad Stafford and Jun Li

Questions?

22

Shad [email protected]

Dr. Jun [email protected]

http://netsec.cs.uoregon.edu