DOC PREVIEW
UW CSEP 590 - Lecture Notes

This preview shows page 1-2-3-4-27-28-29-30-55-56-57-58 out of 58 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 58 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Internet Outbreaks: Epidemiology and DefensesWho am I?A Chicken Little view of the Internet…Why Chicken Little is a naïve optimistSlide 5Threat transformationLarge-scale technical enablersDriving economic forcesWhat service-oriented computing really means…Today’s focus: OutbreaksTodayWhat is a network worm?Slide 13Slide 14Slide 15A brief history of worms…The Modern Worm eraAnatomy of a worm: SlammerA pretty fast outbreak: Slammer (2003)Was Slammer really fast?Slide 21How to think about wormsWhat’s important?What can be done?Prevention: Software QualityPrevention: WrappersPrevention: Software HeterogeneityPrevention: Software UpdatingPrevention: Known Exploit BlockingPrevention: Hygiene EnforcementContainmentTreatmentQuarantine requirementsIts difficult…How do we detect new outbreaks?Network TelescopesTelescopes + Active RespondersHoneypotsThe Scalability/Fidelity tradeoffPotemkin honeyfarm: large scale high-fidelity honeyfarmSlide 41Challenges for honeypot systemsScan DetectionSignature InferenceApproachContent siftingThe basic algorithmSlide 48Slide 49Slide 50Slide 51Slide 52ChallengesExperienceKey limitations: Evasion & DoSSome other issuesSummarySlide 58Internet Outbreaks: Internet Outbreaks: Epidemiology and Epidemiology and DefensesDefensesStefan SavageStefan SavageCollaborative Center for Internet Epidemiology and DefensesCollaborative Center for Internet Epidemiology and Defenses Department of Computer Science & EngineeringDepartment of Computer Science & EngineeringUniversity of California at San DiegoUniversity of California at San DiegoIn collaboration with Jay Chen, Cristian Estan, Ranjit Jhala, Erin Kenneally, Justin In collaboration with Jay Chen, Cristian Estan, Ranjit Jhala, Erin Kenneally, Justin Ma, David Moore, Vern Paxson (ICSI), Colleen Shannon, Sumeet Singh, Alex Ma, David Moore, Vern Paxson (ICSI), Colleen Shannon, Sumeet Singh, Alex Snoeren, Stuart Staniford (Nevis), Amin Vahdat, Erik Vandekeift, George Snoeren, Stuart Staniford (Nevis), Amin Vahdat, Erik Vandekeift, George Varghese, Geoff Voelker, Michael Vrable, Nick Weaver (ICSI)Varghese, Geoff Voelker, Michael Vrable, Nick Weaver (ICSI)Who am I?Assistant Professor, UCSD B.S., Applied History, CMUPh.D., Computer Science, University of WashingtonResearch at the intersection of networking, security and OSCo-founder of Collaborative Center for Internet Epidemiology and Defenses (CCIED)One of four NSF Cybertrust Centers, joint UCSD/ICSI effortFocused on large-scale Internet attacks (worms, viruses, botnets, etc)Co-founded a number of commercial security startupsAsta Networks (failed anti-DDoS startup)Netsift Inc, (successful anti-worm/virus startup)A Chicken Little view of the Internet…Why Chicken Little is a naïve optimistImagine the following species:Poor genetic diversity; heavily inbredLives in “hot zone”; thriving ecosystem of infectious pathogensInstantaneous transmission of diseaseImmune response 10-1M times slowerPoor hygiene practicesWhat would its long-term prognosis be?Why Chicken Little is a naïve optimistImagine the following species:Poor genetic diversity; heavily inbredLives in “hot zone”; thriving ecosystem of infectious pathogensInstantaneous transmission of diseaseImmune response 10-1M times slowerPoor hygiene practicesWhat would its long-term prognosis be?What if diseases were designed…Trivial to create a new disease Highly profitable to do soThreat transformationTraditional threatsAttacker manually targets high-value system/resource Defender increases cost to compromise high-value systemsBiggest threat: insider attackerModern threatsAttacker uses automation to target all systems at once (can filter later)Defender must defend all systems at once Biggest threats: software vulnerabilities & naïve usersLarge-scale technical enablersUnrestricted connectivity Large-scale adoption of IP model for networks & appsSoftware homogeneity & user naivetéSingle bug = mass vulnerability in millions of hostsTrusting users (“ok”) = mass vulnerability in millions of hostsFew meaningful defensesEffective anonymity (minimal risk)No longer just for fun, but for profitSPAM forwarding (MyDoom.A backdoor, SoBig), Credit Card theft (Korgo), DDoS extortion, etc…Symbiotic relationship: worms, bots, SPAM, DDoS, etcFluid third-party exchange market (millions of hosts for sale)Going rate for SPAM proxying 3 -10 cents/host/weekSeems small, but 25k botnet gets you $40k-130k/yrRaw bots, 1$+/host, Special orders ($50+)“Virtuous” economic cycleBottom line: Large numbers of compromised hosts = platformDDoS, SPAM, piracy, identity theft = applicationsDriving economic forcesWhat service-oriented computing really means…Today’s focus: OutbreaksOutbreaks?Acute epidemics of infectious malcode designed to actively spread from host to host over the networkE.g. Worms, viruses, etc (I don’t care about pedantic distinctions, so I’ll use the term worm from now on)Why epidemics?Epidemic spreading is the fastest method for large-scale network compromise Why fast?Slow infections allow much more time for detection, analysis, etc (traditional methods may cope)TodayNetwork worm reviewNetwork epidemiologyThreat monitors & automated defensesWhat is a network worm?Self-propagating self-replicating network programExploits some vulnerability to infect remote machinesInfected machines continue propagating infectionWhat is a network worm?Self-propagating self-replicating network programExploits some vulnerability to infect remote machinesInfected machines continue propagating infectionWhat is a network worm?Self-propagating self-replicating network programExploits some vulnerability to infect remote machinesInfected machines continue propagating infectionWhat is a network worm?Self-propagating self-replicating network programExploits some vulnerability to infect remote machinesInfected machines continue propagating infectionA brief history of worms…As always, Sci-Fi authors get it firstGerold’s “When H.A.R.L.I.E. was One” (1972) – “Virus”Brunner’s “Shockwave Rider” (1975) – “tapeworm program”Shoch&Hupp co-opt idea; coin term “worm” (1982)Key idea: programs that self-propagate through network to accomplish some task; benignFred Cohen


View Full Document

UW CSEP 590 - Lecture Notes

Documents in this Course
Sequitur

Sequitur

56 pages

Sequitur

Sequitur

56 pages

Protocols

Protocols

106 pages

Spyware

Spyware

31 pages

Sequitur

Sequitur

10 pages

Load more
Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?