Skip to main content

Very Fast Containment of Scanning Worms, Revisited

  • Conference paper
Malware Detection

Part of the book series: Advances in Information Security ((ADIS,volume 27))

Summary

Computer worms — malicious, self-propagating programs — represent a significant threat to large networks. One possible defense, containment, seeks to limit a worm’s spread by isolating it in a small subsection of the network. In this work we develop containment algorithms suitable for deployment in high-speed, low-cost network hardware. We show that these techniques can stop a scanning host after fewer than 10 scans with a very low false-positive rate. We also augment this approach by devising mechanisms for cooperation that enable multiple containment devices to more effectively detect and respond to an emerging infection. In addition, we discuss ways that a worm can attempt to bypass containment techniques in general, and ours in particular.

We then report on experiences subsequently implementing our algorithm in Click [13] and deploying it both on our own network and in the DETER testbed [6]. Doing so uncovered additional considerations, including the need to passively map the monitored LAN due to Ethernet switch behavior, and the problem of detecting ARP scanning as well as IP scanning. We finish with discussion of some deployment issues, including broadcast/multicast traffic and the use of NAT to realize sparser address spaces.

An earlier version of this chapter appears in Proceedings of the USENIX Securiv Symposium. 2004.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, E. Biham, and L. Knudsen. Serpent: A Proposal for the Advanced Encryption Standard.

    Google Scholar 

  2. B. Bloom. Space_Time Trade-offs in Hash Coding with Allowable Errors. CACM, July 1970.

    Google Scholar 

  3. CERT. CERT Advisory CA-2001-26 Nimda Worm, http://www.cert.org/advisories/ca-2001-26.html.

    Google Scholar 

  4. CERT. Code Red 11: Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL, http://www.cert.org/incident-notes/in-2001-09.html.

    Google Scholar 

  5. S. Crosby and D. Wallach. Denial of Service via Algorithmic Complexity Attacks. In Proceedings of the 12th USENIX Security Symposium. USENIX, August 2003.

    Google Scholar 

  6. Deter: A laboratory for security research, http://www.isi.edu/deter/.

    Google Scholar 

  7. eEye Digital Security..ida “Code Red” Worm, http://www.eeye.corn/htmVResearch/ Advisories/AL20010717.htrnl.

    Google Scholar 

  8. K. Egevang and P. Francis. Rfc 1631-the ip network address translator (nat).

    Google Scholar 

  9. L. T. Heberlein, G. Dias, K. Levitt, B. Mukerjee, J. Wood, and D. Wolber. A Network Security Monitor. In Proceedings of the IEEE Symopisum on Research in Security and Privacy, 1990.

    Google Scholar 

  10. J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In 2004 IEEE Symposium on Security and Privacy, to appear, 2004.

    Google Scholar 

  11. J. Jung, S. Schechter, and A. Berger. Fast Detection of Scanning Worm Infections, in submission.

    Google Scholar 

  12. E. KoNer, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The click modular router. ACM Transactions on Computer Systems, 18(3):264–297, August 2000.

    Google Scholar 

  13. C. Leckie and R. Kotagiri. A Probabilistic Approach to Detecting Network Scans. In Proceedings of the Eighth IEEE Network Operations and Management Symposium (NOMS 2002), 2002.

    Google Scholar 

  14. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Magazine of Security and Privacy, pages 33–39, July/August 2003 2003.

    Google Scholar 

  15. D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-propagating Code, 2003.

    Google Scholar 

  16. M. Networks. http://www.rniragenetworks.com/.

    Google Scholar 

  17. D. Nojiri, J. Rowe, and K. Levitt. Cooperative Response Strategies for Large Scale Attack Mitigation. In Proc. DARPA DISCEXIII Conference, 2003.

    Google Scholar 

  18. H. Packard. Connection-rate filtering based on virus-trottling tecnology, http://www.hp.com/rnd/pdf_html/virus-throttling_tech_brief.htm.

    Google Scholar 

  19. V. Paxson. Bro: a System for Detecting Network iItruders in Real-Time. Computer Networks, 31(23-24):2435–2463,1999.

    Article  Google Scholar 

  20. D. Plummer. Rfc 826-ethemet address resolution protocol.

    Google Scholar 

  21. G. Project. Gnutella, A Protocol for Revolution, http://rfc-gnutella.sourceforge.net/.

    Google Scholar 

  22. S. Robertson, E. V. Siegel, M. Miller, and S. J. Stolfo. Surveillance Detection in High Bandwidth Environments. In Proc. DARPA DISCEX III Conference, 2003.

    Google Scholar 

  23. S. E. Schechter, J. Jung, and A. W. Berger. Fast Detection of Scanning Worm Infections. In Proceedings of the Seventh International Symposium on Recent Advances in Intrusion Detection (RAID 2004), Sept. 15-17,2004.

    Google Scholar 

  24. Silicon Defense. Countermalice Worm Containment, http://www.silicondefense.com/ products/countermalice/.

    Google Scholar 

  25. Snort.org. Snort, the Open Source Network Intrusion Detection System, http://www.snort.org/.

    Google Scholar 

  26. S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, to appear, 2004.

    Google Scholar 

  27. S. Staniford, J. Hoagland, and J. McAlemey. Practical Automated Detection of Stealthy Portscans. Journal of Computer Security, 10: 105–136,2002.

    Google Scholar 

  28. S. Staniford and C. Kahn. Worm Containment in the Internal Network. Technical report, Silicon Defense, 2003.

    Google Scholar 

  29. S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In Proceedings of the 11th USENlX Security Symposium. USENIX, August 2002.

    Google Scholar 

  30. Symantec. W32.blaster.worm, http://securityresponse.symantec.com/avcen_r/venc/datdw32.blaster.worm.html.

    Google Scholar 

  31. J. Vwycross and M. M. Williamson. Implementing and Testing a Virus Throttle. In Proceedings of the 12th USENIXSecurity Symposium. USENIX, August 2003.

    Google Scholar 

  32. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In The First ACM Workshop on Rapid Malcode (WORM), 2003.

    Google Scholar 

  33. B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In Proc. of the Fzfth Symposium on Operating Systems Design and Implementation,pages 255–270, Boston, MA, Dec. 2002. USENIX Association.

    Google Scholar 

  34. D. Whyte, P. vas Oorschot, and E. Kranakis. Arp-based detection of scanning worms within an enterprise network. In In proceedings of Annual Computer Security Applications Conference (ACSAC 2005),Tucson, AZ, December 2005.

    Google Scholar 

  35. M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Mobile Malicious Code. In ACSAC, 2002.

    Google Scholar 

  36. Xilinx Inc. Xilinx ML300 Development Platform, http://www.xilinx.com/products/boards/ml300/.

    Google Scholar 

  37. C. C. Zou, W. Gong, and D. Towsley. Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense. In The First ACM Workshop on Rapid Malcode (WORM), 2003.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC.

About this paper

Cite this paper

Weaver, N., Staniford, S., paxson, V. (2007). Very Fast Containment of Scanning Worms, Revisited. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds) Malware Detection. Advances in Information Security, vol 27. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-44599-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-44599-1_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-32720-4

  • Online ISBN: 978-0-387-44599-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics