Researchers Tout New Network Worm Weapon 101
coondoggie writes "Can Internet worms be thwarted within minutes of their infection? Researchers at Ohio State University believe they can. The key, researchers found, is for software to monitor the number of scans that machines on a network send out. When a machine starts sending out too many scans — a sign that it has been infected — administrators should take it off line and check it for viruses. In a nutshell, the researchers developed a model that calculated the probability that a virus would spread, depending on the maximum number of scans allowed before a machine was taken off line.'The difficulty was figuring out how many scans were too many,' researchers said."
Neat (Score:5, Insightful)
I suppose the admin of a corperate network will probably frown on active bittorrent use in general though.
Re:Neat (Score:5, Insightful)
IMO, it is the botnets that do the most damage as a collective thing. Stopping a worm that bricks your machine is not hard LOL, stopping one that bricks other machines is good. Stopping DDoS attacks is even MORE important. It is the attack for hire model of hacking that really sucks bad.
If the botnet owner takes a few months to build the botnet, it is still a botnet. Even better if s/he hides data in video packets or VoIP or IM packets.
The only real way that I can see to stop the damage is to have 99.9999%+ computers in the world running in a sandbox where the perimeter monitors everything that the user software is doing. So, even if the corporate network is functioning like a sandbox (as it already should be) the danger from worms forming botnets is still a threat, this merely lessens the threat of a quickly spreading/created botnet/worm.
Re: (Score:2)
Merely? M E R E L Y ???? (Score:1, Interesting)
Unbootable does NOT even begin to describe what you have on your hands. Brick, on the other hand, gets kind of close and conveys the proper frame of mind when you have experienced that kind
Re: (Score:2, Informative)
Re: (Score:2)
Re:Merely? M E R E L Y ???? (Score:5, Insightful)
I, for one, love this "brick" terminology (Score:1)
I scour the local dumpsters for computers (college dorm room dumpsters on move-out day are a freakin' gold mine), reinstall the OS, and do some good with them. Or just fix them and sell them back to
Anti-DDoS TCP/IP additions? (Score:3, Insightful)
What if a "you're DoS-ing me" reply packet was added to TCP/IP, which could be picked up at the ISP level and would (ideally) cause the ISP to throttle that user's bandwidth to the site in question for a short period of time?
The problem with this kind of hacked-on solution is that it often causes other vulnerabilities --- in this case, what if the botnet was set up to spread faked "you're DoS-ing me" packets? One could hope that ISPs would filter such outgoi
Re: (Score:2)
Re: (Score:1)
Yes, something like that, but designed for malicious overloading. But as I said, it would have to be enforced at the hardware modem level or the ISP level for it to be effective. Along with similar measures against packets with forged headers (so the replies actually return to the abuser).
Maybe someday!
Re: (Score:2, Interesting)
In practice off course
* there are vulnerabilities that nobody (except the abuser) knows about and hence 'spreading slowly' is fine too
* exploits are only created AFTER they have been identified (see "script kiddies") and rely upon people that are too uneducated/lazy/slow/dumb/p
Re: (Score:1)
The main question here is IMHO : what do they mean with SCANS ? Are those (failed) connections that do not get ACK's back ? I'm pretty sure most P2P traffic would be able to cause false alerts, and although the network admin wouldn't be too happy to have bittorrent or emule on a machine (different from his own =), I can tell you that eg Skype can't be missed anymore where I work.
This runs over a network right? Between ARP poisoning, MAC address spoofing, and promiscuous tcp/ip, wouldn't it be pretty easy to obfuscate which computer is doing the scanning? They can just dump whatever packets they want onto the network, and see the responses.
It would still show that some computer on the network is being naughty, but is should be easy to hide which computer it actually is.
Not that it won't help somewhat, but it's just another step in the arms race.
That word brick... (Score:2)
Re: (Score:2, Funny)
But, I dont see how this would work (such as you mentioned BitTorrent, et al) for the 'public' unless ISP's starting DoS-ing their customers, or sending them direct messages...
Suspicious Amount Of Traffic Detected, Disconnect From Internet?
(Cancel) (Allow)
Which would mea
Re:Neat (Score:5, Interesting)
At lower thresholds (which they'll surely need since worms and viruses will just start scanning more slowly), they can start analyzing patterns and individual packets. This won't solve the problem overnight, but it will eliminate virtually all worms and viruses in the wild right now and make future worms and viruses propagate much more slowly.
If I am in a position of authority over a network, (Score:3, Funny)
Re: (Score:2)
Re: (Score:1)
Well? (Score:2, Insightful)
Re: (Score:1, Troll)
Re: (Score:3, Funny)
iPhones (Score:3, Interesting)
Re: (Score:3, Informative)
Not really.
The reason Duke had to ban them was because the way they did their WiFi somehow clashed with the way Duke's WiFi network was set up. The end result was that a small concentration of iPhones managed to actually take down the WiFi network by consuming inordina
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
SOP - Standard operating procedure (Score:5, Funny)
There is the alternative though...
http://xkcd.com/416/ [xkcd.com]
Re: (Score:2)
Hey, if Vigor was coded after appearing in UF, I don't see why this couldn't be done...
Re: (Score:1, Informative)
IDS (Score:4, Insightful)
Re: (Score:3, Interesting)
It will incidentally also allow network admins to automatically shut down bittorrent, so it should be quite popular.
Re: (Score:2)
Establish a baseline and compare to it...? For some reason they don't seem to have thought of the baseline part yet though - apparently they didn't do their research well.
Huh? Did you RTFA?
Their baseline is 10,000 connections a month.
Anything over that gets flagged.
I guess 10,000 connection per month is a lot for a corporate environment.
Obviously that number would need to be tweaked depending on the company, but 10k is their baseline.
Or does baseline mean something other than what I think it means?
And now that... (Score:4, Interesting)
(Don't get me wrong, I'm a huge proponent of publicly posting computer security information. But this seems pretty easy to circumvent when considered, no?)
Re:And now that... (Score:4, Insightful)
If the worms are coded to spread more slowly, it will decrease the rate of propogation, making it more difficult for the worms to survive.
If they don't alter their code, worms will have a much harder time surviving on networks that take advantage of this discovery.
The net effect is positive.
Re: (Score:3, Insightful)
Re:And now that... (Score:4, Funny)
Re: (Score:2)
The slower the worm propagates and the less it does in any noticeable manner, the lesser the chance it will be discovered by any means.
The paper (Score:3, Informative)
This is trivially defeated (Score:5, Insightful)
Re: (Score:2)
Seriously Useless (Score:2, Funny)
sysadmin: $max_scans_allowed = 10;
worm: sh1t! $max_scans_allowed = 10;
sysadmin: sh1t! $max_scans_allowed = 9;
worm: sh1t! $max_scans_allowed = 9;
sysadmin: sh1t! $max_scans_allowed = 8;
worm: sh1t! $max_scans_allowed = 8;
sysadmin: sh1t! $max_scans_allowed = 7;
worm: sh1t! $max_scans_allowed = 7;
sysadmin: sh1t! $max_scans_allowed = 6;
worm: sh1t! $max_scans_allowed = 6;
sysadmin: sh1t! $max_scans_allowed = 5;
worm: sh1t! $max_scans_allowed = 5;
sysadmin: sh1t! $max_scans_allow
Re: (Score:1)
Re: (Score:3, Funny)
Easy to circumvent. (Score:4, Insightful)
Re: (Score:1, Interesting)
Re: (Score:2)
Re:Easy to circumvent. (Score:4, Informative)
Basically dry up the resources available to the worm and make it as unprofitable as possible to run a botnet in that fashion.
Or in a more cost effective way, just throttle everybody's connection when there's a major outbreak while people get patched. Force the worms and viruses into a much smaller pool. Realistically when some of the larger worms have hit, the bandwidth ends up going mostly to the worms anyways, why not deny the resource to the worm.
Re: (Score:2)
Undeployable (Score:4, Insightful)
BTW, the idea is not new: "A Fast Worm Scan Detection Tool for VPN Congestion Avoidance" in Proceedings of DIMVA 2005 uses the same idea, but in a context where it is actually implementable and useful. Online under http://www.tik.ee.ethz.ch/~ddosvax/publications/papers/dimva06scan.pdf [ee.ethz.ch].
I didn't realize this was news 2 years ago... (Score:5, Insightful)
iptables -A ssh_attack -m hashlimit --hashlimit 200/min --hashlimit-mode srcip --hashlimit-name ssh_attack --hashlimit-htable-size 599 --hashlimit-htable-max 4096 -j RETURN
iptables -A ssh_attack -m limit --limit 1/sec --limit-burst 1 -j LOG --log-prefix "SSH-Attack:"
iptables -I FORWARD -o eth0 -p tcp -m tcp --dport 22 --tcp-flags SYN,RST,ACK SYN -j ssh_attack
In other words, for each internal host allow them to make 200 outbound SSH connections per minute (tracked individually). If they exceed that limit, log a message.
We then have a nagios plugin that checks for this message being in "dmesg". If it is, we get paged.
We watch the sites we host pretty closely, so we don't often run into them getting compromised. The last one was because a host admin re-enabled password logins in SSH *AND* set up a guest account with a password like "guest". Only the guest account was compromised, but I digress.
The thing is that people who compromise these hosts pretty much always use that host to scan for other hosts to attack. And looking for weak passwords on other hosts via SSH seems to be pretty common.
So, once we saw this it was a no-brainer to set up something to alert us when someone started doing it.
Sean
Re: (Score:2)
Re: (Score:2)
I used to do this maually (Score:1)
To thwart attacks and keep the network working, I would have ntop running at the gateway looking for lots of SYN with no ACK, a usual sign of an infected machine. I would have to kick them off at the node and then politely call them
Move to MacOS -- worms are obsolete here (Score:2, Interesting)
I say leave the worm finding to the Windows and Linux people who are vulnerable to this stuff, and we Mac people can just point and snicker, because a worm or a botne
Re:Move to MacOS -- worms are obsolete here (Score:4, Interesting)
Remote vulnerabilities such as this: http://www.securityfocus.com/bid/29514 [securityfocus.com] would say well, maybe MacOSX IS vulnerable to such types of malware (they only need to cause buffer overflows or exploit remote code vulnerabilities and you can get nailed just like any other OS that is coded by humans).
The question is: Are Macs with their puny marketshare, worth the bother of hacking?
Answer: Some people/groups are starting to show interest in this, yes. But on the whole, no, they aren't worth the bother. Mainly this interest has grown since Apple swapped over to x86 architecture. I find that interesting.
I think the bigger thing to sit and think about is this: No software written, and no hardware designed by humans will ever be perfect. There will always be a weakness somewhere in the system. Deal with it the best you can, like everyone else, and stop spouting stupid nonsense about an invulnerable OS.
Worm Weapon... (Score:1)
As a network admin... (Score:5, Interesting)
There is no need anymore. People need to connect to the Internet and file servers, etc. Rarely if ever is it actually necessary or preferable to have people connect to each other. The servers *should* be the best updated and protected systems and much easier to trust than Joe Sixpacks PC.
You stop worms from impacting you locally, and at worst your Internet pipe gets congested by a big outbreak which can be easier traced and combated when you aren't also fighting a spreading fire.
Re: (Score:1, Interesting)
"What, you want your computers to be able to connect to each other via the network? Really? Let me guess, you also want printers that print too?"
Re:As a network admin... (Score:5, Informative)
The GP explained his point in an easily understandable way. I don't know how you failed to understand it. Anyway, here it comes again in slow motion for your benefit:
In most corporate networks, clients need to connect to servers. They do not need to connect to other clients.
If you block clients' ability to connect to other clients, no functionality is lost, but infected clients can not attack other clients directly.
(I know that some companies uses IM internally, but there is nothing forcing IM solutions to be P2P.)
Re: (Score:2)
Re: (Score:2)
You could design your network from the groun
Re: (Score:2)
It isn't hard. I have actually implemented this idea in labs and test case scenarios/labs and each an
Re: (Score:2)
Re: (Score:2)
I run into this daily, you are no special case, and again your ignorance shines through. I'm no BOFH, e
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Exactly right, YOU CAN'T host a wiki or create an unauthorized server by "just installing LAMP" this is part of the problem. I'm sure you are an expert in each letter of LAMP which would qualify you to do that. "Fighting with IT" is
Caterpillars (Score:1)
Worms are not pretty (Score:1)
Blinking Lights (Score:3, Funny)
Hardly news - already running at a uni for 5 years (Score:1)
How about pre-emptive defence? (Score:2)
Here's a better idea (Score:2)
What you need to do is have the software running on the PC itself, so that it can monitor what task is actually running the scans so a human can check it.
This will be news to Forescout. (Score:1)
Old News (Score:1)
Still vexed by by SEC offense... (Score:1)