Proposal for the Experimental Environment for Network Worm Infection

Proposal for the Experimental Environment for Network Worm Infection

Proposal for the experimental environment for Network Worm infection Masato Terada†, Shingo Takada Graduate School of Science and Technology, Keio University. 3-14-1 Hiyoshi, Kohoku, Yokohama, Kanagawa 223-8522, Japan And Norihisa Doi ‡ Graduate School of Science and Engineering, Chuo University. 1-13-27 Kasuga, Bunkyo-ku, Tokyo 112-8551, Japan Abstract network worm activities. We also present actual data on infection activities about network worms such as Code Red, Nimda, Code analysis and simulation of network worm infection are Slammer, Blaster and Sasser obtained in our experimental useful methods to evaluate how it spreads and its effects [1]. But a environment. bug in infection algorithm or the way of implementing a random number generator etc. affects the retrieval behavior of network Table 1 Ratio of IP addresses retrieved by Sasser. worm infection. It is important to evaluate the retrieval behavior The selection of potential target IP addresses Ratio of network worm infection in an experimental environment for The same first two octets 25% complementing code analysis. This paper describes a prototype of The same first octet 23% experimental environment for network worm infection and actual Others 52% data on network worm infection. The purpose of experimental environment is to investigate retrieval behavior and infection mechanisms in network worm behavior. For example, there are a 2. Experimental environment for the Network mapping of retrieved IP addresses and a ratio of IP addresses retrieved and port numbers used by network worms. Also we Worm infection behavior implemented a prototype system to show the validity of our There are the following requirements to construct an experimental approach. environment. It doesn't need to use a special device, and is a small-scale, Keywords: Network Security, Worm, Infection, Retrieval readily-available system with just sufficient behavior hardware/software. It provides information for building countermeasures to 1. Introduction prevent network worm infection. In other words, we can gather information on the address block ratio of IP addresses retrieved In 2004, Sasser.A, Sasser.B and Sasser.C were discovered on and the port numbers used by network worms. April 30, May 1 and May 2, respectively. The Sasser worm selects It makes it possible to efficiently verify infection behavior of retrieval IP addresses and tries to infect selected targets, like Code network worms. Red, Nimda and Blaster. The address block ratio of IP addresses retrieved by Sasser, according to the code analysis, is shown in We propose two types of experimental environment -- “the Table 1 [2]. A bug in IP address selection algorithm or the way of experimental environment for retrieval behavior” and “the implementing a random number generator etc. affects the retrieval experimental environment for infection behavior” to satisfy above behavior of network worm infection. In other words, these factors requirements. affect the trends in infection spread. Then it is important to evaluate the retrieval behavior of network worm infection in 2.1 Experimental environment for retrieval behavior experimental environment for complementing the code analysis. The purpose of this environment is to gather the address block But there is no actual, measured data on network worm infection ratio of IP addresses retrieved by network worm infection. The for public use. Moreover; to prevent network worm infection, an experimental environment is shown in Figure 1. The infected PC organization should not rely solely on the outside information and has a virtual machine environment and malicious software was should have some information gathering method of its own, such invoked on this virtual machine. The monitoring PC has some as experimental environment to evaluate network worm infection, functions for monitoring worm-infected packets. A packet to plan countermeasures. We propose “an experimental monitoring function captures infected packets and a traffic counter environment for retrieval and infection characteristics in network function counts the number of those packets and makes worm behavior” to improve information gathering concerning summarization. Our prototype uses “tethereal” as packet †) Systems Development Laboratory, Hitachi Ltd. 890, Kashimada, Saiwa-ku, Kawasaki, 212-8567 Japan. ‡) Graduate School of Science and Technology, Keio University monitoring function and a traffic counter is implemented by the (a) Extraction of the first appearance packet script language Perl. The flow analysis function divides packets into groups according to the source/destination IP address pairs and the Web interface provides the following information about network source/destination port number pairs. Next, it extracts the first worm infection. appearance packet in each group and determines the destination (a) The mapping of retrieved IP addresses (upper left in Figure 2) port number used in network worm infection. In case of TCP (b) The distribution of addresses with the same first octet (bottom communications, it usually extracts TCP SYN packets. left in Figure 2) (c) The distribution of addresses with the same first two octets (bottom right in Figure 2) (d) The address block ratio of IP addresses retrieved (upper right e in Figure 2) g n a R s The characteristics of this environment are the following: res The experimental environment can be built with two PCs. In this environment, loss of ability to observe activities is IP add limited to only three IP addresses (2 broadcast addresses and 1 Elapsed time (secs) infected PC IP address) at a maximum even when a network worm selects an IP address from the same sub network to which the monitoring PC belongs. The infected PC sends TCP SYN packets, but it cannot s s establish a TCP connection because the monitoring PC ount ount discards all TCP SYN packets. C C 2.2 Experimental environment for infection behavior IP address Range IP address Range The purpose of this environment is to gather information about infection behavior of network worms. Especially, information on Figure 2 Web interface of prototype for retrieval behavior. the port numbers used in network worm infection is our target. The experimental environment is shown in Figure 3. The global Internet address space currently offers 32-bit worth of unique host Infected PC Monitoring PC Target PC addresses, or a theoretical maximum of 2^32=4,294,967,296 hosts. Virtual Machine Web interface Virtual Machine The probability that the IP address of our target PC is chosen by IP address IP address =x.x.x.1 =y.y.y.1 network worms by chance is very low. This environment has an IP Flow analysis Default route Default route address translation function to resolve this problem and make =x.x.x.2 IP address =y.y.y.2 efficient verification possible. Our prototype uses “Linux iptables Packet monitor translation DNAT (Destination Network Address Translation)” as IP address eth0 x.x.x.2 y.y.y.2 eth1 translation function. The DNAT mechanism is shown in Figure 4. x.x.x.0/30 y.y.y.0/30 The monitoring PC receives any packets on the eth0 interface and changes the destination IP address of those packets from a random Figure 3 Prototype for infection behavior of network worm IP address (=nnn.nnn.nnn.nnn) to the target IP address (=y.y.y.1). Then it sends the packets to the targeted PC. iptables -t nat -A PREROUTING -d 0/0 In addition, this environment has a flow analysis function, which -i eth0 extracts the following items from the packets captured by the -j DNAT --to y.y.y.1 packet monitoring function to build countermeasures. The destination port number used in network worm infection. Infected PC Monitoring PC Target PC The destination port number series and its frequency. eth0 eth1 dst IP=nnn.nnn.nnn.nnn src IP=x.x.x.1 dst IP=y.y.y.1 The flow analysis function has two steps: extraction of the packet src IP=x.x.x.1 of interest that has made the first appearance (“the first appearance packet”) and then determination of the destination port number dst IP=x.x.x1 series. dst IP=x.x.x.1 src IP=y.y.y.1 src IP=nnn.nnn.nnn.nnn Infected PC Monitoring PC Figure 4 Destination IP address translation by DNAT. Virtual Machine Web interface IP address =x.x.x.1 Traffic counter Default route Trademarks and Registered Trademarks =x.x.x.2 Dell and are registered trademarks of Dell Computer Corporation. Ethereal is Packet monitor registered trademark of Ethereal Inc. IBM and Thinkpad are registered trademarks of International Business Machines Corporation. Intel and Pentium are registered x.x.x.2 trademarks of Intel Corporation. Linux is a registered trademark of Linuse x.x.x.0/30 Torvaldse. Microsoft, Windows, Windows 2000 and Windows XP are registered trademarks of Microsoft Corporation. Red Hat is a registered trademark of Red Figure 1 Prototype for retrieval behavior of network worm. Hat, Inc. All other trademarks and copyrights referred to are the property of their respective owners. 2 (b) Determination of the destination port number series toward the targeted vulnerable Web servers (80/tcp) are shown in The flow analysis divides the first appearance packets extracted Table 3. And the mapping of retrieved IP addresses is shown in in (a) into groups according to the source/destination IP address Figure 7. The Y-axis represents the IP address range (0.0.0.0 - pairs yet again. Next, it determines the destination port number 255.255.255.255) and the X-axis represents the elapsed time since series in each group. Then it summarizes the extracted the Nimda.E infection was activated. The resulting data of this destination port number series. experiment and data from the code analysis are different because the retrieval behavior of Nimda.E has the periodicity as seen in The flow analysis example of Sasser.C is shown in Figure 5.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us