Research Review 2006
1
Responding to Mobile Worms with Location-Based Quarantine Boundaries
Baik Hoh (baikhoh@winlab) Marco Gruteser (gruteser@winlab)
Responding to Mobile Worms with Location-Based Quarantine - - PowerPoint PPT Presentation
Responding to Mobile Worms with Location-Based Quarantine Boundaries Baik Hoh (baikhoh@winlab) Marco Gruteser (gruteser@winlab) Research Review 2006 1 Threats of Mobile Worms Current Trends in Pervasive Devices Multi-radio support :
Research Review 2006
1
Baik Hoh (baikhoh@winlab) Marco Gruteser (gruteser@winlab)
Current Trends in Pervasive Devices
Multi-radio support: backhaul link (e.g., Cellular networks) and short-
range communication (e.g., Bluetooth, DSRC)
Example: Cellular networks, Vehicular networks
Mobile Worms / Malware over Peer-to-Peer interaction
Vulnerability: Bluetooth buffer overflow (e.g., BlueSmack Attack) This allows malware to spread without user intervention
Peer-to-peer replication over short-range wireless networks creates
a challenge for intrusion detection and response
(High False Alarm) No conventional IDS deployed (Address blacklisting,
Content filtering) over vehicular ad-hoc networks
No concentration point (e.g., gateways) Resource limited nodes
(Distributed IDS) Delay needs special care on ‘Intrusion Response’ No Partitioning of sub-network Can we do virtually in ad-hoc?
500 1000 1500 2000 2500 3000 3500 3000 4000 5000 6000 7000 8000 9000 10000 11000 12000 13000 time elapse [sec] How far worm propagates [m]
( b ) A c c e l e r a t i
s t a g e ( a ) E a r l y s t a g e A p p r
i m a t e l y , w
m c a n i n f e c t a l l v e h i c l e s w i t h i n 1 1 . 6 k m r a d i u s d u r i n g 1 mi n . ( c ) S t a b l e s t a g e
Am I building too high wall for imaginary monster?
real world?
important than Intrusion Detection?
developing a patch? I’m Don Quixote? But, I’m fighting with realistic monster?
3 r d 2 n d 1
s t
: h u ma n a n a l y s i s 3 r d A l a r m s & R e s p
s e s O u t d a t e d Q u a r a n t i n e b
n d a r y E s t i m a t i
w
m p r
a g a t i
d u r i n g d e l a y ma k e s a n a c c u r a t e w a l l t
t
i t ! ! ! O u t b r e a k h a p p e n s a n d p r
a g a t e s t
h e r i g h t
3 3.2 3.4 3.6 3.8 4 4.2 4.4 4.6 4.8 5 x 10
4
1.5 2 2.5 3 3.5 4 x 10
4
3.4 3.5 3.6 3.7 3.8 3.9 4 4.1 4.2 4.3 x 10
4
2.3 2.4 2.5 2.6 2.7 2.8 2.9 3 3.1 3.2 x 10
4
3.4 3.5 3.6 3.7 3.8 3.9 4 4.1 4.2 4.3 x 10
4
2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 3 3.1 x 10
4
O u r i n t r u s i
a r c h i t e c t u r e p e r f
m a n c e Wh e n d
b l y a p p l i e d
A time delay between outbreak to alarm.
Mobile worms can spread further imperfect
We need an accurate boundary estimation
We need an “Intrusion response planning
Diffusion-Reaction model from ‘Spread of muskrats’
Propagation Speed, Circle
Advection-Diffusion model from ‘Toxic pollutants in
Propagation Speed, Rectangles
Estimating quarantine boundary in mobile worm is an
IDS can accurately locate Patient 0 Location server (infrastructure): service
Type of mobile worms: unknown malware (or
Detection method: a distributed anomaly
5% of All vehicles are susceptible (e.g.,
Step1: Estimating the worm propagation velocity
Pedestrian scenarios: empirically simulation
Vehicular scenarios: simple analytic model
Step2: Estimating the spatial distribution
Isotropic circle (R = v’ * ∆T) Rectangle (L = v’ * ∆T, W = road width)
( a ) F u l l s p e e d ( R > C
r
) ( b ) T r a f f i c j a m ( R < C
r
) C
r
C
r
R R
<
p e e d V <
p e e d V <
p e e d V <
p e e d V
V’ = α*n*Cr + V (α is a constant) A traversal of the road network graph
T 1 = D 1 / V ’ T 2 = D 2 / V ’ L e n g t h = ( Δ T
1 ) * V ’ Wi d t h = r
d w i d t h
95% detection probability can slow the propagation of a
It yields additional analysis time for patch It can act as a short-term defense Repeated application of intrusion response
Analytical model for V’ works enough
It doesn’t need a laboring job (no prior information) only V and
R from D.O.T.
10% inferior to the best in Pf
Patient 0 detection should be solved
Effect of inaccuracy on Pd & Pf Method: Triangularization and Recursive Least Square
We proposed an architecture for a service provider
Infrastructure-based approach Location-based quarantine boundary estimation
We verified algorithm to real road networks Patient 0 detection algorithm Design of robust algorithm to inaccurate patient 0 and
State wide area simulation (NJ
Ecology