Towards malware inspired management frameworks J er ome Fran - - PowerPoint PPT Presentation

towards malware inspired management frameworks
SMART_READER_LITE
LIVE PREVIEW

Towards malware inspired management frameworks J er ome Fran - - PowerPoint PPT Presentation

April, 8 2008 http://madynes.loria.fr/ Towards malware inspired management frameworks J er ome Fran cois, Radu State and Olivier Festor Introduction Malware for management Models Results Conclusion Outline 1 Introduction 2


slide-1
SLIDE 1

April, 8 2008 http://madynes.loria.fr/

Towards malware inspired management frameworks

J´ erˆ

  • me Fran¸

cois, Radu State and Olivier Festor

slide-2
SLIDE 2

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

2 / 29

slide-3
SLIDE 3

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

3 / 29

slide-4
SLIDE 4

Introduction Malware for management Models Results Conclusion

Motivation

◮ scalable management ◮ mass configuration ◮ distributed honeypots for tracking cyber-predators ◮ announce specific-keywords on P2P file sharing system

4 / 29

slide-5
SLIDE 5

Introduction Malware for management Models Results Conclusion

Research challenges

◮ scalability: open participation to honeypot ◮ efficiency: keywords changes → fast keywords updates ◮ tracking prevention: controller and honeypots

anonymity

◮ security: false keywords list updates ◮ reachability guarentees: knowing the impact of a

request is needed provide additional operations

5 / 29

slide-6
SLIDE 6

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

6 / 29

slide-7
SLIDE 7

Introduction Malware for management Models Results Conclusion

Malware communication paradigms

◮ attackers faced the same problems

◮ control multiple machines through the Internet ◮ goals: distributed denial of service attacks, mass collecting

  • f sensitive data

◮ construction of a botnet

◮ control mechanism to send orders to the bots and get the

responses

◮ decentralized and scalable: example of 400 000 zombies in

  • ne botnet

7 / 29

slide-8
SLIDE 8

Introduction Malware for management Models Results Conclusion

Botnet based network management

◮ use a botnet to perform management operations ◮ different types of botnet

◮ IRC model1 ◮ P2P models : unstructered (Slapper) and structured

(Chord)

→ study of performances of these types of botnets once they are deployed

  • 1J. Francois, R. State, and O. Festor, ’Botnet based scalable network

management’, DSOM 2007

8 / 29

slide-9
SLIDE 9

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

9 / 29

slide-10
SLIDE 10

Introduction Malware for management Models Results Conclusion

Parameters

◮ N: total number of devices/peers ◮ m is the maximal branching factor = the maximal

number message sent by a peer at the same time (message forwarding)

10 / 29

slide-11
SLIDE 11

Introduction Malware for management Models Results Conclusion

Parameters

◮ a peer can crash if it has to maintain too many

connections → α(m) is the probability for a peer to be able to forward the messages, decreasing function

◮ the risk to be compromised by an attacker and to be

attacked (network communication monitoring): β

11 / 29

slide-12
SLIDE 12

Introduction Malware for management Models Results Conclusion

Goal: determine the reachability = the number of peers reached at a certain distance

12 / 29

slide-13
SLIDE 13

Introduction Malware for management Models Results Conclusion

Slapper model

◮ a sophisticated worm ◮ infected computers form a botnet

◮ full-meshed network ◮ controller tracking prevention: the message is transmitted

through several peers

◮ broadcast segmentation

◮ the initiator (the controller) sends the messages to m

random peers

◮ when a peer receives a message, it sends the messages to

m random peers

◮ a maximal number of hops is fixed ◮ original m = 2

13 / 29

slide-14
SLIDE 14

Introduction Malware for management Models Results Conclusion

Slapper model

14 / 29

slide-15
SLIDE 15

Introduction Malware for management Models Results Conclusion

Slapper model

14 / 29

slide-16
SLIDE 16

Introduction Malware for management Models Results Conclusion

Slapper model

14 / 29

slide-17
SLIDE 17

Introduction Malware for management Models Results Conclusion

Slapper model

◮ the same message can be sent to the same peers two

times

◮ no guarentee to reach all peers

14 / 29

slide-18
SLIDE 18

Introduction Malware for management Models Results Conclusion

Chord model

◮ each peer has an id: 0 ≤ id < NMAX ◮ routing table of each node p:

◮ log(NMAX) entries ◮ ith entry: first id at a distance from p at least 2i−1

15 / 29

slide-19
SLIDE 19

Introduction Malware for management Models Results Conclusion

Chord model

◮ broadcast2:

◮ forward the messages to each peers of the routing table ◮ each peer has an exploration limit = min(the next peers in

the routing table of the message sender, sender exploration limit)

  • 2S. El-Ansary et-al, ’Efficient broadcast in structured p2p networks’ IPTPS 03

16 / 29

slide-20
SLIDE 20

Introduction Malware for management Models Results Conclusion

Chord model

◮ broadcast2:

◮ forward the messages to each peers of the routing table ◮ each peer has an exploration limit = min(the next peers in

the routing table of the message sender, sender exploration limit)

  • 2S. El-Ansary et-al, ’Efficient broadcast in structured p2p networks’ IPTPS 03

16 / 29

slide-21
SLIDE 21

Introduction Malware for management Models Results Conclusion

Chord model

◮ broadcast2:

◮ forward the messages to each peers of the routing table ◮ each peer has an exploration limit = min(the next peers in

the routing table of the message sender, sender exploration limit)

  • 2S. El-Ansary et-al, ’Efficient broadcast in structured p2p networks’ IPTPS 03

16 / 29

slide-22
SLIDE 22

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

17 / 29

slide-23
SLIDE 23

Introduction Malware for management Models Results Conclusion

Slapper

◮ N = 2000 peers ◮ i varies from 1 to 14 hops ◮ maximal value = reach

all peers except discovered peers

◮ → limited by β

(probability for each node to be compromised)

◮ higher branching factor → higher reachability

18 / 29

slide-24
SLIDE 24

Introduction Malware for management Models Results Conclusion

Slapper

◮ N = 5000 peers ◮ i varies from 1 to 14 hops ◮ compromised probability

β has a higher impact when the number of peers increases

◮ N increases → curves

increase less at the begin and more at the end

◮ same number of hops to reach the maximal value

19 / 29

slide-25
SLIDE 25

Introduction Malware for management Models Results Conclusion

Slapper

◮ number of hops = 8 ◮ N varies from 100 to

5000

◮ curves converge to a fixed

limit depending on β and N

◮ very bad performances for

m = 2 (not suitable)

◮ high distance → no impact of the branching factor

20 / 29

slide-26
SLIDE 26

Introduction Malware for management Models Results Conclusion

Chord

◮ number of hops varies

from 1 to 13

◮ N = 5000 peers ◮ very close curve →

limited impact of the average distance between two node

◮ Slapper is about

equivalent until a certain distance

◮ Chord → all the peers can be reached ◮ Chord has a better reachability

21 / 29

slide-27
SLIDE 27

Introduction Malware for management Models Results Conclusion

Impact of attacks

◮ rat(n) = #discovered peersSlapper

#discovered peersChord

◮ independant from the

distance d

◮ important benefit of

Chord

◮ ratio decreases at the

end

◮ ratio is still 20 for 2512 peers

22 / 29

slide-28
SLIDE 28

Introduction Malware for management Models Results Conclusion

Chord

◮ number of hops = 6 ◮ N varies from 1 to 216 ◮ Slapper: limitation by

beta (best case)

◮ 6 hops = number of hops

to have a reachability equivalent to Slapper

◮ increasing distance →

better results for Chord

◮ Slapper is better between 210 and 212 peers ◮ Chord can be better from 212 peers

23 / 29

slide-29
SLIDE 29

Introduction Malware for management Models Results Conclusion

Outline

1 Introduction 2 Malware for management 3 Models 4 Results 5 Conclusion

24 / 29

slide-30
SLIDE 30

Introduction Malware for management Models Results Conclusion

What to choose ?

IRC Slapper Chord Efficiency The lowest num- ber of hops The lowest delays Resiliency very constrained (unavaibility, at- tacks) very constrained by attacks, few connections high resiliency, few connections, partial view Scalability #devices < 212 #devices ≥ 212 Security The manager can be tracked Tracking the manager is very dif- ficult (the intermediary nodes) Interest Large and closed networks + cen- tral authority Large networks

  • f checked part-

ners (research distributed honeypot) Huge and public networks (honey- pot where every-

  • ne can partici-

pate) Table: Comparison of the different frameworks

25 / 29

slide-31
SLIDE 31

Introduction Malware for management Models Results Conclusion

Questions ?

26 / 29

slide-32
SLIDE 32

Introduction Malware for management Models Results Conclusion

Slapper model

◮ assumptions:

◮ reachi−1 total number of reached peers at a maximal

distance i − 1

◮ p(t, c, j): probability to contact j not yet reached peers

from already contacted c peers and with c messages to sent

◮ maximal number of messages sent at the ith hop :

◮ 1st hop: m, 2nd hop: m × m → mi ◮ limited by avability factor: msg = (m × α(m))i

◮ maximum number of new reached peers at the ith

hop: max = min((m × α(m))i, N − reachi−1)

◮ average number of reached peers at an exact distance

  • f i = max

k=0 p(reachi−1, msg, k) × k

27 / 29

slide-33
SLIDE 33

Introduction Malware for management Models Results Conclusion

Chord model

◮ compute the number of hops to reach a peer p from

the peer 0

◮ p = 2k → single hop ◮ p − d < 2k → no peers between p and 2k → single hop ◮ else there is an intermediary peer →, do the same process

from this peer

28 / 29

slide-34
SLIDE 34

Introduction Malware for management Models Results Conclusion

Deployment

Evaluation → help an administrator to choose the right topology and to know the attended performances

IRC Slapper Chord Number

  • f

hops to have the best reachability a fixed knowed value whatever the number of devices A maximal value de- pending

  • n

the identi- fiers space size Impact of an high branch- ing factor negative im- pact (m=5) Positive im- pact

29 / 29