ImageVerifierCode 换一换
格式:PPT , 页数:25 ,大小:176KB ,
资源ID:376571      下载积分:2000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-376571.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(Internet Quarantine- Requirements for Containing Self-.ppt)为本站会员(roleaisle130)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

Internet Quarantine- Requirements for Containing Self-.ppt

1、Internet Quarantine: Requirements for Containing Self-Propagating Code,David Moore et. al. University of California, San Diego,Internet Quarantine: Requirements for Containing Self-Propagating Code,Aleksandar Kuzmanovic Rice University, COMP 629,Outline,Background about worm, esp. Code-Red Whats wor

2、m, esp. Code-Red Prevention, Treatment and Containment of the worm.SI epidemic model and Code Red propagation model.Simulations on Code Red Propagation and Containment System Deployment.Conclusion.,Background: what is worm?,Worm is a self-replicating software designed to spread through the network.W

3、orm vs Virus and Trojan horse Virus and Trojan horse rely on human intervention to spread. Worm is autonomous.,Background: Code-Red v1,Outbreak: June 18, 2001How it works: Buffer overflow exploit on Microsoft IIS web server. Upon infected a machine, randomly generate a list of IP addresses. Probe ea

4、ch of the addresses from the list.Payload: DDoS attack against www1.whitehouse.gov.Damage: little Fixed random seed.,Background: Code-Red v2,Outbreak: July 19, 2001How it works: Similar to Code-Red v1, but with a random seed. Generates 11 probes for second.Damage: severe 359,000 machines were infect

5、ed within 14 hours.,How to mitigate the threat of worms(1),Three approaches Prevention: Reduce the size of the vulnerable population. E.g. A single vulnerability in a popular software system can result in millions of vulnerable hosts. E.g. Code Red attacks millions of MS IIS web server.,How to mitig

6、ate the threat of worms (2),Treatment: E.g. virus scanner. The time required to design, develop and test a security flaw is usually for too slow than the spread of the worm.Containment: E.g. firewall, filters Containment is used to protect individual networks, and isolate infected hosts.,SI Model (1

7、),In this work, a vulnerable machine is described as susceptible (S) machine. A infected machine is described as infected (I). Let N be the number of vulnerable machines. Let S(t) be the number of susceptible host at time t, and s(t) be S(t)/N, where N = S(t) + I(t). Let I(t) be the number of infect

8、ed hosts at time t, and i(t) be I(t)/N. Let be the contact rate of the worm. Define:,SI Model (2),Solving the differential equation:,where T is a constant,Code Red Propagation Model (1),Code Red generates IPv4 address by random. Thus, there are totally 232 addresses. Let r be the probe rate of a Cod

9、e Red worm. Thus:,Code Red Propagation Model (2),Two problems Cannot model preferential targeting algorithm. E.g. select targets form address ranges closer to the infected host.The rate only represents average contact rate. E.g. a particular epidemic may grow significantly more quickly by making a f

10、ew lucky targeting decisions in early phase.,Code Red Propagation Model (3),Example on 100 simulations on Code Red propagation model:,After 4 hours:55% on average80% in 95th percentiles25% in 5th percentiles,Modeling Containment Systems (1),A containment system has three important properties:Reactio

11、n time the time necessary for Detection of malicious activity, Propagation of the containment information to all hosts participating the system, and Activating any containment strategy.,Modeling Containing Systems (2),Containing StrategyAddress blacklisting Maintain a list of IP addresses that have

12、been identified as being infected. Drop all the packets from one of the addresses in the list. E.g. Mail filter. Advantage: can be implemented easily with existing firewall technology.,Modeling Containing Systems (3),Content filtering Requires a database of content signatures known to represent part

13、icular worms. This approach requires additional technology to automatically create appropriate content signatures. Advantage: a single update is sufficient to describe any number of instances of a particular worm implementation.Deployment scenarios Ideally, a global deployment is preferable. Practic

14、ally, a global deployment is impossible. May be deploying at the border of ISP networks.,Idealized Deployment (1),Simulation goal To find how short the reaction time is necessary to effectively contain the Code-Red style worm.Simulation Parameters: 360,000 vulnerable hosts out of 232 hosts. Probe ra

15、te of a worm : 10 per sec.Containment strategy implementation Address blacklisting Send IP addresses to all participating hosts. Content filtering Send signature of the worm to all participating hosts.,Idealized Deployment (2),Result: content filtering is more effective.,20 min,2 hr,Number of suscep

16、tible host decreases,Worms unchecked,Idealized Deployment (3),Next goal: To find the relationship between containment effectiveness and worm aggressiveness. Figures are in log-log scale.,Idealized Deployment (4),Percentage of infected hosts,Address blacklisting is hopeless when encountering aggressi

17、ve worms.,Practical Deployment (1),Network Model AS sets in the Internet: routing table on July 19,2001 1st day of the Code Red v2 outbreak.A set of vulnerable hosts and ASes: Use the hosts infected by Code Red v2 during the initial 24 hours of propagation. A large and well-distributed set of vulner

18、able hosts. 338,652 hosts distributed in 6,378 ASes.,Practical Deployment (2),Deployment Scenarios Use content filtering only. Filtering firewall are deployed on the borders of both the customer networks, and ISPs networks.,Deployment of containment strategy.,Practical Deployment (3),Reaction time:

19、2hrs,Difference in performance because of the difference in path coverage.,Practical Deployment (4),System fails to contain the worm.,Conclusion,Explore the properties of the containment system Reaction time Containment strategy Deployment scenario In order to contain the worm effectively Require automated and fast methods to detect and react to worm epidemics. Content filtering is the most preferable strategy. Have to cover all the Internet paths when deploying the containment systems.,

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1