skip to main content
research-article

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment

Published:01 January 2014Publication History
Skip Abstract Section

Abstract

The fast-spreading worm, which immediately propagates itself after a successful infection, is becoming one of the most serious threats to today’s networked information systems. In this article, we present WormTerminator, a host-based solution for fast Internet worm detection and containment with the assistance of virtual machine techniques based on the fast-worm defining characteristic. In WormTerminator, a virtual machine cloning the host OS runs in parallel to the host OS. Thus, the virtual machine has the same set of vulnerabilities as the host. Any outgoing traffic from the host is diverted through the virtual machine. If the outgoing traffic from the host is for fast worm propagation, the virtual machine should be infected and will exhibit worm propagation pattern very quickly because a fast-spreading worm will start to propagate as soon as it successfully infects a host. To prove the concept, we have implemented a prototype of WormTerminator and have examined its effectiveness against the real Internet worm Linux/Slapper. Our empirical results confirm that WormTerminator is able to completely contain worm propagation in real-time without blocking any non-worm traffic. The major performance cost of WormTerminator is a one-time delay to the start of each outgoing normal connection for worm detection. To reduce the performance overhead, caching is utilized, through which WormTerminator will delay no more than 6% normal outgoing traffic for such detection on average.

References

  1. Brumley, D., Newsome, J., Song, D., Wang, H., and Jha, S. 2006. Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Buchacker, K. and Sieh, V. 2001. Framework for testing the fault-tolerance of systems including os and network aspects. In Proceedings of the IEEE Symposium on High Assurance System Engineering (HASE). 95--105. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Corey, J. 2009 Advanced honeypot identification and exploitation. http://www.phrack.org/fakes/p63/p63-0x09.txt.Google ScholarGoogle Scholar
  4. Cui, W., Paxson, V., Weaver, N., and Katz, R. 2006. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  5. Dike, J. 2000. A user-mode port of the linux kernel. In Proceedings of the Linux Showcase and Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hon. 2004. Honeyd security advisory 2004-001: Remonte detection via simple probe packet. http://www.honeyd.org/adv.2004-01.asc.Google ScholarGoogle Scholar
  7. Kalla, R., Sinharoy, B., and Tendler, J. M. 2004. IBM Power5 chip: A dual-core multithreaded processor. IEEE Micro 24, 2, 40--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kataria, G., Anand, G., Araujo, R., Krishnan, R., and Perrig, A. 2006. A distributed stealthy coordination mechanism for worm synchronization. In Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks (SecureComm’06).Google ScholarGoogle Scholar
  9. Kim, H. and Karp, B. 2004. Autograph: Toward automated distributed worm signature detection. In Proceedings of USENIX Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. King, S., Dunlap, G., and Chen, P. 2003. Operating system support for virtual machines. In Proceedings of the Annual USENIX Technical Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kongetira, P., Aing-Aran, K., and Olukotun, K. 2005. Niagara: A 32-way multithreaded Sparc processor. IEEE Micro 25, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kreibich, C. and Crowcroft, J. 2003. Honeycomb - Creating intrusion detection signatures using honeypots. In Proceedings of HotNets.Google ScholarGoogle Scholar
  13. Li, Z., Sanghi, M., Chen, Y., Kao, M., and Chavez, B. 2006. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., and Weaver, N. 2003. Inside the slammer worm. In Proceedings of the IEEE Symposium on Security and Privacy. Vol. 1.Google ScholarGoogle Scholar
  15. NSF. Malware immunization through deterrence and diversion. http://www.nsf.gov/awardsearch/showAward.do?AwardNumber=0650386.Google ScholarGoogle Scholar
  16. Paxson, V. 1999. Bro: A system for detecting network intruders in real time. Comput. Netw. 31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Perdisci, R., Dagon, D., Lee, W., Fogla, P., and Sharif, M. 2006. Misleading worm signature generators using deliberate noise injection. In Proceedings of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Roesch, M. 1999. Snort: Lightweight intrusion detection for networks. In Proceedings of the Conference on System Administration. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Seifried, K. 2002. Honeypotting with VMware basics. http://www.seifried.org/security/index.php.Google ScholarGoogle Scholar
  20. Singh, S., Estan, C., Varghese, G., and Savage, S. 2003. The earlybird system for real-time detection of unknown worms. Tech. rep., University of California, San Diego.Google ScholarGoogle Scholar
  21. Singh, S., Estan, C., Varghese, G., and Savage, S. 2004. Automated worm fingerprinting. In Proceedings of OSDI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. SLA. http://www.symantec.com/avcenter/venc/data/linux.slapper.worm.html.Google ScholarGoogle Scholar
  23. Staniford, S. 2004. Containment of scanning worms in enterprise networks. J. Comput. Secur.Google ScholarGoogle Scholar
  24. Sugerman, J., Venkitachalam, G., and Lim, B. 2001. Virtualizing I/O devices on VMware workstation’s hosted virtual machine monitor. In Proceedings of the USENIX Technical Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Waldspurger, C. 2002. Memory resource management in wmware ESX server. In Proceedings of the Symposium on Operating Systems Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Weaver, N., Staniford, B., and Paxson, V. 2004. Very fast containment of scanning worms. In Proceedings of USENIX Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Williamson, M. 2002. Throttling viruses: Restricting propagation to defeat mobile malicious code. In Proceedings of Annual Computer Security Applications Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. XEN (a). http://www.cl.cam.ac.uk/research/srg/netos/xen/.Google ScholarGoogle Scholar
  29. XEN (b). http://www.xensource.com/.Google ScholarGoogle Scholar
  30. Zou, C. and Cunningham, R. 2006. Honeybot-aware advanced botnet construction and maintenance. In Proceedings of the International Conference on Dependable Systems and Networks (DSN). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Transactions on Autonomous and Adaptive Systems
              ACM Transactions on Autonomous and Adaptive Systems  Volume 8, Issue 4
              Special Section on Best Papers from SEAMS 2012
              January 2014
              130 pages
              ISSN:1556-4665
              EISSN:1556-4703
              DOI:10.1145/2578044
              Issue’s Table of Contents

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 January 2014
              • Accepted: 1 December 2009
              • Revised: 1 August 2009
              • Received: 1 March 2009
              Published in taas Volume 8, Issue 4

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader