on instant messaging worms analysis and countermeasures
play

On Instant Messaging Worms, Analysis and Countermeasures Mohammad - PowerPoint PPT Presentation

COMP 4108 Presentation - Sept 20, 2005 On Instant Messaging Worms, Analysis and Countermeasures Mohammad Mannan School of Computer Science Carleton University, Canada Goals of this talk Discuss a few IM worms Analyze well-known


  1. COMP 4108 Presentation - Sept 20, 2005 On Instant Messaging Worms, Analysis and Countermeasures Mohammad Mannan School of Computer Science Carleton University, Canada

  2. Goals of this talk ➠ Discuss a few IM worms ➠ Analyze well-known countermeasures for IM worms ➠ Present two variations of current techniques Page 2 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  3. Definition of IM worms ➠ Worm : Malicious code that propagates over a network, with or without human assistance (Kienzle and Elder in WORM 2003) ➠ IM worms : Worms that spread in IM networks, by exploiting fea- tures and vulnerabilities of IM clients and protocols Page 3 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  4. IM worms: why do we need to worry? ➠ IM is a popular application ☞ instant communication (home users) ☞ instant collaboration (enterprise users) ➠ A big target for attackers Page 4 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  5. “I don’t use IM. Why should I care?” ➠ The user base is big enough to impact the whole network ➠ You may use it unknowingly! (integrated IM in popular applica- tions) Page 5 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  6. Outline of the talk ➠ IM overview ➠ Examples of IM worms and vulnerabilities ➠ Distinguishing features of IM networks ➠ Topology of IM contacts ➠ Existing techniques and remarks on them ➠ New proposals ➠ Discussion Page 6 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  7. IM communication model (1) Single (Centralized) IM Server Model Server Client−Server Communications Client−Client (Direct) Communications Client−Client (Server−mediated) Communications Client B Client A A’s contact list B’s contact list B A D C E H H Figure 1: Centralized server model Page 7 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  8. IM communication model (2) Multiple (Distributed) IM Server Model Client−Server Communications Server 1 Server 2 Client−Client (Direct) Communications Client−Client (Server−mediated) Communications Client A Client B A’s contact list B’s contact list B A D C E H H Figure 2: Distributed server model Page 8 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  9. Examples: IM worms (1) ➠ SoFunny – File transfer – Runs as a service process in Windows ➠ JS Menger – URL – IE vulnerability ➠ Bropia/Kelvir – File transfer – Disables Task Manager, debugging tools etc. – Installs a variant of the Agobot/Spybot worm – Custom language Page 9 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  10. Examples: IM worms (2) ➠ Serflog – URL or P2P file-sharing – Terminates anti-virus processes – Modifies the system’s HOSTS file Page 10 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  11. Examples: client vulnerabilities ➠ Buffer overflows ➠ PNG (display picture) ➠ GIF ( emoticon ) Page 11 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  12. IM worm replication mechanisms ➠ File transfer ➠ URL message ➠ IM client vulnerabilities ➠ OS or commonly used application vulnerabilities Page 12 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  13. What makes IM networks different? ➠ Popular and connected ➠ Instant hit-list ➠ Instant user-action ➠ Integration with popular applications Page 13 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  14. Scale-free (SF) networks ➠ Preferential attachment and strong local clustering (hubs) ➠ Epidemic threshold : In a fully connected network, if an infected node has a chance β of infecting another, and a chance of δ being cured, then the virus will have a sustained population if β/δ > 1 ➠ There is no critical threshold for epidemics in scale-free networks ➠ Highly resistant to accidental failures : Internet will be functional even with 80% randomly failed routers ➠ Fragile against targeted/deliberated attacks Page 14 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  15. Topology of the IM contacts network ➠ The topology of the IM contacts network is shown to be scale-free ➠ Following aspects may complicate the SF model: 1. IM worms may ‘successfully’ guess contacts 2. Each node can become a hub by joining a chatroom ➠ Implication – restoring a finite epidemic threshold by patching most of the hubs in an infected network would be difficult Page 15 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  16. Existing techniques to restrict IM worms ➠ Temporary server shutdown ➠ Temporarily disabling the most-connected users ➠ Virus throttling for IM Page 16 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  17. Virus throttling for IM – the mechanism request h delay queue working set n = 4 g Queue new add length not−new f a b c d detector e update rate timer clock process Figure 3: Throttling algorithm for IM Page 17 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  18. Virus throttling for IM – shortcomings ➠ One new contact/day may be too restrictive ➠ Instant messages may get delayed ➠ User confirmation may be bypassed by a worm ➠ Data size is small – only 710 users and 2.5 messages/user/day ➠ Group chat ➠ Large memory requirement at the IM server ➠ Worm may ‘learn’ a user’s working set Page 18 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  19. New proposals – background ➠ File transfer and URL messages are the mostly used replication mechanisms ➠ File transfer is not expected to be instant ➠ Challenge senders of potentially damaging payloads ➠ Assumptions: ☞ File transfer and URL messages are much less frequently used than normal text messages ☞ IM connections are secure ➠ Let’s restrict file transfer and URL messages Page 19 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  20. New proposals – mechanisms ➠ Throttle file transfer requests and URL messages ➠ Challenge senders of a file transfer request or URL message with a CAPTCHA ☞ Some users send more files than others – use secure cookies ☞ Challenges may come from the IM server or the recipient IM client Page 20 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  21. Frequency of IM text messaging and file transfer (1) Feature Avg. Number File Transfer (FT) 143 Text Message (TM) 25953 Online Users 7459 Table 1: Average file transfer, text messages, and online users over 15-minute intervals Page 21 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  22. Frequency of IM text messaging and file transfer (2) Ratio Value FT/TM 0.0055 FT/user/day 1.84 TM/user/day 334.03 Table 2: Comparison of file transfer (FT) and text message (TM) usage Page 22 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  23. Findings from the user study ➠ File transfer requests are less frequent than text messages ➠ Assumption: An IM connection is opened more often for text mes- saging than file transfer ➠ Also true for URL messages? ➠ We don’t know interesting user behavior e.g., how many users sent one or more files, the maximum number of files sent by a user Page 23 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  24. Comparing virus throttling to new proposals ➠ Throttling minimize the number of IM worm connections – a worm can establish a certain number of connections unchecked ➠ New proposals restrict only file transfers and URL messages, not IM connections (e.g. for text messages) – apparently more user- friendly ➠ Throttling connections is more effective than our techniques when connection establishment implicitly transfers user-configurable file data (e.g. MSN display picture file) ☞ Automatic file data transfer may not be a good idea Page 24 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  25. Concluding remarks ➠ Usability should be seriously considered – IM users are mostly ‘casual’ ➠ CAPTCHAs can be broken by machines ➠ New proposals presented here are preliminary Page 25 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

  26. Discussion. . . Page 26 Mohammad Mannan COMP 4108 Presentation - Sept 20, 2005

Recommend


More recommend