22
111/06/15 1 Peer-to-peer system- based active worm attacks: Modeling, analysis and defense Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan Computer Communications 31 (2008)

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense

  • Upload
    aqua

  • View
    38

  • Download
    0

Embed Size (px)

DESCRIPTION

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan. Computer Communications 31 (2008). Outlines. Introduction Modeling P2P-based active worm attacks Analyzing P2P-based active worm attacks - PowerPoint PPT Presentation

Citation preview

Page 1: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

112/04/21 1

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense

Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan

Computer Communications 31 (2008)

Page 2: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

2112/04/21

Outlines

Introduction Modeling P2P-based active worm attacks Analyzing P2P-based active worm attacks Defending against P2P-based active worm attacks Performance evaluation Final remarks

Page 3: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Introduction

Automatically propagate themselves and compromise hosts in the Internet.

Traditional worms predominantly adopt the random-based scan approach to propagate.

A more powerful worm attack strategy is the hit-list strategy, which collects a list of IP addresses prior to the attack to improve success rate of infection.

P2P systems can be a potential vehicle for the attacker.

3112/04/21

Page 4: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Modeling P2P-based active worm attacks

In general, there are two stages in an active worm attack: (1) scanning the network to select victim hosts;

(2) infecting the victim after discovering its vulnerability.

Pure Random Scan (PRS) Only 24% of addresses in the Internet space are used.

4112/04/21

Page 5: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Offline P2P-based hit-list scan (OPHLS)

The attacker collects IP address information of the P2P system offline. We denote this as the hit-list of the attacker.

After obtaining the hit-list,, there are two phases of attack model:

First, all newly infected hosts continuously attack the hit-list until all hosts in the hit-list have been scanned (called the P2P system attack phase).

In the second phase, all infected hosts continue to attack the Internet via PRS.

5112/04/21

Page 6: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Online P2P-based scan (OPS)

The host immediately launches the attack on its P2P neighbors as a high priority (using 60% of its attack capability), and attack the rest of the Internet with its remaining capability (40%) via PRS.

Note that there are two types of P2P systems: structured and unstructured. In the OPHLS model, it is the same in both types of

systems, since the attacker predetermines the hit-list before attacks.

In the OPS model, the number of neighbors is quite different.

6112/04/21

Page 7: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Model parameters

(1) P2P system size: A Super-P2P system. The size is the total number of users, denoted as m. The

remaining hosts are a part of the Non-P2P system. (2) P2P structured/unstructured topology:

Structured: all P2P nodes maintain the similar number of neighbors (average topology degree is ).

Unstructured:

is the mean value of topology degree, is a constant for a given , and denotes the power law degree.

7112/04/21

Page 8: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

8112/04/21

Page 9: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

9112/04/21

Page 10: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Analyzing P2P-based active worm attacks

In the OPHLS attack model,

Recursive formulas:

10112/04/21

Page 11: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Analyzing P2P-based active worm attacks

In the OPS attack model,

11112/04/21

Page 12: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Defending against P2P-based active worm attacks Defense framework:

Control center: it can be a system deployed node, or a stable P2P node itself.

A number of volunteer defense hosts: worm detection and response.

Threshold-based and trend-based worm detection schemes.

Threshold-based scheme: simple and easy to apply,but high false alarm rates.

12112/04/21

Page 13: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Performance evaluation

<SYS; ATT; DE> SYS: ATT: , where

OPSS & OPUS: the Online P2P-based scan attack model for the structured and unstructured P2P system.

DE: , where

WB: denotes results obtained using simulations for the which one attack model.D: Trend-based detection (D1), Threshold-based detection(D2)

13112/04/21

Page 14: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Worm Attack Performance Comparision of All Attack Models

14112/04/21

Page 15: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

The Sensitivity of Attack Performance to P2P System Size

15112/04/21

Page 16: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

The Sensitivity of Attack Performance to P2P Topology Degree

16112/04/21

OPSS(degree #)

Page 17: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

The Sensitivity of Attack Performance to P2P Host Vulnerability

17112/04/21

Page 18: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

The Sensitivity of Defense Performance to Different Attack Models

18112/04/21

Page 19: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Sensitivity of Detection Time to Defense Host Ratio

19112/04/21

Page 20: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Sensitivity of Detection Time to Defense Region Size

20112/04/21

The defense region size g denotes a region with a group of P2P defense hosts within g P2P hops from the region leader.

Page 21: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Region False Alarm Rate vs. Host False Alarm Rate

21112/04/21

Page 22: Peer-to-peer system-based active worm attacks:  Modeling, analysis and defense

Final remarks

P2P systems are gaining rapid popularity in the Internet. We believe that P2P-based active worm attacks are very dangerous threats for rapid worm propagation and infection.

Model and analyze P2P-based active worm propagation.

Design effective defense strategies against them. An offline P2P-based hit-list attack model (OPHLS)

and an online P2P-based attack model (OPS).

22112/04/21