25
Virus Detection System VDS [email protected]

Virus Detection System

Embed Size (px)

Citation preview

Page 1: Virus Detection System

Virus Detection System

VDS

[email protected]

Page 2: Virus Detection System

Outline

The virus trends of 2004

Qualities of an IDS

Mechanisms of a VDS

Data processing

Page 3: Virus Detection System

20047 new kinds of virus in 2004

PE

2% worm

11% Script virus

1%

Trojan

45% UNIX

0%

Virus writing generation

tool

2%

Back Door

20%

黑客工具

6%

AD/Erotic pieces

3%

Other

10%

Page 4: Virus Detection System

Outline

The virus trends of 2004

Qualities of an IDS

Mechanisms of a VDS

Data processing

Page 5: Virus Detection System

How a traditional IDS works

Meticulous protocol analysis

Lightweight rule set

No more than 500 records in a rule set.

Page 6: Virus Detection System

Unitary software designing

Unitary design: In the case of dealing with an extensive complicated incident, we should classify the events and unify one or more of the processing modules by using an extensible data structure and data set.

AV Ware: Scan target object’s divergence.

IDS: Protocol’s divergence.

Page 7: Virus Detection System

AVML and Snort

Echo virus(id=”B00801”;type=”Backdoor”;os=”Win32”;format=”pe”;name=”bo”;version=”a”;size=”124928”;Port_listen=on[31337];content=|81EC0805000083BC240C05000000535657557D148B8424240500008BAC242005000050E9950500000F85800500008B|;delmark=1) alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"Backdoor.bo.a Upload"; content: |81EC0805000083BC240C05000000535657557D148B8424240500008BAC242005000050E9950500000F85800500008B |;) alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"Backdoor.bo.a Copy"; content: |81EC0805000083BC240C05000000535657557D148B8424240500008BAC242005000050E9950500000F85800500008B |;)。

Page 8: Virus Detection System

Redundant scans caused by

divergence

Transfer

character

rules

FTP

rulesNETBIOS

rules

Page 9: Virus Detection System

Rule set scaling pressure

Besides worms, there are over 20,000 Trojans, Backdoors, etc… which transfer over the network.

The corresponding rule quantity may exceed 30,000 records.

type quantity

Email worm 2807

IM-worm 172

P2P-worm 1007

IRC-worm 715

Other worm 675

total 5376

Page 10: Virus Detection System

Outline

The virus trends of 2004

Qualities of an IDS

Mechanisms of a VDS

Data processing

Page 11: Virus Detection System

Algorithm optimization(1)

The influence of record quantity on record matching time

0

500

1000

1500

2000

2500

3000

3500

4000

4500

5000

0

1500

3000

4500

6000

7500

9000

1050

0

1200

0

1350

0

1500

0

1650

0

1800

0

1950

0

2100

0

2250

0

2400

0

records

durt

ation(m

s)

When the quantity of rules

is less than 6,000, it is not

obvious that time

increases linearly with

record count. But after

about 10,000 records, that

begins to change, causing

a sudden drop in

performance up until it is

simply unavailable。

Page 12: Virus Detection System

Algorithm optimization (2) The scanning speed is also affected by the data being matched and the quality of the patterns.

木马检验网络数据

0

1000

2000

3000

4000

5000

6000

0

15

00

30

00

45

00

60

00

75

00

90

00

10

50

0

12

00

0

13

50

0

15

00

0

16

50

0

18

00

0

19

50

0

21

00

0

22

50

0

24

00

0

records

dura

tion (

ms)

实际规则检测网络数据

实际规则检测随机数据

随机规则检测网络数据

Scan methods’ and data objects’ influence on the speed

Page 13: Virus Detection System

Algorithm optimization (3)

Influence on efficiency caused by limiting the approximation of the virus’ characteristics

0

200

400

600

800

1000

12005

00

20

00

35

00

50

00

65

00

80

00

95

00

11

00

0

12

50

0

14

00

0

15

50

0

17

00

0

18

50

0

20

00

0

21

50

0

23

00

0

24

50

0

26

00

0

27

50

0

29

00

0

records

speed(k

b/s

)

original improved

Page 14: Virus Detection System

Key method of designing VDS

The Unitary Model focuses on matching speed and matching granularity — matching is of foremost importance. Network traffic data is classified into three types:data matched on the binary level, data needing pre-treatment and data needing specific algorithms。

Page 15: Virus Detection System

Data flow direction and

the Level of virus detection

Divided into 4 levels: collection, divergence, detection and processing

Provides package scanning, incomplete data scanning And complete data scanning.

Data collection

level

Data diffluence

level

Virus scan

level

Event process

levelS

trea

m s

can

Com

plet

e D

ataf

low

(F

ile)

Sca

n

Sni

ffer

Pro

coto

l ta

g tr

ansf

er

Pro

toco

l an

alys

is a

nd

diff

luen

ce

pret

reat

men

t

Package scan

Dat

a lo

g /

Pro

cess

bac

ksta

ge

Cro

ss v

erif

icat

ion

Page 16: Virus Detection System

System structure

Page 17: Virus Detection System

Data efficiency

Virus data output from Harbin Institute of Technology on

July 8 , 2003.

Page 18: Virus Detection System

Statistics from the 26th week of 2005

Page 19: Virus Detection System

Unknown virus forewarning system

Detected an unknown worm (I-Worm.Unknow) increasing notably on June 5, 2003. On June 6 it was shown to be the virus I-worm.sobig.f.

Page 20: Virus Detection System

Outline

The virus trends of 2004

Qualities of an IDS

Mechanisms of a VDS

Data processing

Page 21: Virus Detection System

Event Processing ( 1 ) Detection Events Description Language (DEDL).

We use descriptors to define standard formats for network events and make them support other formats

Defined elements: event type, event ID, source IP, target IP, event time, and so on. More than 20 such key elements.

Processing methods

Tech-based Internal combine

Parallel combine

Analysis-based Parallel combine

Radiant combine

Convergence combine

Chain combine

Page 22: Virus Detection System

Event Processing ( 2 )

If existNet_Action(RPC_Exploit)[IP(1)->IP(2);time(1)]

Net_Action(RPC_Exploit) [IP(2)->IP(3) ;time(2)]

and

time(2)>time(1)

than

Net_Action(RPC_Exploit) [IP(1)-> IP(2) -> IP(3)]

Page 23: Virus Detection System

Behavior Classifications DEDL events AVML diagnostic behavior regulations

Net_Action(act)[IP(1),IP(2):445; ;time(1)]

Net_Action(act)[IP(1),IP(3):445; ;time(1)]

….

Net_Action(act)[IP(1),IP(12):445; ;time(1)]

Net_Action(Trans,Worm.Win32.Dvldr)[IP(1)->IP(12);time(1)]

Virus_act_lib

Virus

seek(id=”W02872”;dport=139,445;trans=ne

tbios)

Page 24: Virus Detection System

Data processing

NODE A NODE B

IRC SERVER

NODE C

IRC Connection

IRC Connection

IRC SERVER2 IRC SERVER3

IRC C

onnection

IRC Connection

NODE D

IRC Connection

Node A Node BVirus.A

Virus.A

Virus.A

Virus.A

Virus.A

Page 25: Virus Detection System

Thoughts

Network virus monitoring has been explored academically and productively. It has now expanded into a new technology with its own direction.

The path of virus defense leads us to the world of freedom.