Defense and Detection Against Internet Worms 142
Defense and Detection Strategies against Internet Worms | |
author | Jose Nazario |
pages | 322 |
publisher | Artech House |
rating | 10 |
reviewer | Duncan Lowne |
ISBN | 1580535372 |
summary | This book provides a solid approach toward detection and mitigation of worm-based attacks. |
Publishing a book on a subject as dynamic as internet worms can never result in a complete volume. The near-weekly outbreaks of modified versions of old worms and completely new designs is enough to frustrate the efforts of even the most prolific anti-virus software developers, let alone those who try to provide an overview of their study.
Nevertheless, Nazario accomplishes a clear and concise summary of the state of worms today. Seeded by a paper ('The Future of Internet Worms', Nazario, Anderson, Connelly, Wash) written in 2001, Defense and Detection Strategies against Internet Worms encourages the reader to focus on the directions worm development might take in the future, with a specific view toward anticipation of, and prepartion for, future attacks.
The book begins with a discussion of the departure worms take from traditional computer virii. An outline of the benefits for the black-hat toward a worm-based attack, as well as a brief analysis of the threat model posed by worms, provide ample reason for the computer security professional to take the study of internet worms very seriously.
Beyond this introduction, the book is laid out in four major sections. The first introduces to the reader some background information crucial to the study of worms. The author discusses the history and taxonomy of past worm outbreaks, from their sci-fi origins (think John Brunner's Shockwave Rider) through modern-day outbreaks. A thorough analysis of various worms' traffic patterns is presented, with data broken down by infection rates, number of infected hosts, and number of sources probing specific subnets. Finally, the construction and lifecycle of worms are presented, with particular attention paid to the interaction between the worms' propagation techniques and the progression of their lifecycles.
The second section of the book (ch. 6 - 8) studies the trends exhibited by past worm outbreaks. Beginning with an examination of the processes and mechanisms of infection, it progresses on to a survey of the network topologies generated by a worm's distribution. Specific infection patterns are examined, along with case studies of worm outbreaks that have exhibited such patterns. Further, this section examines the common characteristics of vulnerable targets, from older UNIX and VMS mainframes through desktop systems onward to infrastructure equipment and embedded systems. A discussion of the payload transmission methods that have made recent worm attacks so devastatingly effective, and an explaination of why liberal use of a clue-hammer on users is not by itself enough to control and prevent further outbreaks, complement chapter nine's analysis and speculation of the future of internet worms.
Section three (ch. 9 - 11) focuses on worm detection strategies, and is more distinctly aimed at the already-overworked network security professional. Effective methods of detecting scans and analyzing a worm's scan engine are presented with a focus on timely and efficient protection from further infection. Monitoring techniques for quickly recognizing, analyzing and responding to worm outbreaks leads into a detailed description of well-placed honeypots and dark network monitors ("black holes"). Discussion of the (so-far) most effective method of worm detection, signature analysis, completes the section, and covers host-based and logfile signatures, along with a brief overview of analyzing logfiles using commonly available utilities.
The final section of the book (ch. 12 - 16), per the book's namesake, aims at defense strategies against worm outbreaks. Beginning with the obvious first steps which anyone reading the book ought to have implemented (firewalls, virus detection software, sandboxing, and patching-patching-patching), the section progresses into less widely used but equally important proxy-based defense methods, and continues on to cover slowing down infection rates and fighting back against existing worm networks. For the sake of thoroughness, an overview of the legal implications of attacking worm nodes receives its fair share of attention simply to alert the reader of the potential pitfalls of proactive defense.
Defense and Detection Strategies against Internet Worms is decidedly aimed at the experienced network security professional, but holds a much broader appeal than most technical books. With its thorough historical analysis of worm progression over the past thirty years, anyone with even a remote interest in the past, present or future of the only network security issues to consistently make headlines in the mainstream press will find this both an entertaining and enlightening read. Overall, it makes a valuable addition to any geek's bookshelf.
You can purchase Defense and Detection Strategies against Internet Worms from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
same price and free shipping (Score:2, Informative)
Some cheaper copies are available from the Amazon marketplace users.
Re:same price and free shipping (Score:1)
Re:same price and free shipping (Score:1)
I wonder.... (Score:1)
Re:I wonder.... (Score:1)
Re:I wonder.... (Score:1)
For a better price (Score:1, Informative)
Amazon links (Score:4, Interesting)
Re:Amazon links (Score:3, Informative)
"Speaking of links, please do not include personalized or "affiliate" links (to online bookstores, for instance) in your reviews. Slashdot has an agreement with Barnes & Noble; this is one way that Slashdot makes money, stays in business, etc. That's why when bn.com carries a particular book, you'll see a link to it at the bottom of the review."
referral links etc. (Score:1)
Actually, links like the ones included with your review aren't the real problem. In a very slightly different universe, they'd have been completely fine. Yes, bn.com affliliate links are good for us (Slashdot), both for consistency (good to always have a link at the bottom to the reviewed book so people can find it, and confusing to have more than one) and because they make the site some small amount of money, but the bigger reason to me for not allowing affiliate links is to prevent abuse.
Allowi
Re:Amazon links (Score:1)
Re:Amazon links (Score:2)
And can the bullshit about its being "informative". Everyone knows that Amazon.com sells books, and if I were seriously interested in buying this one, I'd check the price myself.
Find a respectable, non-destructive way to make money.
Re:Amazon links (Score:2)
The world is being polluted on a grand scale by advertisers, because each individually has the shortsightedness you just demonstrated. You should consider whether your actions are appropriate for society, regardless of the legality/profitability of said
Re:Amazon links (Score:2)
Society expects people to take reasonable steps to protect themselves. While it may a shame that you can't leave your doors open with diamonds laying around on your hall table and return home to find them safe and sound, most will still say it is common sense to lock the door. The same would apply here; you have several options for dealing with him, aside from expressing your disg
Re:Amazon links (Score:1)
The best defense... (Score:3, Funny)
And I'm sure that if I were a smarter man, I could figure out how that applies here.
Blogzine [blogzine.net]
Re:The best defense... (Score:1)
Re:The best defense... (Score:2)
props to Dr. Nazario (Score:1, Interesting)
Re:props to Dr. Nazario (Score:2, Informative)
Re:props to Dr. Nazario (Score:1)
Re:props to Dr. Nazario (Score:2)
Re:props to Dr. Nazario (Score:1)
Re:props to Dr. Nazario (Score:1)
Defense against the Dark Arts (Score:1)
Wasn't the author previously a Defense Against the Dark Arts teacher at Hogwarts?
---
I type this every time.
NIST Research on I-Worms (Score:5, Interesting)
Porn sites. Given how shady those guys are, this leaves me really hoping that they've got the sense to keep their systems secure.
-JT
Re:NIST Research on I-Worms (Score:2)
I have often wondered what would happen if such a similiar outbreak happened on a service network such as AOL or MSN. I was thinking in terms of the amount of non-tech/security savvy users.
As seems to be the case with operating systems, the more popular, the bigger the target.
Kinda sounds like Defense Against the Dark Arts! (Score:3, Interesting)
But this all does seem to be more and more like a battle between good (computer users) and evil (worm/virus programmers). How bad will it get when we have everything electronic talking to everything else electronic? Soon you will only need to be within 10 feet of something to get attacked by a worm or virus!
Re:Kinda sounds like Defense Against the Dark Arts (Score:3, Informative)
Hermione really does say that. Check in book 4, where Harry is trying to figure out how Rita Skeeter is finding out loads of stuff about Hagrid, and he's going through the list of ways Rita could spy on Hogwarts without being detected. One of the things he mentions is an electronic bug, at which point Hermione butts in and says how electronic stuff won't work near Hogwar
Re:Kinda sounds like Defense Against the Dark Arts (Score:3, Funny)
Isn't that what BlueTooth is for?
Re:Kinda sounds like Defense Against the Dark Arts (Score:2)
witchcraft is just an alias to technology (Score:2)
always was.
Technology is the application of your knowledge of nature to modify it.
Magic, wether by people or "supernatural beings" (lovely oxymoron, that) is exactly the same, only with modified laws of nature.
The difference, I believe, is that science and tech are more democratic:
A normal person can, with a lot of work and help, understand and apply
some of the basic principles.
On the contrary, muggles and squibs just can't perform magic no matter
How hard they'll work.
$85? (Score:4, Insightful)
But seriously, all of know already what we SHOULD do, it's just that we don't do it. How many people regularly work on their computer using an admin-level account, doing stuff that doesn't require admin level access? Far too many people do this, even techies.
I do everyday work logged onto a Limited account on Win XP, although I admit, it's a real pain to have to login to the root account to download an ActiveX control, configure hardware, do Windows Update, norton antivirus update, etc. But I do because I know it's safer to only use an admin level account when that type of access is required.
How many people do that? How many techies do that? How many college students in some tech-illiterate college (ex Liberal arts type majors) do this? What we need isn't a book, it's a good kick in the pants to force us to adopt good safety measures.
Chapter 1: Firewall (Score:1)
Step 1: Get a firewall.
Step 2: Close all the ports you don't use.
Simple huh?
Re:$85? (Score:2)
I'm always logged in as me. Never as root. If I *need* root access, it's about 4 seconds away via 'su'. Why run the risk ?
Perhaps a difference between linux/win32 ?
Simon.
sudo is better than su (Score:2, Interesting)
Non-Admin Accounts (Score:1)
Too many developers for windows boxes (and I am one) have admin access to the development machine so they never have to think about security until someone tries to install their software in a locked down environment.
Synopsis: (Score:1, Funny)
My cheap shot at M$ for today: (Score:1)
Jesus H Christ! The first chapter is 7,328 pages, over three volumes!
what's worse than finding a worm in your apple? (Score:1)
More stupid worm jokes to follow...
Re:what's worse than finding a worm in your apple? (Score:1)
Having your genitals wired to the mains.
--
Re:what's worse than finding a worm in your apple? (Score:1)
What's the point ? (Score:5, Insightful)
The vast majority of worms spread via unmaintained systems. There is the occasional (one comes to mind) worm that exploited a novel problem, but most worms exploit already-patched issues. The problem is "admins" not maintaining the security level of their systems.
Unless basic security levels are increased (home users on ADSL/Cable modems without firewalls spring to mind) then worms (nefarious or otherwise) are going to be a problem, and the good Doctor's book may well aid in tracking down the perpetrator, but sadly, there seem to be an inexhaustible supply of them
Depressed.
Simon.
Re:What's the point ? (Score:3, Interesting)
Do yourself an Xmas favour then (Score:4, Funny)
Leave gift-wrapped in the vicinity of the bathroom. It may take awhile, but eventually somebody will probably pick it up and start perusing (bathroom is the best place to plant reading material). If you're lucky, they may find it interesting, or at least stay long enough to catch some important points.
Oh, and if you want, you could speed up the reading process by also lacing the Xmas cookies/etc with a little X-lax icing.
Re:Do yourself an Xmas favour then (Score:2)
That's just nasty
Simon.
Re:What's the point ? (Score:3, Insightful)
You ask the right question: "What's the point?" and show that you indeed don't see the point.
Yes, the worms travel via insecure systems. It may be taken as a given that there are and always will be insecure systems. If the sole approach taken is "secure the systems" then the worm authors will always win - no effective countermeasures are being taken, will be taken. That is the point, IMHO.
The worms (including worms that create spam zombies)
Internet Worm FAQ (Score:3, Informative)
http://www.networm.org/faq/ [networm.org]
Something worth publicising ... (Score:3, Interesting)
Oddly, under the Bush administration, there has been a massive contraction in research funding into Internet Security.
It would be interesting to see details of this charge. Is it really true? If so, we should be publicising it.
Contrary to much of the marketing hype, the Internet was in fact developed primarily with US government funding. DoD funding, in particular, through (D)ARPA.
The commercial world is trying to take credit, but they did very little to hel
Fools! Without worms there would be no spice! (Score:1)
Antivirus/Security software (Score:2)
Anyone got some feedback on this, or perhaps whether the book covers good apps in significant depth?
Re:Antivirus/Security software (Score:1)
I see little other discussion of worm prevention and treatment. Has everyone else totally solved this major problem? How do you cope with people like my manager, who says that he will never install updates because it stops his applications from working?
Network Protection is easy with the right tools (Score:1)
To protect against worms ... (Score:1)
Chickens (Score:1)
how about helping isps stop worms? (Score:1)
it seems like all the big time worms look the same to the network, cause each one uses the same vulnerability over and over. that means that the packets hit the same port, so you could just look at the port number in the header.
not only that, but so far worms aren't self-modifying (does that mean they're reentrant or non-reentrant? i always get that mixed up). that means th
Re:And no matter how many worms (Score:2, Flamebait)
Windows.
There's food for thought.
I think this is more like junk food for thought (say, like cotton candy): not much substance, and if it is all you ever eat, your brain will starve. The only reason we see swarms of worms on windows is it is the number one used platform of home users who download stuff willy-nilly, as well as read their email using outlook.
Re:And no matter how many worms (Score:1)
Re:And no matter how many worms (Score:2)
I know to take everything MS says at face value, but isn't that what they claim to be doing now?
Re:And no matter how many worms (Score:2)
Indeed, and for me, just running Linux doesn't go far enough. My webserver is running a relatively obscure (but secure) httpd on a relatively obscure (but secure) OS on a relatively obscure hardware platform. Further, the httpd is running as nobody in a chroot jail, and is behind a DMZ with no access to the outside Internet, let alo
Re:And no matter how many worms (Score:2)
<SIGH/> Time to debunk this argument once again.
The most blatantly-obvious counter example is web servers. These are tremendously attractive to attackers, for obvious reasons, and a lot of web sites have been defaced or brought down by security holes in the web server.
The main web server is apache. It is on nearly three times as many sites as Microsoft's IIS server, the second-place server. But almost all
Re:And no matter how many worms (Score:3, Interesting)
Nah; I clearly recall being bemused by the release (on a couple of newsgroups) of PDP-11 and VAX worms and viri in '83. I know it was that year, because I know where I was working when they came out. I don't recall that we gave them official names then, though.
Needless to say, when the proof-of-concept was published, the main reaction back then was to study them, figure out how to prevent such things "in the wild", and tell the vendors in no uncertain terms t
First virus and first worm (Score:2, Interesting)
In 1981-1982 the first computer virus, Elk Cloner [skrenta.com], started spreading in the wild but it was not until 1983 when Fred Cohen finally proved [all.net] that the concept of a computer virus was viable. To my best knowledge the first worm spreading in the wild was IBM Christmas Worm in 1987 and the first Internet worm was Robert T. Morris' Worm [textfiles.com] in 1988.
Re:And no matter how many worms (Score:1, Interesting)
That's an excerpt from a chapter of _Dealers of Lightning_ an account of Xerox Parc. According to that, it's the first network worm that has been accounted for (1978), albeit it was more like a benevolent worm that got a bug, rather than a malevolent one. Good reading in either event; jose actually reviewed the book for slashdot some time ago.
The 1983 stuff you mention is likely Cohen's initial research work, there have been some other worthwhile papers/talks
Re:And no matter how many worms (Score:2, Interesting)
Of course, that worm didn't do any damage, IIRC. And it took advantage of one of the things Apple copied from Microsoft, which may explain why they're now hesitant to add things to OSX that "have been in Windows for ages."
But worms are certainly NOT a Windows-only problem.
Re:And no matter how many worms (Score:2)
Funny thing, is. No matter how many people I hear say that (as a matter of fact the more people say that). The more logic says that when it happens it will DEVASTATE the community of leet wannabe linux dorks. The people who are serious networking types that use Linux already CAN AND DO take proactive measures to detect, minimize the possible damage. But I pity the penguin when someone writes a blas
Re:Reason wins over Christian fanaticism (Score:2)
This isn't an insult/attack, but that is plainly obvious, considering what follows.
> the majority of Americans believe that you cannot be a good person if you don't believe in [...] God.
Wherever you read that is lieing or misinformed. The majority of Americans don't care what religion you are. I've been an atheist for about 6 years, and have no problem telling anyone this and have never received a negative reply, or any indication that I'm a bad person. I even li
Gteat! But I'm a bit puzzled ... (Score:2)
Yes, I've RtFTC (Read the F***ing Ten Commandments), and maybe I'm being dense, but I don't see anything there that is applicable to Internet worms. Not even the wildest metaphorical stretch seems to make any of them fit.
Maybe some kind soul can enlighten me
Re:Gteat! But I'm a bit puzzled ... (Score:2)
10 Comm: 2. Thou shalt not take the name of the Lord thy God in vain.
Now, me: "God Damn it! There's ANOTHER GOD DAMN worm loose, taking my servers to a crawl! Who do I have to smite to stop this crap?"
10C: 3. Remember thou keep the Sabbath Day.
Me: "Man, I hate coming in Sundays to fix these stupid PCs."
10C: 5. Thou shalt not kill.
Me: "If I ever catch the sonofabitch who wrote this thing..."
10C: 10.
Re:Great! But I'm a bit puzzled ... (Score:2)
So I guess it wasn't OT after all.
Re:Reason wins over Christian fanaticism (Score:2)
When it includes "Thou shalt have no God above me," that pretty much limits it to religion. If those kinds of things weren't on it, I wouldn't care. Unfortunately, with that one line, it should not be displayed on public property.
(OT) Re:I can't (Score:1)