Worms Could Dodge Net traps 58
Danse writes "ZDNet reports that future worms could evade a network of early-warning sensors hidden across the Internet unless countermeasures are taken. According to papers presented at the Usenix Security Symposium, just as surveillance cameras are sometimes hidden the locations of the Internet sensors are kept secret. From the article: 'If the set of sensors is known, a malicious attacker could avoid the sensors entirely or could overwhelm the sensors with errant data.' A team of computer scientists from the University of Wisconsin wrote up the background in their award-winning paper titled 'Mapping Internet Sensors with Probe Response Attacks.'"
Conclusion = obvious (Score:5, Insightful)
Solution: Don't open holes and then fill them with trip wires. Just fill up the hole (via patch or otherwise) in the first place.
Re:Conclusion = obvious (Score:1)
Re:Conclusion = obvious (Score:4, Insightful)
Security isn't easy, and fixing holes with patches isn't easy. It takes time, skill and money. Placing a trip wire as a stop-gap measure is helpful, especially if the hole takes years to fix (without creating more holes).
If you can do better, then by all means do so. But the security war will never be won by those securing the systems.
But... (Score:2, Insightful)
Re:But... (Score:1)
Quick Summary (Score:5, Interesting)
So basically: "Security through Obscurity is Bad." combined with "We found a way to eliminate the obscurity.".
Re:Quick Summary (Score:3, Informative)
Sorry, but I'm not seeing where the obscurity is eliminated. The entire article basically says "It's easy to make Internet Network Sensors not work by easily identifying them (can be done in a week) and then avoiding them." The only solution the article offers is:
The threat could be diminished, both studies said, if the information in the networks' public reports was less detailed.
Which to me is saying "If the network's public information was obscured a
I wonder how long before... (Score:5, Insightful)
We already have a form of White IC - simple detection, non-aggressive measures. How long before we have more active Grey IC - Tar Babies (similar to today's honey pots), Tar Pits, Blaster - and ultimately, Black IC - seeking out the source of the intrusion and in turn, destroying the origin of attack?
Would a big, multi-national corporation get punished for "accidentally" frying the computer of someone who was thought to be intruding into the corporation's computers? I seriously doubt it.
Re:I wonder how long before... (Score:2)
However right you might be
Re:I wonder how long before... (Score:2)
Actually I nicked them from Shadowrun. :)
Even if you're not into Role Play Games, in particular pencil and paper ones, check out the section on the Matrix in Shadowrun - no, it's not a knock-off of the movie, Shadowrun was first written some time in the early to mid eighties.
Despite the computer models being very different from real life, a lot of the ideas for security and counter-security are things that seem to be popping up these days.
Apologies for bad definitions. It's been a while since I pl
Re:I wonder how long before... (Score:2)
I don't know what the timeline is, but Gibson is creditted with it first, and talks about Black ICE attacking hackers in Neuromancer and several other novels, where it can also kill people in the matrix. The system then goes on to follow a hacker around the physical world through various mechanations.
Re:I wonder how long before... (Score:2)
I'm familiar with Case, I've got Neuromancer, Count Zero, Mona Lisa Overdrive, and Burning Chrome. I did have All Tomorrow's Parties too but it disappeared one day from my flat.
It didn't click that FASA used Gibson's Matrix. They're similar, but I never thought to piece them together because Gibson's is more vague than the FASA extrapolation - but of course FASA's going to expand on it, they're making it into a "real" thing. :)
Here's a funny co-incedence (sp?). I was watching a documentary today on t
Re:I wonder how long before... (Score:2)
I said `an Aliens (3 I think) script with "Story By William Gibson" on it.'
During the documentary, called Alien Saga btw, you hear that there were a number of writers who submitted scripts, as well as William Gibson, and the man who's script was used, Joss Whedon.
Re:I wonder how long before... (Score:2)
Re:I wonder how long before... (Score:2)
It makes for a nice story, but how do you find the cracker's computer?
If you fry the computers who attack you, you have 99% of chance of frying the computers of guys who are only guilty of not having secured their PC enough..
And this *would not* be without consequence (assuming the corporation get caught).
Re:I wonder how long before... (Score:2)
That's one of the things I've been thinking about - unsecured, remotely controlled or pre-scripted drones being used as launch points for an attack.
Seriously, a corporation such as Monsanto, Microsoft, IBM, Nestle, Douwe-Egberts, wouldn't give a shit about who's attacking them, just stopping the attack.
If something comes to the publics attention, "It's jonesy's fault! He took personal, unauthorised measures to retaliate."
As a whole, The Corporation doesn't give a shit. It will "live on", so to spe
Re:I wonder how long before... (Score:2)
And why would jonesy accept to be a scapegoat in the ensuing trial?
If he has a brain, he kept traces of what he was ordered to do, for his own protection.
Plus you underestimate the effect of that bad publicity may have on companies.
Re:I wonder how long before... (Score:2)
I'm sure McDonalds wishes every time they spill coffee on someone that the "It was an accident!" and "I'm a big, multi-national corporation! Haven't you read any cyberpunk? We're above the law, and have private armies!" mattered a hill of beans to an ambulance-chaser with a license to sue. Or see burglers who sued after being injured in
Re:I wonder how long before... (Score:1)
Is that name serious? "Tar Babies"? I ask because it is also a racial slur intended as a play on the dark skin of black people. An older slur, but nonetheless still used (my redneck former boss used it frequently.)
Call me a p.c. asshole if you want, but if you grew up in the sout
Again?! (Score:4, Interesting)
How long will it take for people involved in computers and networks security that "secret" has no virtually no meaning in the field?
A private key is the only exception I can see at the moment: it is kept secret because nobody has any use of it except its owner, a noone will ever need access to it.
But how long a "secret" early-warning network will remain so... when its primary function is to be contacted by the worms that try to evade it?
--
Arkan
Re:Again?! (Score:4, Interesting)
I suppose it is arguable that load-balancing and fail-over systems are "secrets" in a sense, as external users aren't supposed to see that information, but I'd call them "null secrets" in the sense that they have no value even if you DID know them.
Presumably these early-warning systems are some kind of a mix of honey-pots and passive sniffers. If the worm is actually any good, it should be able to infiltrate a honey-pot and become stealthy (thus undetectable to anything inside the honey-pot). In that case, the system running the honey-pot would be able to detect an infection occured, but would NOT have reliable data on how or when.
As for passive sniffers, a polymorphic worm that can vary the loading code as well as the payload, OR a worm that is encrypted and can hijack some OS internal decrypt code, would get past such a sniffer. There'd be nothing the sniffer could identify.
The "ultimate" in malware would be some sort of hypervisor - similar in idea to Xen - that could "run" the host OS on top of itself. That way, nothing inside the OS could see it and all calls to the hardware that would reveal the malware could be trapped. Some early DOS boot sector viruses did something similar, copying the original boot sector to an empty sector somewhere else and then marking it bad to safeguard it. Any time a call was made to look at the boot sector, the call was trapped and the copy was returned instead of the real one.
The "ultimate" transport mechanism for malware would use a decoder built into the OS. The LZW code for GIF images, perhaps. Just something that would make it impossible for virus scanners in a mail server, or sniffers on a network, to use simple pattern recognition to identify it. You'd then need a buffer overflow you could exploit to take your newly decrypted malware into the system itself.
Image decoder exploits and buffer overflow exploits are well-known and have certainly been utilized in the past, though I'm not sure if in this way. Polymorphic code, designed to make identification strings next to impossible, has also been around a long time. I think the first polymorphic viruses appeared in the late 1980s and were certainly a significant cause of concern in the early 1990s.
Of course, if Cisco doesn't fix that IOS bug soon, it'll all be moot anyway. If you can just capture one Cisco router at a time, in a chain, you can set up tunnels to carry whatever you damn well feel like. An IPSec tunnel would be utterly opaque to any monitoring system anyone cared to deploy, no matter how sophisticated.
All in all, security through hidden monitors - security through several layers of obscurity - is no security at all, as it is simply too easy to bypass the layers involved and therefore the monitors, without having to know a damn thing about where the monitors are or even how they do the monitoring.
Passive scanning? (Score:1, Informative)
That would essentially make the device invisible - all you'd then have to do is have your network of passive detectors inform you when odd traffic passes through.
Re:Passive scanning? (Score:3, Informative)
What the paper refers to is sites that publish information about network traffic they see. Some print tables with statistics and others generate graphs of network traffic levels. Their technique is basically a way to map where the passive listening points are based on the traffic reports these sites create. They strategically generate traffic which creates measurable spikes, and these show up in the reports. They use this information to determine where the listeners are.
Re:Passive scanning? (Score:2)
Re:Passive scanning? (Score:2)
Re:Passive scanning? (Score:2)
I wonder if they're reporting all the traffic?? Maybe they're not, in order to funnel attackers into supposedly unwatched areas?? Heh, tinfoil hat time again...:)
Connotations? (Score:1)
The original penetration story:/ 200221&tid=172&tid=6 [slashdot.org]
http://books.slashdot.org/article.pl?sid=05/07/25
DSheild Discussion (Score:3, Informative)
For those of you who don't know, DShield [dshield.org] is precisely one of the 'early-warning sensor' networks the article is talking about.
Re:DSheild Discussion (Score:2)
Dynamic IPs and computers entering and/or leaving sensor networks complicate the case of mapping out the sensor network. Furthermore, in the real world not every probe package will be reported. Mapping out a subset of the sensor network and pollute it with false data is pretty easy. Mapping out the full network to avo
Re:Like in Zulu! (Score:1)
One could easily see a worm being released as a probe for a future zero-day worm, leading to a more robust worm archetype in the future.
After all, bagle/beagle went through multiple revisions, presumably each one drawing on the knowledge learned from watching the impact of the last one.
After all, if the "good guys" (white hats) can set up a honeynet, perhaps the "bad guys" (black hats) can send out a honeyworm to find said honeynets.
I can also think of several ways
Re:Like in Zulu! (Score:1)
Sort of like Strider HoneyMonkeys [usenix.org], only working for the Dark Side. (This was a Work In Progress report at USENIX).
Re:Like in Zulu! (Score:1)
Oh, yay. (Score:1)
wow (Score:2, Insightful)
i know an easy fix.. i see in the paper "bandwidth for the fractional T3 attacker and the OC6 attacker could be achieved by using around 250 and 2,500 cable modems".. i wish more cable ISPs were responsive to abuse complaints, or would notice certain bot-like activity like many DDoS attacks coming fr
Re:wow (Score:2)
Re:wow (Score:1)
U of W; more than Cheese... (Score:1)
That is to be expected (Score:5, Insightful)
Solution: Needs more sensors. (Score:2, Insightful)
Solution: Needs more sensors.
If the number of sensors is brought to the point where it becomes impractical to map them, voila no more sensor evasion.
This obviously would be harder to impliment than spoken. Maybe if a sensor implimentation came as an optional standard with server software.
Heh, I can speculate.
Re:Solution: Needs more sensors. (Score:2)
Sounds good until you consider that with massive deployment of sensors (especially those bundled with OS) it'd be impossible to manage them properly.
We could easily end up with compromised sensor network, hacker-induced fake alerts and god-know-what.
Or alternatively (Score:4, Insightful)
The number of companies getting fat over those needless insecurities is just gross...
You would like them to be that advanced (Score:3, Insightful)
In some cases (not always, unfortunately) this causes them to lose their account and thus their way to get replies and possible revenue.
What I would have liked is that they detected "when we send mail to this address we lose our account" and put that address on some blacklist to send no more scams.
But, this has not happened. So, I don't think there is any cleverness behind it, they just scatterbomb and hope the don't hit a whistleblower.
Internet-2 (Score:1)
We're talking all the time about security of internet,about net-monitoring
Please note that nobody complain about such solutions everyone believes that they're (or will be) elegant and helpful.
My questuion is..what do you think goverment(NSA) will do with such 'security tools' ha?
So we're not talking about security but we're also talking about Privacy and Freedom of internet-
Honeypot@home for distributed detection (Score:2)
Done well, it would create an int
Re:Honeypot@home for distributed detection (Score:2)
My brain is not working properly... (Score:1)
let's hope worm writers will adopt the techniques (Score:2)
I, for one, hope that these kinds of techniques will be widely adopted by worm writers. Why? Because it sets up an incentive system to have systems monitored and contri