IEEE Paper Template in A4 (V1)

advertisement
Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011)
A NEW MALWARE ATTACK PATTERN
GENERALIZATION
Robiah Y., Siti Rahayu S., Shahrin Sahib, Mohd Zaki M., Faizal M. A., Marliza R.
Faculty of Information and Communication Technology
Univeristi Teknikal Malaysia Melaka,
Durian Tunggal, Melaka,
Malaysia
Abstract— The significant threats of malware are still
continuing due to their rapid distribution nature on the
internet. The malware attack pattern from nine different
attack scenarios have been extracted from various logs at
different OSI layers such as victim logs, attacker logs and IDS
alert log. These malware attack pattern are further analyzed to
form the general malware attack pattern which describes the
process of malware infection. This paper proposes a general
attack pattern for malware in three different perspectives
which is attacker, victim and victim/attacker or multi-step
attack using only traditional worm variant. Hence, the general
malware attack pattern can be extended into research areas in
alert correlation and computer forensic investigation.
According to [3], generally malware is consists of three
types of malware of the same level as depicted in Fig. 1
which are virus, worm and Trojan horse.
Malware
Virus
Trojan
Worm
Index Terms — malware attack pattern, log, malware attack
Fig. 1. General Malware Taxonomy by Karresand
I. INTRODUCTION
It is essential to identify the dynamic propagation of the
current malware infection so as to protect us against the
attack of the future malware. Their fast spreading character
in exploiting the vulnerability of the operating system has
threatened the services offered on the internet. Thus, there is
a need to find a solution to detect and predict the propagation
of the malware.
This paper propose the general malware attack pattern for
detecting and predicting the malware by examining the
various OSI layer’s log from the malware source and the
other machine that are infected with it and investigate the
evidence leave by the attacker which is considered as the
attack pattern. For the purpose of this paper, the researchers
have select nine scenarios: scenario A to scenario I; and used
Blaster, Sasser and Lovesan.T variants during the experiment.
This attack pattern is based on the fingerprint of these three
variants’ attack on victim’s logs, attacker’s logs and
Intrusion Detection System (IDS) alert’s log.
II. RELATED WORK
A. What is Malware?
Malware is a program that has malicious intention as
mentioned by [1]. Nevertheless [2] has defined it as a
generic term that encompasses viruses, Trojans, spywares
and other intrusive codes. The malware implies malice of
forethought by malware inventor and its intention is to
destroy a system. Moreover, malware even if it has
destructive consequences, is not a defect in a legitimate
software program.
For the purpose of this paper, the researchers have scope
the malware to traditional worms. This is due to the fact that
these types of worm are still persistent in internet as claimed
by [4] and [5]; and hence they are selected for further
research. According to [6], worm taxonomy can be further
categorized into four types of worms which are traditional
worm, e-mail worms, windows file sharing worm and hybrid
worm. The most well-known traditional worms such as
Blaster, Sasser, Code Red and Slammer, are the main threats
to the security of the internet. Thus, the researchers have
selected Blaster, Sasser and Lovesan.T variants for the
experiment.
The Blaster worm launch on August, 11th 2003 infected at
least 100,000 Microsoft Windows systems and cost millions
in damage. In spite of cleanup efforts, an anti-worm, and a
removal tool from Microsoft, the worm persists [6].
Meanwhile, Sasser was first noticed to spread on April 30th,
2004 and then Lovesan.T is another name for Blaster with
variant T has been found on 21st April 2004 and has similar
scanning characteristics with Sasser but different malware
code. Most of these computer worms affect computers
running vulnerable versions of Windows XP and Windows
2000 and have the potential to generate the multi-step attack
which can increase the recovery cost of the infected system
and would initiate serious cyber crimes.
Blaster worms spreads by exploiting DCOM RPC
vulnerability in Microsoft Windows as described in
Microsoft Security Bulletin MS03-026. The worms scan
port 135 on random subnets in sequential or random order,
and the target are the discovered systems. The exploit code
opens a backdoor on TCP port 4444 and instructing them to
download and execute the file MSBLAST.EXE from a remote
system via Trivial File Transfer Protocol (TFTP) on UDP
Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011)
port 69 to the %WinDir%\system32 directory of the infected
system and execute it as stated by [7]. The goal of the
Blaster attacker is to make the system unstable by
terminating the RPC services and causes the system to reboot.
Meanwhile, Sasser spreads it code by exploiting a buffer
overflows in the component known as LSASS (Local Security
Authority Subsystem Service) on the affected operating
systems.
This malware scans different ranges of IP
addresses and connects to victim’s computers primarily
through TCP port 445 and it may also spread through port
139.
B. What Is Attack Pattern?
An attack pattern is a method to cause an exploit against
software used by attackers as stated by [8]. It is a systematic
explanation of the attack goals and attack strategies for
defending against attack. Moreover [9] has described that an
attack pattern as the steps in a generic attack, while [10] has
clarify the term attack pattern as the attack steps, attack goal,
pre-conditions and post-conditions of an attack. Thus, an
attack pattern is recognized as one of the important element
to protect from any potential attack. Subsequently, [11] and
[12] have discussed on issues related to how the attack is
performed, the attack goals, how to defences against the
attack and how to trace once it has occurred. Nevertheless,
based on the research, the victim’s perspective is not
considered as the focus is on the attacker’s perspective only.
Thus, in this research, the researchers has proposed the attack
patterns that focus on the attacker’s, victim’s and
attacker/victim’s (multi-step) perspectives to present a
logical perception on how the attack is accomplished and the
effect caused by the attack.
III. ATTACK SCENARIO
In this experiment, nine attack scenarios: scenario A to
scenario I are designed using the framework which consists
of four phases: Network Environment Setup, Attack
Activation, Log Collection and Log Analysis as described in
[13]. The attack scenario A, B, C for Blaster attack can be
referred to [14] and scenario D, E, F for Sasser attack can be
referred to [15]. Each attack scenario is attained through
thorough log analysis.
The diverse logs involve in this analysis are divided into
two categories which are host logs and network logs. The
host logs categories: personal firewall log, security log,
system log, application log and network logs categories: alert
log by IDS. The sample of scenario G for Lovesan.T attack
is as shown in Fig. 2 where the analysis of scenario G shows
that the Lovesan.T attack is activated in Selamat and this
host has successfully exploited hosts Mohd, but partially has
exploited Ramly. Subsequently, hosts Mohd which has been
previously exploited by Selamat has organized an attack on
host Abdollah and this attack is called multi-step attack.
Later on, Abdollah attacks Sahib and then Sahib attacks
Tarmizi.
In this attack scenario, the hosts that are marked with 135,
4444, 69 and 3xxx shows that it has been successfully
exploited by the attacker and this host has been infected. In
this case, port 3xxx is port 3033 and it is the communication
port use between Selamat and Mohd. Port 3xxx is generated
randomly by this variant as it can be any number from 3000
to 3999. Hence, similar to Sasser.B’s attack, the researcher
has decided to call this port as 3xxx. Meanwhile, those
marks with port 135 shows the attacker is trying to
communicate with the victims by scanning the victim’s IP
address.
IV. ANALYSIS AND FINDINGS
The nine attack scenarios are further analysed and the
example of the detail analysis can be referred to [13] and [14]
and the findings from this analysis are used as the primary
guideline in developing the general malware attack pattern.
These attack patterns are constructed in three different
perspectives: attacker, victim and victim/attacker or multistep attack. The details of these perspectives are elaborated
in the following sub-sections.
A. Analysis of General Malware Attack Pattern in Attacker
Perspective
In the attacker perspective, there is significant attack
pattern found in the analysis of this general malware’s
attacker pattern and its summary is shown in TABLE I.
TABLE I
Summary on general malware’s attacker pattern
(attributes found=√, attributes not found=nil)
Perspective
Attack
Log Name
Steps
Personal
Firewall
Action
Protocol
Destination Port
IDS Alert
Error Message
Scan
Attacker
Fig. 2
Lovesan.T attack in scenario G which consists of first
step and multi-step of attack
Attributes
Action
Personal
Exploit
Protocol
Firewall
Destination Port
Event ID
Security
Image File Name
Event ID
Impact System
Event Message
/Effect
Event ID
Application
Event Message
IDS Alert Source IP Address
General Malware
General General General
Attacker Pattern
Blaster.A Sasser.B Lovesan.T
Attacker Attacker Attacker
Data
Pattern Pattern Pattern detected Log Attributes
Action
Protocol
√
√
√
√
Destination Port
√
√
√
√
√
√
√
√
√
√
√
√
Nil
√
√
√
Nil
√
Nil
√
√
√
√
√
Error Message
Action
Protocol
Destination Port
Event ID
Image Filename
Event ID
Event Message
Event ID
Event Message
Source IP Address
Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011)
With reference to TABLE I, the data detected in
attacker’s personal firewall log for all malware’s scenario
have similar log attributes which are action, protocol and
destination port. Therefore, the generalized log attributes for
scan and exploits attack steps are action, protocol and
destination port. Meanwhile, in the attacker’s security log
the log attributes selected are event id and image filename.
For system log, the data can only be detected in Sasser.B’s
and Lovesan.T’s scenario; and, application log can only be
found in Sasser.B’s scenario.
However, the researcher has decided to consider the
availability of the data detected in the general malware
attacker pattern due to the fact that both logs are not
necessarily generated once it is being infected by the
malware, unless the device is restarted.
Hence, the
generalized log attributes for both logs are event id and event
message. In the IDS alert log, the data detected in all
malware’s scenario are similar, thus the generalized log
attributes are error message and source IP address.
C. Analysis Of Malware Attack Pattern in Multi-Step
(Victim/Attacker) Perspective
The multi-step attacker’s data have been detected in all
malware’s scenario. The summary of the general multi-step
attacker pattern is represented in TABLE III and the details
of the multi-step attacker’s logs are discussed.
TABLE III
Summary on general malware’s multi-step attacker
(victim/attacker) pattern
(attributes found=√, attributes not found=nil)
Attack
Perspective
Log Name
Steps
VICTIM/ATTACKER
Scan
Personal
Firewall
IDS Alert
B. Analysis of Malware Attack Pattern in Victim
Perspective
In victim perspective, there is significant attack pattern
found in the analysis of this general malware’s victim pattern
and the summary of the victim pattern is shown in TABLE II
and the details are discussed.
TABLE II
Summary on general malware’s victim pattern
(attributes found=√, attributes not found=nil)
Perspective
Attack
Log Name
Steps
Victim
Action
Scan
Protocol
Destination Port
Action
Personal
Protocol
Exploit Firewall
Destination Port
IDS Alert Error Message
Event ID
Security
Image File Name
Event ID
System
Event Message
Impact/
Event ID
Effect Application
Event Message
Source IP Address
IDS Alert Destination IP Address
Destination Port
Personal
Firewall
Attributes
General
Blaster.A
Victim
Pattern
General
Sasser.B
Victim
Pattern
√
√
√
√
√
√
√
√
√
√
Nil
√
√
√
General General Malware Victim Pattern
Lovesan.T
Victim Data
Log Attributes
Pattern detected
Action
√
√ Protocol
Destination Port
Action
√
√ Protocol
Destination Port
√
√ Error Message
Event ID
√
√
Image Filename
Event ID
√
√
Event Message
Event ID
Nil
√
Event Message
Source IP Address
√
√ Destination IP Address
Destination Port
With reference to TABLE II, all of the logs involved:
personal firewall log, security log, system log, application
log and IDS alert log have the similar log attributes detected
as in the general malware’s attacker pattern. Therefore, the
log attributes selected for this general victim pattern are
action, protocol, destination port, event id, image filename,
event message, error message, source IP address, and
destination IP address.
Attributes
General
General
General
Blaster.A Sasser.B Lovesan.T
V/A Pattern V/A Pattern V/A Pattern
Action
Protocol
Destination Port
ATTACKER
Error Message
√
√
√
√
√
√
General Malware
Victim/Attacker pattern
Data
Log Attributes
detected
Victim/Attacker
Action
√
Protocol
Destination Port
√
Attacker
Error Message
√
√
√
√
Victim/Attacker
Action
Protocol
Destination Port
√
√
√
√
Victim
Error Message
√
√
√
√
√
√
√
√
Nil
√
Nil
√
VICTIM/ATTACKER
Personal
Firewall
Exploit
IDS Alert
Victim/
Attacker
(V/A)
Action
Protocol
Destination Port
VICTIM
Error Message
VICTIM/ATTACKER
Security
Event ID
Image File Name
VICTIM/ATTACKER
System
Event ID
Event Message
VICTIM/ATTACKER
Application Event ID
Impact
Event Message
Victim/Attacker
Event ID
Image Filename
Victim/Attacker
Event ID
Event Message
Victim/Attacker
Event ID
Event Message
VICTIM
IDS Alert
Source IP Address
Destination IP Address
Destination Port
ATTACKER
Source IP Address
Victim/Attacker
Source IP Address
√
√
√
√
Victim
Destination IP Address
Destination Port
All of the logs involved: personal firewall log, security log,
system log, application log and IDS alert log in TABLE III
have the similar log attributes detected as in the general
malware’s victim pattern except for attributes found in the
IDS alert log. In the IDS alert log, the attributes for the
victim attack pattern are destination IP address and
destination port whereas the attribute for multi-step attacker
pattern is source IP address only. Therefore, log attributes
selected for this general multi-step attacker pattern are
action, protocol, destination port, event id, image filename,
event message, error message, source IP address, and
destination IP address.
In this analysis, the researcher has identified the attributes
involved in the victim, attacker and multi-step attacker
pattern. These findings are further used to construct the
proposed general malware’s attacker pattern.
Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011)
V. PROPOSED GENERAL MALWARE ATTACK
PATTERN
The general attack pattern for malware is designed based
on the finding from the attack pattern analysis done on
Blaster.A, Sasser.B and Lovesan.T. In constructing the
general malware’s attack pattern, the researcher has decided
to segregate the logs into two categories which are called
primary log and secondary log. In primary log, all of the
information gathered from this log is pre-requisite. From
this log, the researcher can determine the perspective of the
attacker without gathering the information from the
secondary log. In this case, personal firewall log is placed
in the primary log.
For the secondary log, most of the log gathered from
security log, system log, application log and IDS alert log
are not necessarily the main factor to determine the
perspective of the attacker.
This secondary log is
considered as supportive information to the researcher [16]
and not necessarily true in case of alert gathered from IDS
alert log. Sometime the alert from IDS can turn into false
positive or false negative alarm. In case of security log,
system log and application log; all of these logs are not
necessarily generated once it is being infected by malware;
unless the device is restarted, then only the log is generated.
Hence, this secondary log is more or less unreliable in
certain situation, but act as supportive information in
determining the attacker’s perspective. The following
section describes the details on the primary and secondary
log involved in the attacker, victim and multi-step attacker
pattern.
This research proposed the general malware attack pattern
based on victim, attacker and multi-step point of view. The
following section describes the details.
In primary log, the scanning and exploiting activity can
only be found in personal firewall log. These logs have the
general attributes of action, protocol and destination port.
Meanwhile, in secondary log, on host level, the impact can
be found in security log, system log and application log.
These logs have the general attributes of event id, image
filename and event message. Consequently, on network level,
both scanning activity and its impact/effect can be found in
IDS alert log and the general attributes are error message
and source IP address correspondingly.
B. General Victim Pattern
In general malware’s pattern for victim as depicted in Fig. 4;
the finding is based on the discussion in analysis of general
malware’s victim perspective.
ATTACK STEPS
SCAN
PRIMARY
LOG
SECONDARY
LOG
LOG ATTRIBUTES
PERSONAL
FIREWALL
LOG
ACTION
PROTOCOL
DESTINATION PORT
PERSONAL
FIREWALL
LOG
ACTION
PROTOCOL
DESTINATION PORT
GENERAL
PATTERN FOR
EXPLOIT
MALWARE ‘S
IDS ALERT LOG
ERROR MESSAGE
SECURITY LOG
EVENT ID
IMAGE FILENAME
SYSTEM LOG
EVENT ID
EVENT MESSAGE
APPLICATION
LOG
EVENT ID
EVENT MESSAGE
VICTIM
IMPACT/
EFFECT
A. General Attacker Pattern
IDS ALERT LOG
Based on the finding from general Blaster.A, Sasser.B
and Lovesan.T malware’s attacker analysis, the overall
malware’s attacker pattern is generalized in Fig. 3.
ATTACK STEPS
PRIMARY
LOG
SECONDARY
LOG
ACTION
PROTOCOL
DESTINATION PORT
PERSONAL
FIREWALL
LOG
SCAN
GENERAL
PATTERN FOR
MALWARE ‘S
EXPLOIT
LOG ATTRIBUTES
IDS ALERT LOG
PERSONAL
FIREWALL
LOG
ERROR MESSAGE
ACTION
PROTOCOL
DESTINATION PORT
ATTACKER
SECURITY LOG
EVENT ID
IMAGE FILENAME
SYSTEM LOG
EVENT ID
EVENT MESSAGE
APPLICATION
LOG
EVENT ID
EVENT MESSAGE
SOURCE IP ADDRESS
DESTINATION IP ADDRESS
DESTINATION PORT
Fig. 4 General Malware’s Victim Pattern
With reference to Fig. 4, the log files and attributes for the
scan, exploit and impact/effect attack steps are similarly
found in general malware’s pattern for the attacker in Fig. 3.
The only main difference is on the network level where the
alarm’s general attribute found in IDS alert log are source IP
address, destination IP address and destination port.
Moreover, this alarm is found during exploiting and
impact/effect activities compared to scanning and exploiting
activities found in general malware’s attack pattern.
C. General Multi-step (Victim/Attacker/) Pattern
IMPACT/
EFFECT
IDS ALERT LOG
SOURCE IP ADDRESS
Fig. 3 General Malware’s Attacker Pattern
According to the finding for multi-step attacker pattern as
discussed in the analysis of general malware’s multi-step
perspective; the general pattern for malware’s multi-step
attacker (victim/attacker) pattern gathered in Fig. 5 is similar
to the general malware’s victim pattern except for
impact/effect in network log.
Malaysian Technical Universities International Conference on Engineering & Technology (MUiCET 2011)
ATTACK STEPS
PRIMARY
LOG
SECONDARY
LOG
LOG ATTRIBUTES
[1]
VICTIM/ATTACKER
ACTION
PROTOCOL
DESTINATION PORT
PERSONAL
FIREWALL
LOG
[2]
SCAN
IDS ALERT LOG
ATTACKER
ERROR MESSAGE
[3]
VICTIM/ATTACKER
ACTION
PROTOCOL
DESTINATION PORT
PERSONAL
FIREWALL
LOG
GENERAL
PATTERN FOR
MALWARE ‘S
[4]
[5]
EXPLOIT
VICTIM
ERROR MESSAGE
IDS ALERT LOG
VICTIM/ATTACKER
IMPACT/
EFFECT
SECURITY LOG
VICTIM/ATTACKER
EVENT ID
IMAGE FILENAME
SYSTEM LOG
VICTIM/ATTACKER
EVENT ID
EVENT MESSAGE
[6]
[7]
[8]
[9]
[10]
APPLICATION
LOG
VICTIM/ATTACKER
EVENT ID
EVENT MESSAGE
VICTIM/ATTACKER
SOURCE IP ADDRESS
IDS ALERT LOG
VICTIM
DESTINATION IP ADDRESS
DESTINATION PORT
[11]
[12]
[13]
Fig. 5 General Malware’s Multi-Step Attacker Pattern
The considered attributes are only destination IP address and
destination port for victim; and error message and source IP
address for multi-step attacker (victim/attacker) pattern. The
general malware’s victim and attacker pattern are used for
developing a basic malware’s attack model, while the general
multi-step attacker pattern is used to develop multi-step
malware’s attack model which will be further discussed in
next section.
VI. CONCLUSIONS AND FUTURE WORKS
In this paper, the researchers have analyzed diverse logs in
order to identify the attack pattern from attacker and victim
perspective in nine different attack scenario: scenario A to
scenario I. The output of the analysis are the proposed
general malware attacker attack pattern, general malware
victim attack pattern and general malware multi-step attack
pattern. This general malware attack pattern is then extended
to be further used in designing malware attack model. The
finding is essential for further research in alert correlation
and computer forensic investigation.
ACKNOWLEDGEMENT
We thank to Universiti Teknikal Malaysia Melaka for the
Short Grant funding (PJP/2009/FTMK (8D)S557) for this
research project.
[14]
[15]
[16]
REFERENCES
Mihai Christodorescu , Somesh Jha , Sanjit A. Seshia , Dawn Song ,
Randal E. Bryant, “Semantics-Aware Malware Detection”,
Proceedings of the 2005 IEEE Symposium on Security and Privacy,
p.32-46, May 08-11, 2005
Vasudevan, A., & Yerraballi, R., “SPiKE: Engineering Malware
Analysis Tools using Unobtrusive Binary-Instrumentation”.
Australasian Computer Science Conference (ACSC 2006),2006
Karresand, M., “A proposed taxonomy of software weapons” (No.
FOI-R-0840-SE): FOI-Swedish Defence Research Agency, 2003.
IBM. (2011). IBM X-Force® 2010-Trend and Risk Report.
Technical Report for IBM.
Bailey, M., Cooke, E., Jahanian, F., Watson, D., & Nazario, J. (2005).
The Blaster Worm: Then and Now. IEEE Computer Society.
Lazarevic, A., Kumar, V. & Srivastava, J. (2005). Managing Cyber
Threats. On Massive Computing: Springer US. pp. 19-78.
McAfee. (2003). Virus Profile: W32/Lovsan.worm.a [Electronic
Version].
Retrieved
23
July
2009
from
http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=100547.
Barnum, S., & Sethi, A. (2006). Introduction to Attack Patterns.
[Electronic Version]. Retrieved 18 April 2010.
Hoglund, G., & McGraw, G. (2004). Exploiting Software: How to
Break Code. Boston, Massachussetts: Addison-Wesley/Pearson.
P. Moore, A., J. Ellison, R., & C. Linger, R. (2001). Attack Modeling
for Information Security and Survivability. (No. CMU/SEI-2001-TN001.): Pittsburgh, Pennsylvania: Software Engineering Institute,
Carnegie Mellon University.
Fernandez, E., Pelaez, J., & Larrondo-Petrie, M. (2007). Attack
Patterns: A New Forensic and Design Tool. Paper presented at the
IFIP International Federation for Information Processing.
Kent, K., Chevalier, S., Grance, T., & Dang., H. (2006). Guide to
Integrating Forensic Techniques into Incident Response: NIST
Special Publication 800-86.
Robiah, Y., Siti Rahayu, S., Shahrin, S., Mohd Faizal, A., Mohd Zaki,
M., & Marliza, R. (2010). New Multi-step Worm Attack Model.
Journal of Computing, 2(1), 1-7.
Robiah, Y., Siti Rahayu, S., Shahrin, S., Mohd Faizal, A., Mohd Zaki,
M., & Marliza, R. (2010). An Improved Traditional Worm Attack
Pattern.
Proceedings of the 4th International Symposium on
Information Technology 2010 (ITSIM 2010).
Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib, Mohd Zaki
Masud, Mohd Faizal Abdollah, Zaheera Zainal Abidin. 2010.
Advanced Trace Pattern for Computer Intrusion Discovery. Journal
of Computing. Vol. 2 No. 6, June 2010.
Barse, E. L. & Jonsson, E. (2004). Extracting Attack Manifestations
to Determine Log Data Requirements for Intrusion Detection.
Proceedings of the IEEE 20th Annual Computer Security Applications
Conference, pp. 158-167.
Download