
Research
Abstracts  2006 
On the Adaptive RealTime Detection of FastPropagating Network WormsJaeyeon Jung, Rodolfo A. Milito & Vern PaxsonIntroductionIf a network worm penetrates a site's perimeter, it can quickly spread to other vulnerable hosts inside the site. The infection propagates by the compromised host repeatedly attempting to contact and infect new potential victims. Figure 1 illustrates a situation where a firewall becomes ineffective when a user connects his infected laptop directly to the network. Hence, many networks employ a system that monitors outgoing traffic from local hosts with an attempt to quickly identify an infected host to prevent further damage. Figure 1: Peripheral defense is not enough to prevent worm propagation The traffic pattern of fast worm propagationa single host quickly contacting many different hostsis a prominent feature across a number of types of worms, and detecting such patterns constitutes the basis for several worm detection approaches [1][2][3]. However, the diversity of traffic makes it difficult to tune existing worm detection methods that presume preselected thresholds for connection rates and window sizes over which to compute whether a host's activity is "too quick". Finding a single threshold rate that accommodates all (or almost all) benign hosts requires excessive tuning because of diverse application behaviors (e.g., a Web browser generating multiple concurrent connections to fetch embedded objects vs. an SSH client connecting to a server). We develop an algorithm for detecting fastpropagating worms based on the rate at which the infected hosts initiate connections to new destinations. The foundation of our algorithm, RBS (ratebased sequential hypothesis testing), derives from the theory of sequential hypothesis testing, the use of which for detecting randomly scanning hosts was first introduced by our previous work with TRW [4]. The sequential hypothesis testing methodology enables engineering the detectors to meet false positives and false negatives targets, rather than triggering when fixed thresholds are crossed. RBS: RateBased Sequential Hypothesis TestingRBS operates on a perhost and perconnection basis and does not require access to packet contents. It is built on a probabilistic model of a typical benign host's network behavior that a benign host rarely generates more than a few firstconnect connections per second, and the time intervals between those connections can be approximately modeled as exponentially distributed. Let be the hypothesis that a given host is engaged in worm propagation, and let be the null hypothesis that the host exhibits benign network activity. A host generates an event when it initiates a connection to a destination with which the host has not previously communicated, i.e., when the host initiates a firstcontact connection. We assume that the interarrival times of such events follow an exponential distribution with mean (benign host) or (scanner). When a host generates the event at time , we can compute an interarrival time, for and the initial starting point, and update the likelihood ratio of the host being engaged in scanning (or benign). Define , , , as a sequence of such interarrival times. Since we model each as IID negative exponential random variables, their sum, , is the Erlang distribution: Based on Equation (1), we can develop a sequential hypothesis test in which we define the likelihood ratio as: and the detection rules as: where we can set and in terms of a target false positive rate, , and a target detection rate, [5]: Wald shows that setting thresholds as above guarantees that the resulting false positive rate is bounded by and the false negative rate is by [5]. Given that is usually set to a value higher than 0.99 and to a value lower than 0.001, the margin of error becomes negligible (i.e., and ). There are four parameters to set in order to run RBS. First, and give the false positive rate and the detection rate we want to achieve with the detection algorithm. In addition, we need priors, and , as the reference fanout rates. We base their selection on our simple models of the network behavior of scanners versus benign hosts. Since a host's instantaneous firstcontact rate can vary a great deal over time, RBS needs to estimate whether the current behavior provides evidence strong enough to choose one hypothesis against the other. For instance, if a host has initiated firstcontact connections and the elapsed time for the connection is , RBS chooses (scanner) only if the likelihood ratio exceeds . Using Equations (2) and (3), we can obtain a threshold on the elapsed time, , below which we arrive at an (detection) decision: Likewise, we can obtain a threshold elapsed time , above which we conclude (benign host):
Finally, Equations (5) (6) show that RBS's decision is made based on two parameters  the number of attempts, , and the elapsed time, and not the actual realization of the arrival process. ResultsTable 1 shows the simulation results of RBS for the trace data collected from Lawrence Berkeley Laboratory as we vary as a multiple of Hz. We obtained this reference value from the analysis of the trace data. With increasing , we see that RBS's detection rate increases without incurring false positives. Hosts that RBS often fails to detect include an internal scanner that probed only 7 hosts in a 10 minute trace, and 6 iprint hosts that accessed only 10 or fewer other printers, sometimes in two separate 5connection bursts, which thins out the source's average fanout rate, making them difficult to detect. While this assessment is against a fairly modest amount of data, we find the results promising. This evaluation result shows that when the factor of speed difference, , between a scanner and a benign host is small, RBS requires more empirical data to arrive at a detection decision; for example, it requires on average 10.4 firstcontact connections when , but the theoretical bound shows that it can detect any scanners that sustain more than 9.5 firstcontact connections per second. In addition, as grows larger RBS provides accurate and quick detection. ConclusionWhile built using a model that the time between connection attempts to new destinations is exponentially distributed (which we show is a reasonable approximation for bursts of activity), RBS decisions reflect the aggregate measurement of the total elapsed time over a number of attempts, not the characteristics of individual arrivals. We define RBS in terms of a single discriminating metricthe rate of connection attemptswhich differs substantially between benign hosts and an important class of worms. While the choice of such a metric evokes the measurement of an average rate over a window of certain size (and the comparison of the measured rate to a fixed threshold), RBS is more elaborate. The algorithm draws from sequential hypothesis testing the ability to adapt its decisionmaking in response to the available measurements in order to meet specified error requirements. We can view this as an adaptation of both the window size (i.e., how many attempts to make a decision) and the threshold (i.e., what is the minimum measured rate over that window that leads to a trigger). This adaptation gives RBS a robustness unseen in fixed window/threshold schemes. Research SupportWe gratefully acknowledge funding from the National Science Foundation under Cooperative Agreement No. ANI0225660 and Electronics & Telecommunications Research Institute, Korea. References[1] Jamie Twycross and Matthew M. Williamson. Implementing and Testing a Virus Throttle. In Proceedings of the 12th USENIX Security Symposium, August 2003. [2] Stuart E. Schechter, Jaeyeon Jung and Arthur W. Berger. Fast Detection of Scanning Worm Infections In Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), September 2004. [3] Shigang Chen and Yong Tang. Slowing Down Internet Worms. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04), March 2004. [4] Jaeyeon Jung, Vern Paxson, Arthur W. Berger and Hari Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In Proceedings of the IEEE Symposium on Security and Privacy, May 2004. [5] Abraham Wald. Sequential Analysis. J. Wiley & Sons, New York, 1947. 

