1 email worm modeling and defense cliff c. zou, don towsley, weibo gong univ. massachusetts, amherst
TRANSCRIPT
![Page 1: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/1.jpg)
1
Email Worm Modeling and Defense
Cliff C. Zou, Don Towsley, Weibo Gong
Univ. Massachusetts, Amherst
![Page 2: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/2.jpg)
2
Internet Worm Introduction
Scan-based worms: Example: Code Red,
Slammer, Blaster, Sasser, … No human interaction
Fast (automatic defense) Need vulnerability
Fewer incidents Network-based blocking
Modeling: no (week) topological issue
Epidemic models
Email worms: Example: Melissa, Love
letter, Sircam, SoBig, MyDoom, …
Human activation Slower
Need no vulnerability More incidents Defense on email
servers Modeling: email address
logical topology No math model yetNimda: mixed
infection
MyDoom: search engine
![Page 3: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/3.jpg)
3
Email Topology — Heavy-tailed Distributed
Email topology degree distr. Size distr. of email address books Popular email list: one list address corresponds to many. Email worms find all addresses on compromised computers.
Email address books, Web cache, text documents, etc.
We study email propagation on power law topologies. Generators available ; best candidate to represent heavy-tailed topology.
1 10 100 1,000 10,000 100,000 1,000,0000.000001
0.00001
0.0001
0.001
0.01
0.1
0
Yahoo GroupRandom graph Complementary cumulative
distribution
(May 2002: > 800,000 Yahoo groups)
![Page 4: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/4.jpg)
4
Email Worm Simulation Model
Discrete time simulation Topology: undirected graph
Power law, small world, random graph
Modeling behavior of individual user Worm email attachment opening prob. Email checking time interval
Following any distribution: Exponential, Erlang, Constant.
Modeling the entire user population normal distr. normal distr.
![Page 5: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/5.jpg)
5
Propagation Stochastic Effect
Power law network: 100,000 nodes, average degree = 8 Nt : the number of infectious at time t. N0 = 2 randomly selected 100 simulation runs for each experiment
Random effect in simulation
Initially infected nodes and initial infection are critical.
It is possible that no one is infected except N0
• When no neighboring nodes open email attachments.
0 50 100 150 200 250 300 350 4000
1
2
3
4
5
6
7
8
9
10x 10
4
Time: t
Nt
MaximumMean valueMinimum
![Page 6: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/6.jpg)
6
Initially infected nodes with different node degree
Initially infected nodes are more important in a sparsely connected network than a densely connected network
0 100 200 300 4000
2
4
6
8
10x 10
4
Time: t
E[Nt]
Highest degreeLowest degree
0 100 200 300 4000
2
4
6
8
10x 10
4
Time: t
E[Nt]
Highest degreeLowest degree
Avg. degree = 8
Avg. degree = 20
![Page 7: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/7.jpg)
7
Effect of email checking time variability
An email worm propagates faster when the email checking time is more stochastically variable.
Snowball effect: Before worm copies give birth to the next generation in the less variable system, worm copies in the more variable system have already given birth to several generations.
0 100 200 300 4000
2
4
6
8
10x 10
4
Time: t
E[Nt]
Exponential distributionErlang distributionConstant value
Random variable Exponential 3rd-order Erlang Constant
![Page 8: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/8.jpg)
8
Topology Effect on Email Worm Propagation
An email worm propagates faster on a power-law topology than on the other two.
Highly connected nodes are infected earlier. They amplify worm propagation speed by shooting out more
copies.
0 100 200 300 4000
2
4
6
8
10x 10
4
Time: t
E[Nt]
Power law topologyRandom graph topologySmall world topology 0 20 40 60 80
0
10
20
30
40
50
Time: t
Dt
Power law topologySmall world topologyRamdom graph topology
Topology effectAvg. degree of infected nodes
(1000 simulation runs)
![Page 9: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/9.jpg)
9
Immunization Defense against Email Worms
Static immunization defense: A fraction of nodes are immune to an email worm before its
outbreak. No nodes will be immunized during the worm’s outbreak.
Selective immunization: Immunizing the mostly connected nodes. Effective for a power-law network
Nodes have very variable node degrees 3 ~ 2000+
![Page 10: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/10.jpg)
10
Selective Immunization Defense
Selective immunization defense is more effective on a power law topology than on the other two. Due to the percolation property of a topology.
0 100 200 300 4000
2
4
6
8
10x 10
4
Time: t
E[Nt]
No immunization5% randomly selected5% most connected
0 50 100 150 200 250 300 350 4000
1
2
3
4
5
6
7
8
9
10x 10
4
Time: t
E[Nt]
No immunization5% randomly selected5% most connected
Power law topology
Small world topology
![Page 11: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/11.jpg)
11
Percolation and Phase Transition
Selective percolation with p: Removing top p percent of mostly connected
nodes. Corresponding to selective immunization.
Newman et al. studied uniform percolation.
Selective percolation property: Connection ratio:
fraction of remained nodes that are connected. Remaining link ratio:
fraction of remained links. Phase transition selective percolation threshold
Disjoint the remaining network when
![Page 12: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/12.jpg)
12
0% 20% 40% 60% 80% 100%0
0.2
0.4
0.6
0.8
1
Selective percolation: p
Connection ratioRemaining link ratio
Why different effect with 5% selective immunization? Power law topology: removing 55.5% links Small world (random graph) topology: removing < 20% links
Email worm prevention via selective immunization (Phase transition) :
30% for the power law topology Around 70% for the small world and random graph topologies.
Power law topology Small world topology
Percolation and Phase Transition
0% 20% 40% 60% 80% 100%0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Selective percolation: p
Connection ratioRemaining link ratio
![Page 13: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/13.jpg)
13
Summary
Email topology is a heavy-tailed distributed topology.
The impact of a power law topology on email worm propagation is mixed: Cons: an email worm spreads faster than on a
small world or a random graph topology. Pros: static selective immunization defense is
more effective.
![Page 14: 1 Email Worm Modeling and Defense Cliff C. Zou, Don Towsley, Weibo Gong Univ. Massachusetts, Amherst](https://reader036.vdocuments.net/reader036/viewer/2022081813/56649dff5503460f94ae76b7/html5/thumbnails/14.jpg)
14
Future Work
Mathematical modeling Difficulty: considering an arbitrary topology
Directed graph for email topology One-way email address relationship Heavy tailed distr. definition? Topology
generator?
Dynamic immunization defense Short-term focus: Enterprise network
defense