Defending against hitlist worms using network address space randomization

被引:140
|
作者
Antonatos, S.
Akritidis, P.
Markatos, E. P.
Anagnostakis, K. G.
机构
[1] Inst Infocomm Res, Syst & Secur Dept, Singapore 119613, Singapore
[2] Fdn Res & Technol, Inst Comp Sci, GR-71110 Iraklion, Greece
关键词
worm defense; randomization; hitlist worms;
D O I
10.1016/j.comnet.2007.02.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescales where human responses are unlikely to be effective. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even automated defenses may not be able to react in a timely fashion. This paper examines a new proactive defense mechanism called Network Address Space Randomization (NASR) whose objective is to harden networks specifically against hitlist worms. The idea behind NASR is that hitlist information could be rendered stale if nodes are forced to frequently change their IP addresses. NASR limits or slows down hitlist worms and forces them to exhibit features that make them easier to contain at the perimeter. We explore the design space for NASR and present a prototype implementation as well as experiments examining the effectiveness and limitations of the approach. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:3471 / 3490
页数:20
相关论文
共 50 条
  • [1] TAO: Protecting against hitlist worms using transparent address obfuscation
    Antonatos, Spiros
    Anagnostakis, Kostas G.
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 12 - 21
  • [2] Defending against Internet worms using a phase space method from chaos theory
    Hu, Jing
    Gao, Jianbo
    Rao, Nageswara S.
    [J]. DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [3] Defending Polymorphic Worms in Computer Network using Honeypot
    Goswami, R. T.
    Mondal, Avijit
    Mishra, Bimal Kumar
    Mahanti, N. C.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 63 - 65
  • [4] Defending against the propagation of active worms
    Fan, Xiang
    Xiang, Yang
    [J]. JOURNAL OF SUPERCOMPUTING, 2010, 51 (02): : 167 - 200
  • [5] Defending against the propagation of active worms
    Xiang Fan
    Yang Xiang
    [J]. The Journal of Supercomputing, 2010, 51 : 167 - 200
  • [6] Defending against the Propagation of Active Worms
    Fan, Xiang
    Xiang, Yang
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 350 - +
  • [7] Defending against Instant Messaging Worms
    Liu, Zhijun
    Shu, Guoqiang
    Li, Na
    Lee, David
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [8] Revisiting Address Space Randomization
    Wang, Zhi
    Cheng, Renquan
    Gao, Debin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 207 - +
  • [9] Address-space layout randomization using code islands
    Xu, Haizhi
    Chapin, Steve
    [J]. JOURNAL OF COMPUTER SECURITY, 2009, 17 (03) : 331 - 362
  • [10] Address Space Randomization for Mobile Devices
    Bojinov, Hristo
    Boneh, Dan
    Cannings, Rich
    Malchev, Iliyan
    [J]. WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 127 - 137