Defending against hitlist worms using network address space randomization

被引:140
|
作者
Antonatos, S.
Akritidis, P.
Markatos, E. P.
Anagnostakis, K. G.
机构
[1] Inst Infocomm Res, Syst & Secur Dept, Singapore 119613, Singapore
[2] Fdn Res & Technol, Inst Comp Sci, GR-71110 Iraklion, Greece
关键词
worm defense; randomization; hitlist worms;
D O I
10.1016/j.comnet.2007.02.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescales where human responses are unlikely to be effective. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even automated defenses may not be able to react in a timely fashion. This paper examines a new proactive defense mechanism called Network Address Space Randomization (NASR) whose objective is to harden networks specifically against hitlist worms. The idea behind NASR is that hitlist information could be rendered stale if nodes are forced to frequently change their IP addresses. NASR limits or slows down hitlist worms and forces them to exhibit features that make them easier to contain at the perimeter. We explore the design space for NASR and present a prototype implementation as well as experiments examining the effectiveness and limitations of the approach. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:3471 / 3490
页数:20
相关论文
共 50 条
  • [41] SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs
    Seo, Jaebaek
    Lee, Byoungyoung
    Kim, Seongmin
    Shih, Ming-Wei
    Shin, Insik
    Han, Dongsu
    Kim, Taesoo
    [J]. 24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [42] Effective Defending Against Flood Attack Using Stream-Check Method in Tolerant Network
    Kuriakose, Divya
    Daniel, D.
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [43] Evidential classification for defending against adversarial attacks on network traffic
    Beechey, Matthew
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos G.
    [J]. INFORMATION FUSION, 2023, 92 : 115 - 126
  • [44] Feature decoupling and interaction network for defending against adversarial examples
    Wang, Weidong
    Li, Zhi
    Liu, Shuaiwei
    Zhang, Li
    Yang, Jin
    Wang, Yi
    [J]. IMAGE AND VISION COMPUTING, 2024, 144
  • [45] Pulse: A class of super-worms against network infrastructure
    Voyiatzis, AG
    Serpanos, DN
    [J]. 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, : 28 - 33
  • [46] Empirical Analysis of An Improved Countermeasure Against Computer Network Worms
    Shahzad, Khurram
    Woodhead, Steve
    [J]. 2015 6TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2015, : 343 - 349
  • [47] Defending Network IDS against Adversarial Examples with Continual Learning
    Kozal, Jedrzej
    Zwolinska, Justyna
    Klonowski, Marek
    Wozniak, Michal
    [J]. 2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 60 - 69
  • [48] Defending against Social Network Sybils with Interaction Graph Embedding
    Yang, Zhi
    Zhang, Yusi
    Dai, Yafei
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [49] Pulse: A class of super-worms against network infrastructure
    Voyiatzis, AG
    Serpanos, DN
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2971 - 2974
  • [50] Analyzing worms and network traffic using compression
    Wehner, Stephanie
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (03) : 303 - 320