Characterizing and defending against divide-conquer-scanning worms

被引:5
|
作者
Chen, Chao [1 ]
Chen, Zesheng [1 ]
Li, Yubin [2 ]
机构
[1] Indiana Univ Purdue Univ, Dept Engn, Ft Wayne, IN 46805 USA
[2] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
基金
美国国家科学基金会;
关键词
Security; Worm attacks; Divide-conquer scanning; Modeling; Simulations; Defense;
D O I
10.1016/j.comnet.2010.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective technique that can potentially be exploited for future Internet epidemics. Therefore, it is imperative that defenders understand the characteristics of divide-conquer-scanning worms and study the effective countermeasures. In this work, we first examine the divide-conquer-scanning worm and its potential to spread faster and stealthier than a traditional random-scanning worm. We then characterize the relationship between the propagation speed of divide-conquer-scanning worms and the distribution of vulnerable hosts through mathematical analysis and simulations. Specifically, we find that if vulnerable hosts follow a non-uniform distribution such as the Witty-worm victim distribution, divide-conquer scanning can spread a worm much faster than random scanning. We also empirically study the effect of important parameters on the spread of divide-conquer-scanning worms and a worm variant that can potentially enhance the infection ability at the late stage of worm propagation. Furthermore, to counteract such attacks, we discuss the weaknesses of divide-conquer scanning and study two defense mechanisms: infected-host removal and active honeynets. We find that although the infected-host removal strategy can greatly reduce the number of final infected hosts, active honeynets (especially uniformly distributed active honeynets) are more practical and effective to defend against divide-conquer-scanning worms. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:3210 / 3222
页数:13
相关论文
共 22 条
  • [1] Understanding Divide-Conquer-Scanning Worms
    Li, Yubin
    Chen, Zesheng
    Chen, Chao
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 51 - 58
  • [2] Defending against the propagation of active worms
    Xiang Fan
    Yang Xiang
    [J]. The Journal of Supercomputing, 2010, 51 : 167 - 200
  • [3] Defending against Instant Messaging Worms
    Liu, Zhijun
    Shu, Guoqiang
    Li, Na
    Lee, David
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [4] Defending against the Propagation of Active Worms
    Fan, Xiang
    Xiang, Yang
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 350 - +
  • [5] Defending against the propagation of active worms
    Fan, Xiang
    Xiang, Yang
    [J]. JOURNAL OF SUPERCOMPUTING, 2010, 51 (02): : 167 - 200
  • [6] Defending against Internet worms: A signature-based approach
    Tang, Y
    Chen, SG
    [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1384 - 1394
  • [8] A feasibility study on defending against ultra-fast topological worms
    Xie, Liang
    Zhu, Sencun
    [J]. P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 61 - 68
  • [9] Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy
    Hsu, Fu-Hau
    Wu, Min-Hao
    Hwang, Yan-Ling
    Chen, Jian-Xin
    Huang, Jian-Hong
    Wang, Hao-Jyun
    Lai, Yi-Wen
    [J]. INFORMATION, 2023, 14 (10)
  • [10] Defending against hitlist worms using network address space randomization
    Antonatos, S.
    Akritidis, P.
    Markatos, E. P.
    Anagnostakis, K. G.
    [J]. COMPUTER NETWORKS, 2007, 51 (12) : 3471 - 3490