首页 | 本学科首页   官方微博 | 高级检索  
     


Characterizing and defending against divide-conquer-scanning worms
Authors:Chao Chen  Zesheng Chen  Yubin Li
Affiliation:1. Department of Engineering, Indiana University – Purdue University Fort Wayne, Fort Wayne, IN 46805, United States;2. Department of Software and Information System, University of North Carolina at Charlotte, Charlotte, NC 28223, United States;1. University of Salamanca, Department of Applied Mathematics, Calle del Parque 2, 37008-Salamanca, Spain;2. University of Salamanca, Institute of Fundamental Physics and Mathematics, Department of Applied Mathematics, Calle del Parque 2, 37008-Salamanca, Spain;3. Institute of Physical and Information Technologies, Spanish National Research Council (CSIC), C/Serrano 144, 28006-Madrid, Spain;1. Concordia Institute for Information Systems Engineering, Concordia University, Montreal, Quebec, Canada;2. National Cyber-Forensics and Training Alliance (NCFTA), Montreal, Quebec, Canada
Abstract:Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective technique that can potentially be exploited for future Internet epidemics. Therefore, it is imperative that defenders understand the characteristics of divide-conquer-scanning worms and study the effective countermeasures. In this work, we first examine the divide-conquer-scanning worm and its potential to spread faster and stealthier than a traditional random-scanning worm. We then characterize the relationship between the propagation speed of divide-conquer-scanning worms and the distribution of vulnerable hosts through mathematical analysis and simulations. Specifically, we find that if vulnerable hosts follow a non-uniform distribution such as the Witty-worm victim distribution, divide-conquer scanning can spread a worm much faster than random scanning. We also empirically study the effect of important parameters on the spread of divide-conquer-scanning worms and a worm variant that can potentially enhance the infection ability at the late stage of worm propagation. Furthermore, to counteract such attacks, we discuss the weaknesses of divide-conquer scanning and study two defense mechanisms: infected-host removal and active honeynets. We find that although the infected-host removal strategy can greatly reduce the number of final infected hosts, active honeynets (especially uniformly distributed active honeynets) are more practical and effective to defend against divide-conquer-scanning worms.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号