【24h】

A Large-Scale Empirical Study of Conficker

机译:Conficker的大规模实证研究

获取原文
获取原文并翻译 | 示例
           

摘要

Conficker is the most recent widespread, well-known worm/bot. According to several reports, it has infected about 7 million to 15 million hosts and the victims are still increasing even now. In this paper, we analyze Conficker infections at a large scale, about 25 million victims, and study various interesting aspects about this state-of-the-art malware. By analyzing Conficker, we intend to understand current and new trends in malware propagation, which could be very helpful in predicting future malware trends and providing insights for future malware defense. We observe that Conficker has some very different victim distribution patterns compared to many previous generation worms/botnets, suggesting that new malware spreading models and defense strategies are likely needed. We measure the potential power of Conficker to estimate its effects on the networks/hosts when it performs malicious operations. Furthermore, we intend to determine how well a reputation-based blacklisting approach can perform when faced with new malware threats such as Conficker. We cross-check several DNS blacklists and IP/AS reputation data from Dshield and FIRE and our evaluation shows that unlike a previous study which shows that a blacklist-based approach can detect most bots, these reputation-based approaches did relatively poorly for Conficker. This raises a question of how we can improve and complement existing reputation-based techniques to prepare for future malware defense? Based on this, we look into some insights for defenders. We show that neighborhood watch is a surprisingly effective approach in the case of Conficker. This suggests that security alert sharing/correlation (particularly among neighborhood networks) could be a promising approach and play a more important role for future malware defense.
机译:Conficker是最近流行的,著名的蠕虫/机器人。根据几份报告,它已经感染了大约700万到1500万主机,而且受害者甚至还在增加。在本文中,我们对约2500万受害者的Conficker感染进行了大规模分析,并研究了有关此最新恶意软件的各个有趣方面。通过分析Conficker,我们打算了解恶意软件传播的当前趋势和新趋势,这对于预测未来的恶意软件趋势以及为将来的恶意软件防御提供见解可能会非常有帮助。我们观察到,与许多上一代蠕虫/僵尸网络相比,Conficker具有不同的受害者分发模式,这表明可能需要新的恶意软件传播模型和防御策略。我们测量Conficker的潜在能力,以评估其在执行恶意操作时对网络/主机的影响。此外,我们打算确定基于信誉的黑名单方法在遇到诸如Conficker之类的新恶意软件威胁时的性能如何。我们交叉检查了来自Dshield和FIRE的多个DNS黑名单和IP / AS信誉数据,我们的评估显示,与之前的研究表明,基于黑名单的方法可以检测到大多数僵尸程序相比,这些基于信誉的方法对Conficker的效果相对较差。这就提出了一个问题,即我们如何才能改进和补充现有的基于信誉的技术,为将来的恶意软件防御做准备?基于此,我们为防御者研究了一些见解。我们证明,在Conficker案例中,邻里监视是一种出奇的有效方法。这表明安全警报共享/关联(尤其是在邻域网络之间)可能是一种有前途的方法,并且在未来的恶意软件防御中扮演着更重要的角色。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号