首页> 外文期刊>Simulation >Advanced routing worm and its security challenges
【24h】

Advanced routing worm and its security challenges

机译:高级路由蠕虫及其安全性挑战

获取原文
获取原文并翻译 | 示例
           

摘要

Most well-known worms, such as Code Red, Slarnmer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the "routing worm," which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, which allows it to propagate three times faster than a traditional worm. Second, and more important, the geographic information of BGP routing prefixes enables a routing worm to conduct pinpoint "selective attacks" by imposing heavy damage to vulnerable computers in a specific country, company, Internet Service Provider, or autonomous system, without collateral damage done to others. Because of the inherent publicity of BGP routing tables, attackers can easily deploy routing worms, which distinguishes the routing worm from other "worst-case" worms. Compared to a traditional worm, a routing worm could possibly cause more severe congestion to the Internet backbone since all scans sent out by it are Internet routable (and can be dropped only at the destination local networks). In addition, it is harder to quickly detect a routing worm-infected computer since we cannot distinguish illegal scans from regular connections sent out from it without waiting for traffic responses. For high-fidelity Internet-scale worm simulations, through this routing worm study, the authors emphasize the importance of simulating failed worm scans and distinguishing nonroutable worm scans from routable scans. In order to defend against routing worms and all scanning worms, an effective way is to upgrade the current Internet from IPv4 to IPv6, although such an upgrade will require a tremendous effort and is still a controversial issue.
机译:最著名的蠕虫(如Code Red,Slarnmer,Blaster和Sasser)通过扫描整个IPv4地址空间来感染易受攻击的计算机。在本文中,作者提出了一种称为“路由蠕虫”的高级蠕虫,该蠕虫实现了两种新的攻击技术。首先,路由蠕虫使用边界网关协议(BGP)路由表仅扫描Internet可路由的地址空间,这使其传播速度比传统蠕虫快三倍。其次,更重要的是,BGP路由前缀的地理信息使路由蠕虫通过对特定国家,公司,Internet服务提供商或自治系统中的易受攻击的计算机造成严重破坏而进行精确的“选择性攻击”,而不会造成附带损害给别人。由于BGP路由表具有固有的公开性,攻击者可以轻松部署路由蠕虫,从而将路由蠕虫与其他“最坏情况”蠕虫区分开来。与传统蠕虫相比,路由蠕虫可能会导致Internet骨干网更加严重的拥塞,因为它发出的所有扫描都是可路由的(只能在目标本地网络上丢弃)。此外,由于我们无法在不等待流量响应的情况下将非法扫描与从其发出的常规连接区分开来,因此很难快速检测出感染了路由蠕虫的计算机。对于高保真Internet规模的蠕虫仿真,作者通过此路由蠕虫研究强调了模拟失败的蠕虫扫描并将不可路由的蠕虫扫描与可路由的扫描区分开来的重要性。为了抵御路由蠕虫和所有扫描蠕虫,有效的方法是将当前的Internet从IPv4升级到IPv6,尽管这种升级将需要付出巨大的努力,并且仍然是一个有争议的问题。

著录项

  • 来源
    《Simulation》 |2006年第1期|p. 75-85|共11页
  • 作者

    Zou CC; Towsley D; Gong WB; Cai SL;

  • 作者单位

    Univ Cent Florida, Sch Elect Engn & Comp Sci, Orlando, FL 32816 USA;

    Univ Massachusetts, Dept Comp Sci, Amherst, MA 01003 USA;

    Univ Massachusetts, Dept Elect & Comp Engn, Amherst, MA 01003 USA;

    Parallog Corp, Sterling, VA USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 计算技术、计算机技术;
  • 关键词

    network security; routing worm; modeling;

    机译:网络安全;路由蠕虫;建模;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号