Understanding Divide-Conquer-Scanning Worms
Internet worms have been a significant security threat. Divide-conquer scanning is a simple yet effective technique that can potentially be exploited by future Internet epidemics. Therefore, it is imperative that defenders understand the characteristics of divide-conquer-scanning worms and study the...
Saved in:
| Published in | 2008 IEEE International Performance, Computing and Communications Conference pp. 51 - 58 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2008
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1424433681 9781424433681 |
| ISSN | 1097-2641 |
| DOI | 10.1109/PCCC.2008.4745139 |
Cover
| Summary: | Internet worms have been a significant security threat. Divide-conquer scanning is a simple yet effective technique that can potentially be exploited by future Internet epidemics. Therefore, it is imperative that defenders understand the characteristics of divide-conquer-scanning worms and study the countermeasures. In this work, we first provide the intuitions that a divide-conquer-scanning worm can potentially spread faster and stealthier than a traditional random-scanning worm. We then characterize the relationships between the propagation speeds of divide-conquer-scanning worms and the distributions of vulnerable hosts through mathematical analysis and simulations. Specifically, we find that if vulnerable hosts follow a non-uniform distribution such as the Witty-worm victim distribution, divide-conquer scanning can spread a worm much faster than random scanning. We also study empirically the effect of important parameters on the spread of divide-conquer-scanning worms. Furthermore, to counteract such attacks, we discuss the weakness of divide-conquer scanning and study a defense mechanism. |
|---|---|
| ISBN: | 1424433681 9781424433681 |
| ISSN: | 1097-2641 |
| DOI: | 10.1109/PCCC.2008.4745139 |