Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior

نویسندگان

  • Evan Cooke
  • Z. Morley Mao
  • Farnam Jahanian
چکیده

Long after the Blaster, Slammer/Sapphire, and CodeRedII worms caused significant worldwide disruptions, a huge number of infected hosts from these worms continue to probe the Internet today. This paper investigates hotspots (non-uniformities) in the targeting behavior of these important Internet worms. Recent data collected over the period of a month and a half using a distributed blackhole data collection infrastructure covering 18 networks including ISPs, enterprises, and academic networks show 75K Blaster infected hosts, 180K slammer infected hosts, and 55K CodeRedII hosts. We discover through detailed analysis how critical flaws and side effects in the targeting behavior lead to a significant bias for certain destination address blocks. In particular, we demonstrate three previously unexplored biases: a severely restricted initial random seed forcing infection attempts to certain blocks; flaws in the parameters of a random number generator making certain hosts cycle through limited target addresses; and the widespread use of private address space dramatically changing the targeting distribution of certain worms. A direct consequence of these biases is that certain blocks are subjected to far more infection attempts than others. We discuss the implication of these hotspots on worm simulation and modeling, placement of blackhole sensors, worm detection and quarantine. A. Total Packets B. Unique Source IPs Figure 1: Observations of the Blaster, Witty, Slammer, Nimda, and CodeRedII worms over all monitored blocks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Seasons and Different Substrates on Growth and Reproduction of the Compost Worm Eisenia Fetida

The experiment was carried out in a factorial arrangement with the base of randomized complete block design in three repetitions. The first factor consisted of 11 bed for eating worm and the second factor is the different seasons (spring and autumn) respectively. Traits was including number of capsules (Coconut), the number of adult worms, the number of immature worms, live worms masses (mg), m...

متن کامل

Optimal worm-scanning method using vulnerable-host distributions

Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random scanning wastes many scans on invulnerable addresses, and more virulent scanning schemes may take advantage of the non-uniformity of a vulnerablehost distribution. Questions then arise as to how attackers may exploit su...

متن کامل

Effect of Seasons and Different Substrates on Growth and Reproduction of the Compost Worm Eisenia Fetida

The experiment was carried out in a factorial arrangement with the base of randomized complete block design in three repetitions. The first factor consisted of 11 bed for eating worm and the second factor is the different seasons (spring and autumn) respectively. Traits was including number of capsules (Coconut), the number of adult worms, the number of immature worms, live worms masses (mg), m...

متن کامل

In vitro Lymphoproliferative Responses of Trichostrongylus colubriformis High and Low Responder Guinea Pigs to Worm Antigens (SPL3, SPA) and Ovalbumin

In vitro lymphocyte responses of high responder (HR) and low responder (LR) guinea pigs from pe-ripheral blood lymphocytes (PBL) to parasite antigens soluble protein third stage larvae (SPL3) and soluble protein adult stage ( SPA), non-parasite antigen ovalbumin (OVA) were examined. There was substantial differences between HR and LR guinea pigs in the rate of acquisition of responsiveness to t...

متن کامل

On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics

An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose models for the worm interaction approach that relies upon automated bene...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004