Advanced Routing Worm and Its Security Challenges

نویسندگان

  • Cliff Changchun Zou
  • Donald F. Towsley
  • Weibo Gong
  • Songlin Cai
چکیده

Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the “routing worm,” which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, which allows it to propagate three times faster than a traditional worm. Second, and more important, the geographic information of BGP routing prefixes enables a routing worm to conduct pinpoint “selective attacks” by imposing heavy damage to vulnerable computers in a specific country, company, Internet Service Provider, or autonomous system, without collateral damage done to others. Because of the inherent publicity of BGP routing tables, attackers can easily deploy routing worms, which distinguishes the routing worm from other “worst-case” worms. Compared to a traditional worm, a routing worm could possibly cause more severe congestion to the Internet backbone since all scans sent out by it are Internet routable (and can be dropped only at the destination local networks). In addition, it is harder to quickly detect a routing worm–infected computer since we cannot distinguish illegal scans from regular connections sent out from it without waiting for traffic responses. For highfidelity Internet-scale worm simulations, through this routing worm study, the authors emphasize the importance of simulating failed worm scans and distinguishing nonroutable worm scans from routable scans. In order to defend against routing worms and all scanning worms, an effective way is to upgrade the current Internet from IPv4 to IPv6, although such an upgrade will require a tremendous effort and is still a controversial issue.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Discussion And Review In Vanet

VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...

متن کامل

Discussion And Review In Vanet

VANET are becoming active area of research and devel- opment because it has potential to increase road safety, convenience and comfort to drivers & passengers. A Lot of research work on VANET have done in area of Quali- ty of Service (QoS), routing and security. These concepts relate the facing challenges for technology in VANET. We present a overview of challenges in VANET. Firstly ,we have di...

متن کامل

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace

The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system’s capability to produce a stable view of the overall network reachability. Several global-scale Internet failures driven by the uncontrollable spreading of self-propagating code exploiting homogeneous security vulnerabilities ...

متن کامل

Quantitative Detection of AODV against Black Hole and Worm Hole Attacks in MANET

Security is very essential in both wired and wireless network communication. An ad hoc network is a collection of number of wireless computers having dynamically changing topology due to which the security issues are more in case of wireless networks. In this paper the aim is to provide a quantitative analysis of all the security challenges that effect the performance of MANET protocols by anal...

متن کامل

Modeling, Analysis, and Mitigation of Internet Worm Attacks

In recent years, worms have become one of the major threats to the security of the Internet. In this talk, I will present our research on modeling, analysis, and mitigation of Internet worm attacks, which includes: (1) We present a “two-factor worm model”, which considers the impact of human counteractions and network congestion on a worm's propagation. (2) To detect the presence of an Internet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Simulation

دوره 82  شماره 

صفحات  -

تاریخ انتشار 2006