Advanced routing worm and its security challenges

Authors

    Authors

    C. C. Zou; D. Towsley; W. B. Gong;S. L. Cai

    Comments

    Authors: contact us about adding a copy of your work at STARS@ucf.edu

    Abbreviated Journal Title

    Simul.-Trans. Soc. Model. Simul. Int.

    Keywords

    network security; routing worm; modeling; Computer Science, Interdisciplinary Applications; Computer Science, ; Software Engineering

    Abstract

    Most well-known worms, such as Code Red, Slarnmer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the "routing worm," which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, which allows it to propagate three times faster than a traditional worm. Second, and more important, the geographic information of BGP routing prefixes enables a routing worm to conduct pinpoint "selective attacks" by imposing heavy damage to vulnerable computers in a specific country, company, Internet Service Provider, or autonomous system, without collateral damage done to others. Because of the inherent publicity of BGP routing tables, attackers can easily deploy routing worms, which distinguishes the routing worm from other "worst-case" worms. Compared to a traditional worm, a routing worm could possibly cause more severe congestion to the Internet backbone since all scans sent out by it are Internet routable (and can be dropped only at the destination local networks). In addition, it is harder to quickly detect a routing worm-infected computer since we cannot distinguish illegal scans from regular connections sent out from it without waiting for traffic responses. For high-fidelity Internet-scale worm simulations, through this routing worm study, the authors emphasize the importance of simulating failed worm scans and distinguishing nonroutable worm scans from routable scans. In order to defend against routing worms and all scanning worms, an effective way is to upgrade the current Internet from IPv4 to IPv6, although such an upgrade will require a tremendous effort and is still a controversial issue.

    Journal Title

    Simulation-Transactions of the Society for Modeling and Simulation International

    Volume

    82

    Issue/Number

    1

    Publication Date

    1-1-2006

    Document Type

    Article; Proceedings Paper

    Language

    English

    First Page

    75

    Last Page

    85

    WOS Identifier

    WOS:000237878500006

    ISSN

    0037-5497

    Share

    COinS