A New Worm Exploiting IPv6 and IPv4-IPv6 Dual-Stack Networks: Experiment, Modeling, Simulation, and Defense

被引:6
作者
Liu, Ting [1 ]
Guan, Xiaohong [1 ]
Zheng, Qinghua [2 ]
Qu, Yu [1 ]
机构
[1] Xi An Jiao Tong Univ, MOE KLINN Lab, Syst Engn Inst, Xian, Peoples R China
[2] Xi An Jiao Tong Univ, MOE KLINN Lab, Dept Comp Sci & Engn, Xian, Peoples R China
来源
IEEE NETWORK | 2009年 / 23卷 / 05期
关键词
Grippers; Internet; Biological system modeling; Network topology; Protocols; Layout; Data mining; INTERNET;
D O I
10.1109/MNET.2009.5274918
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is commonly believed that the IPv6 protocol can provide good protection against network worms that try to find victims through random address scanning due to its huge address space. However, we discover that there is serious vulnerability in terms of worm propagation in IPv6 and IPv4-IPv6 dual-stack networks. It is shown in this article that a new worm can collect the IPv6 addresses of all running hosts in a local subnet very quickly, leading to accelerated worm propagation. Similar to modeling the self-replicating behaviors of biological viruses, a Species-Patch model and a discrete-time simulator are developed to study how the dual-stack worm spreads in networks with various topologies. It is shown that the worm could propagate in the IPv6 and IPv4-IPv6 dual-stack networks much faster than in the current IPv4 Internet. Several effective defense strategies focusing on network deployment are proposed.
引用
收藏
页码:22 / 29
页数:8
相关论文
共 15 条
  • [1] Bellovin Steve., worm propagation strategies in an IPv6 Internet
  • [2] *CAIDA, VIS INT TOP MACR SCA
  • [3] CHEN Z, 2007, P IEEE INFOCOM MAY
  • [4] CHEN Z, 2005, P 3 ACM CCS WORM 05
  • [5] Davies J., 2003, Understanding IPv6
  • [6] Modeling the spread of internet worms via persistently unpatched hosts
    Debany, Warren H., Jr.
    [J]. IEEE NETWORK, 2008, 22 (02): : 26 - 32
  • [7] Kamra A, 2005, P IEEE INFOCOM
  • [8] The next generation of the Internet: Aspects of the Internet protocol version 6
    Lee, DC
    Lough, DL
    Midkiff, SF
    Davis, NJ
    Benchoff, PE
    [J]. IEEE NETWORK, 1998, 12 (01): : 28 - 33
  • [9] Staniford S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, P149
  • [10] Realizing the transition to IPv6
    Waddington, DG
    Chang, FZ
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (06) : 138 - 148