An Information-Theoretic View of Network-Aware Malware Attacks

被引:18
|
作者
Chen, Zesheng [1 ]
Ji, Chuanyi [2 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
关键词
Attack models; network security; performance metrics;
D O I
10.1109/TIFS.2009.2025847
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work provides an information-theoretic view to better understand the relationships between aggregated vulnerability information viewed by attackers and a class of randomized epidemic scanning algorithms. In particular, this work investigates three aspects: 1) a network vulnerability as the nonuniform vulnerable-host distribution, 2) threats, i.e., intelligent malwares that exploit such a vulnerability, and 3) defense, i.e., challenges for fighting the threats. We first study five large data sets and observe consistent clustered vulnerable-host distributions. We then present a new metric, referred to as the nonuniformity factor, that quantifies the unevenness of a vulnerable-host distribution. This metric is essentially the Renyi information entropy that unifies the nonuniformity of a vulnerable-host distribution with different malware-scanning methods. Next, we draw a relationship between Renyi entropies and randomized epidemic scanning algorithms. We find that the infection rates of malware-scanning methods are characterized by the Renyi entropies that relate to the information bits in a nonunform vulnerable-host distribution extracted by a randomized scanning algorithm. Meanwhile, we show that a representative network-aware malware can increase the spreading speed by exactly or nearly a nonuniformity factor when compared to a random-scanning malware at an early stage of malware propagation. This quantifies that how much more rapidly the Internet can be infected at the early stage when a malware exploits an uneven vulnerable-host distribution as a network-wide vulnerability. Furthermore, we analyze the effectiveness of defense strategies on the spread of network-aware malwares. Our results demonstrate that counteracting network-aware malwares is a significant challenge for the strategies that include host-based defenses and IPv6.
引用
收藏
页码:530 / 541
页数:12
相关论文
共 9 条
  • [1] An information-theoretic and game-theoretic study of timing channels
    Giles, J
    Hajek, B
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (09) : 2455 - 2477
  • [2] Information-theoretic bounds on target recognition performance
    Jain, A
    Moulin, P
    Miller, MI
    Ramchandran, K
    AUTOMATIC TARGET RECOGNITION X, 2000, 4050 : 347 - 358
  • [3] Information-theoretic data-hiding for public network security, services control and secure communications
    Voloshynovskiy, S
    Deguillaume, F
    Koval, O
    Pun, T
    TELSIKS 2003: 6TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICE, VOLS 1 AND 2, PROCEEDINGS OF PAPERS, 2003, : 3 - 17
  • [4] INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
    Voloshynovskiy, Sviatoslav
    Deguillaumet, Frederic
    Koval, Oleksiy
    Pun, Thierry
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2005, 5 (01) : 5 - 35
  • [5] Secure Communications via Physical-Layer and Information-Theoretic Techniques
    Regalia, Phillip A.
    Khisti, Ashish
    Liang, Yingbin
    Tomasin, Stefano
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1698 - 1701
  • [6] EvilModel 2.0: Bringing Neural Network Models into Malware Attacks
    Wang, Zhi
    Liu, Chaoge
    Cui, Xiang
    Yin, Jie
    Wang, Xutong
    COMPUTERS & SECURITY, 2022, 120
  • [7] Information-theoretic bounds on target recognition performance based on degraded image data
    Jain, A
    Moulin, P
    Miller, MI
    Ramchandran, K
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2002, 24 (09) : 1153 - 1166
  • [8] Network Information Theoretic Security With Omnipresent Eavesdropping
    Zhou, Hongchao
    El Gamal, Abbas
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (12) : 8280 - 8299
  • [9] Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Information-Theoretic Foundation
    Sung, Minho
    Xu, Jun
    Li, Jun
    Li, Li
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (06) : 1253 - 1266