An Information-Theoretic View of Network-Aware Malware Attacks

被引:18
作者
Chen, Zesheng [1 ]
Ji, Chuanyi [2 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
关键词
Attack models; network security; performance metrics;
D O I
10.1109/TIFS.2009.2025847
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work provides an information-theoretic view to better understand the relationships between aggregated vulnerability information viewed by attackers and a class of randomized epidemic scanning algorithms. In particular, this work investigates three aspects: 1) a network vulnerability as the nonuniform vulnerable-host distribution, 2) threats, i.e., intelligent malwares that exploit such a vulnerability, and 3) defense, i.e., challenges for fighting the threats. We first study five large data sets and observe consistent clustered vulnerable-host distributions. We then present a new metric, referred to as the nonuniformity factor, that quantifies the unevenness of a vulnerable-host distribution. This metric is essentially the Renyi information entropy that unifies the nonuniformity of a vulnerable-host distribution with different malware-scanning methods. Next, we draw a relationship between Renyi entropies and randomized epidemic scanning algorithms. We find that the infection rates of malware-scanning methods are characterized by the Renyi entropies that relate to the information bits in a nonunform vulnerable-host distribution extracted by a randomized scanning algorithm. Meanwhile, we show that a representative network-aware malware can increase the spreading speed by exactly or nearly a nonuniformity factor when compared to a random-scanning malware at an early stage of malware propagation. This quantifies that how much more rapidly the Internet can be infected at the early stage when a malware exploits an uneven vulnerable-host distribution as a network-wide vulnerability. Furthermore, we analyze the effectiveness of defense strategies on the spread of network-aware malwares. Our results demonstrate that counteracting network-aware malwares is a significant challenge for the strategies that include host-based defenses and IPv6.
引用
收藏
页码:530 / 541
页数:12
相关论文
共 41 条
[1]  
Abu Rajab M, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P225
[2]  
[Anonymous], SELECTED PAPERS
[3]  
[Anonymous], 1991, ELEMENTS INFORM THEO
[4]  
BARFORD P, 2006, P PASS ACT MEAS C PA
[5]  
Bellovin Steven M, 2006, LOGIN USENIX MAGAZIN, V31, P70
[6]  
BRUMLEY D, 2006, ACM S INFORMATION CO
[7]  
Cachin C., 1997, THESIS SWISS FEDERAL
[8]  
*CERT COORD CTR, 2008, IN200109 CERT COORD
[9]  
Chen L, 2007, LECT NOTES OPER RES, V7, P5
[10]  
CHEN Z, 2007, INT J SECURITY NETWO, V2, P71