阻止互联网流行

Manuel Costa, Jon Crowcroft, Miguel Castro, A. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham
{"title":"阻止互联网流行","authors":"Manuel Costa, Jon Crowcroft, Miguel Castro, A. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham","doi":"10.1109/IZS.2006.1649086","DOIUrl":null,"url":null,"abstract":"As we become increasingly dependent on computers connected to the Internet, we must protect them from worm attacks. Worms can gain complete control of millions of hosts in a few minutes, and they can use the infected hosts for malicious activities such as distributed denial of service attacks, relaying spam, corrupting data, and disclosing confidential information. Since worms spread too fast for humans to respond, systems that strive to contain worm epidemics must be completely automatic. We propose Vigilante, a new end-to-end architecture to contain worms automatically that addresses the limitations of network-centric systems. Vigilante relies on collaborative worm detection at end hosts, but does not require hosts to trust each other. In Vigilante, hosts run instrumented software to detect worms. We introduce dynamic dataflow analysis, a broad-coverage detection algorithm, and we show how to integrate other detection mechanisms into the Vigilante architecture. Upon worm detection, hosts generate self-certifying alerts (SCAs), a new type of security alert that can be inexpensively verified by any vulnerable host. SCAs are then broadcast over a resilient overlay network that can propagate alerts with high probability, even when under active attack. Finally, hosts receiving an SCA generate protective filters with dynamic data and control flow analysis of the vulnerable software. Our results show that Vigilante can contain fast spreading worms that exploit unknown vulnerabilities without false positives. Vigilante does not require any changes to hardware, compilers, operating systems or to the source code of vulnerable programs, and therefore can be used to protect software as it exists today in binary form","PeriodicalId":405389,"journal":{"name":"2006 International Zurich Seminar on Communications","volume":"138 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Stopping Internet Epidemics\",\"authors\":\"Manuel Costa, Jon Crowcroft, Miguel Castro, A. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham\",\"doi\":\"10.1109/IZS.2006.1649086\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As we become increasingly dependent on computers connected to the Internet, we must protect them from worm attacks. Worms can gain complete control of millions of hosts in a few minutes, and they can use the infected hosts for malicious activities such as distributed denial of service attacks, relaying spam, corrupting data, and disclosing confidential information. Since worms spread too fast for humans to respond, systems that strive to contain worm epidemics must be completely automatic. We propose Vigilante, a new end-to-end architecture to contain worms automatically that addresses the limitations of network-centric systems. Vigilante relies on collaborative worm detection at end hosts, but does not require hosts to trust each other. In Vigilante, hosts run instrumented software to detect worms. We introduce dynamic dataflow analysis, a broad-coverage detection algorithm, and we show how to integrate other detection mechanisms into the Vigilante architecture. Upon worm detection, hosts generate self-certifying alerts (SCAs), a new type of security alert that can be inexpensively verified by any vulnerable host. SCAs are then broadcast over a resilient overlay network that can propagate alerts with high probability, even when under active attack. Finally, hosts receiving an SCA generate protective filters with dynamic data and control flow analysis of the vulnerable software. Our results show that Vigilante can contain fast spreading worms that exploit unknown vulnerabilities without false positives. Vigilante does not require any changes to hardware, compilers, operating systems or to the source code of vulnerable programs, and therefore can be used to protect software as it exists today in binary form\",\"PeriodicalId\":405389,\"journal\":{\"name\":\"2006 International Zurich Seminar on Communications\",\"volume\":\"138 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-02-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 International Zurich Seminar on Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IZS.2006.1649086\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Zurich Seminar on Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IZS.2006.1649086","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着我们越来越依赖连接到互联网的计算机,我们必须保护它们免受蠕虫攻击。蠕虫可以在几分钟内完全控制数百万台主机,它们可以利用受感染的主机进行恶意活动,如分布式拒绝服务攻击、转发垃圾邮件、破坏数据和泄露机密信息。由于蠕虫的传播速度太快,人类无法做出反应,因此努力控制蠕虫流行的系统必须完全自动化。我们提出了Vigilante,一种新的端到端架构,自动包含蠕虫,解决了以网络为中心的系统的局限性。Vigilante依赖于终端主机的协同蠕虫检测,但不需要主机之间的相互信任。在Vigilante中,主机运行仪器化软件来检测蠕虫。我们介绍了动态数据流分析,一种广泛覆盖的检测算法,并展示了如何将其他检测机制集成到Vigilante架构中。在检测到蠕虫后,主机生成自认证警报(sca),这是一种新型的安全警报,任何易受攻击的主机都可以廉价地进行验证。然后,sca通过弹性覆盖网络进行广播,该网络可以高概率地传播警报,即使在受到主动攻击时也是如此。最后,接收SCA的主机使用动态数据和易受攻击软件的控制流分析生成保护过滤器。我们的结果表明,治安维持者可以包含快速传播的蠕虫,利用未知的漏洞,没有误报。Vigilante不需要对硬件、编译器、操作系统或易受攻击程序的源代码进行任何更改,因此可以用来保护目前以二进制形式存在的软件
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Stopping Internet Epidemics
As we become increasingly dependent on computers connected to the Internet, we must protect them from worm attacks. Worms can gain complete control of millions of hosts in a few minutes, and they can use the infected hosts for malicious activities such as distributed denial of service attacks, relaying spam, corrupting data, and disclosing confidential information. Since worms spread too fast for humans to respond, systems that strive to contain worm epidemics must be completely automatic. We propose Vigilante, a new end-to-end architecture to contain worms automatically that addresses the limitations of network-centric systems. Vigilante relies on collaborative worm detection at end hosts, but does not require hosts to trust each other. In Vigilante, hosts run instrumented software to detect worms. We introduce dynamic dataflow analysis, a broad-coverage detection algorithm, and we show how to integrate other detection mechanisms into the Vigilante architecture. Upon worm detection, hosts generate self-certifying alerts (SCAs), a new type of security alert that can be inexpensively verified by any vulnerable host. SCAs are then broadcast over a resilient overlay network that can propagate alerts with high probability, even when under active attack. Finally, hosts receiving an SCA generate protective filters with dynamic data and control flow analysis of the vulnerable software. Our results show that Vigilante can contain fast spreading worms that exploit unknown vulnerabilities without false positives. Vigilante does not require any changes to hardware, compilers, operating systems or to the source code of vulnerable programs, and therefore can be used to protect software as it exists today in binary form
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信