Proceedings of the 4th ACM Workshop on Recurring Malcode 2006
DOI: 10.1145/1179542.1179554
|View full text |Cite
|
Sign up to set email alerts
|

On the impact of dynamic addressing on malware propagation

Abstract: While malware models have become increasingly accurate over the past few years, none of the existing proposals accounts for the use of Network Address Translation (NAT). This oversight is problematic since many network customers use NAT in their local networks. In fact, measurements we collected from a distributed honeynet show that approximately 19% of the infected hosts reside in NATted domains. To account for this fact, we present a model that can be used to understand the impact of varying levels of NAT de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 13 publications
(21 reference statements)
0
14
0
Order By: Relevance
“…Conversely, DHCP will cause a single host's scanning activity to consistently manifest as originating from multiple hosts, when in fact, that host's source address lease had expired and subsequently a new address was acquired. Therefore, we postulate that such consistent effects (along with random source spoofing) alter the density of routable addresses on the Internet and are more likely to impact the speed of specific malware 1371 propagation (as discussed in [12]), which is irrelevant to the self-similar aggregate characteristics that are studied in this paper.…”
Section: Classificationmentioning
confidence: 96%
“…Conversely, DHCP will cause a single host's scanning activity to consistently manifest as originating from multiple hosts, when in fact, that host's source address lease had expired and subsequently a new address was acquired. Therefore, we postulate that such consistent effects (along with random source spoofing) alter the density of routable addresses on the Internet and are more likely to impact the speed of specific malware 1371 propagation (as discussed in [12]), which is irrelevant to the self-similar aggregate characteristics that are studied in this paper.…”
Section: Classificationmentioning
confidence: 96%
“…This fragmented attack commands into multiple packets interspersed with irrelevant data that was discarded after the intrusion detection system of the target site examined the stream for attacks, but before the stream reached the target. Other multistage attacks, often in the guise of malware (see for example [2,4,7,12] are "multistage" in their activation or execution. Models [8,14,19] and interpretative methods such as visualization [13] have been created and applied to help understand how multistage attacks work and how they spread.Of these attacks, the Internet worm is closest to what we describe.…”
Section: Related Workmentioning
confidence: 99%
“…This is a promising countermeasure since it is much more feasible than rate limiting. Deployment of Network Address Translation (NAT) can slow down the spread of active worms employing the localized scanning approach [25]. This is due to decreased hitting probability caused by decreased vulnerability density inside NAT.…”
Section: Defending Against the Propagation Of Active Wormsmentioning
confidence: 99%