




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、a study of mass-a study of mass-mailing wormsmailing wormsby cynthia wong, stan bielski, jonathan m. mccune, and chenxi wang, carnegie mellon university, 2004presented by allen stonemass-mailing wormsmass-mailing worms background (morris, code red, and slammer) analysis of sobig and mydoom worms ano
2、malies tcp ip addresses dns traffic in general discussion and conclusions protectionworms what are they?worms what are they?“a self-replicating computer program, similar to a computer virus. a virus attaches itself to, and becomes part of, another program; however, a worm is self-contained and does
3、not need to be part of another program to propagate itself. they are often designed to exploit the file transmission capabilities found on many computers.” - wikipedia ()the morris wormthe morris worm the first internet worm, written by robert t. morris, jr., a first-year computer scien
4、ce student at cornell university. infected roughly six thousand machines nationwide in november of 1988. performance of victim machines drastically reduced because of propagation attempts.scanning wormsscanning worms typical worms use aggressive ip scanning to find potential victim machines that are
5、 vulnerable to the exploit it carries. code red, 2001 359,000 computers infected within 14 hours. iis exploit spread through web scanning.mass-mailing wormsmass-mailing worms sends itself via email. usually infects with email attachments. harvests email addresses from address book, web cache, and ha
6、rd disk. (unlike viruses) no need to acquire new targets. tricks users into running malicious code on their own machines. some worms use their own smtp engine.analysisanalysis the sobig and mydoom mass-mailing worms real network trace data, collected from the edge router of cmus electrical and compu
7、ter engineering department two week periods (aug. sept. 2003 and jan. feb. 2004)infected or chatty? infected or chatty? heuristics of suspicionheuristics of suspicion outgoing smtp connections on a controlled network not going to an authorized mail server. message payload similar to the payload size
8、s of known worm traffic from symantec. admittedly not 100 percent accurate.worm effect tcp trafficworm effect tcp traffic scanning worms have spikes in all kinds of traffic, caused by scanning for other boxes to compromise. mass-mailing worms use email to spread to potential victim boxes through mai
9、l service over tcp.worm effect tcp trafficworm effect tcp trafficworm effect tcp trafficworm effect tcp traffic since the worms use their own smtp engines, there should be no outbound smtp traffic spikes from the existing mail servers. there is a spike in traffic with sobig, but not mydoom. spoofed
10、emails from the harvest of addresses creates false guesses, which create backscatter. sobig is more aggressive than mydoom during propagation.worm effect distinct ipsworm effect distinct ips normal boxes that are not infected touch an average number of distinct ips in a given day. infected boxes use
11、 email addresses from all over, from the harvest. the number of distinct ips an infected system touches should be noticably larger. the number of ips a mail server touches should not change, intuitively, since they already send to new ips on a regular basis.worm effect distinct ipsworm effect distin
12、ct ips infected boxes experienced a rise mail servers did as well, despite the expectation.worm effect - dnsworm effect - dns dns related events expected to rise, since smtp needs to resolve the ip associated with email addresses.worm effect - dnsworm effect - dnsworm effect overall worm effect over
13、all traffictraffic http traffic dominates the network, with over 90% of all inbound and outbound traffic. do the infected systems make a large impact on that fact?worm effect overall trafficworm effect overall trafficdiscussion and discussion and conclusionsconclusions mass-mailing worms show signif
14、icant and noticeable impact on a network. prevention measures at the dns server, rather than at the smtp server. detection focused on outgoing tcp, dns, and distinct ips, rather than on whole-network anomaly, due to the impact of http.discussion and discussion and conclusionsconclusions both worms o
15、verran the network. sobig moreso than mydoom. smtp servers still affected, even with mail clients on the worms, due to backscatter. antivirus software on mail servers actually counter-productive as a defense measure.protectionprotection detect worms either at the border router or individual systems. utilize dns servers to limit the spread of the worm, possibly quarantining malicio
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 输电钢管杆预埋螺栓式承台柱抗扭性能研究
- 修脚师安全实操知识考核试卷含答案
- 地理信息采集员操作规程评优考核试卷含答案
- 丝麻毛纤维预处理工班组安全测试考核试卷含答案
- 医疗护理员操作评估评优考核试卷含答案
- 面向RAG的隐私保护个性化跨域检索技术研究
- 石英晶体生长设备操作工安全应急知识考核试卷含答案
- 气灸课件教学课件
- 井下充填制备工保密模拟考核试卷含答案
- 歌曲《太阳出来喜洋洋》说课稿-2025-2026学年小学音乐花城版三年级上册-花城版
- 王崧舟“诗意语文”教学艺术剖析
- 生产工单结案管理规定
- 国有企业招标采购相关法律法规与国有企业采购操作规范
- 应收账款明细台账模板
- 师德师风负面清单及整改台账
- 私募基金资金募集服务协议模板
- 小学六年级科学《太阳能》
- 【下载】新概念英语1-4册词汇带音标Excel版
- GB/T 23932-2009建筑用金属面绝热夹芯板
- 骨骼肌肉疼痛康复治疗新进展课件
- 农业昆虫分类演示文稿课件
评论
0/150
提交评论