skip to main content
10.1145/1029618.1029624acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

The top speed of flash worms

Published:29 October 2004Publication History

ABSTRACT

Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could saturate one million vulnerable hosts on the Internet in under 30 seconds[18]. We grossly over-estimated.

In this paper, we revisit the problem in the context of single packet UDP worms (inspired by Slammer and Witty). Simulating a flash version of Slammer, calibrated by current Internet latency measurements and observed worm packet delivery rates, we show that a worm could saturate 95% of one million vulnerable hosts on the Internet in 510 milliseconds. A similar worm using a TCP based service could 95% saturate in 1.3 seconds.

The speeds above are achieved with flat infection trees and packets sent at line rates. Such worms are vulnerable to recently proposed worm containment techniques [12, 16, 25]. To avoid this, flash worms should slow down and use deeper, narrower trees. We explore the resilience of such spread trees when the list of vulnerable addresses is inaccurate. Finally, we explore the implications of flash worms for containment defenses: such defenses must correlate information from multiple sites in order to detect the worm, but the speed of the worm will defeat this correlation unless a certain fraction of traffic is artificially delayed in case it later proves to be a worm.

References

  1. CAIDA. Skitter Datasets. http://www.caida.org/tools/measurement/skitter/.Google ScholarGoogle Scholar
  2. Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms. In IEEE INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. Dovrolis, R. Prasad, N. Brownlee, and k. claffy. Bandwidth Estimation: Metrics, Measurement Techniques, and Tools. IEEE Network, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Forescout. Wormscout, http://www.forescout.com/wormscout.html.Google ScholarGoogle Scholar
  5. N. Hindocha and E. Chien. Malicious Threats and Vulnerabilities in Instant Messaging. Technical report, Symantec, 2003.Google ScholarGoogle Scholar
  6. J. Jung, V. Paxson, A. W. Berger, and H. B. Nan. Fast Portscan Detection Using Sequential Hypothesis Testing. In 2004 IEEE Symposium on Security and Privacy, to appear, 2004.Google ScholarGoogle Scholar
  7. J. Jung and S. Schechter. Fast Detection of Scanning Worms Using Reverse Sequential Hypothesis Testing and Credit-Based Connection Rate Limiting. Submitted to Usenix Security 2004, 2004.Google ScholarGoogle Scholar
  8. H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the 14th USENIX Security Symposium. USENIX, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mirage Networks. http://www.miragenetworks.com/.Google ScholarGoogle Scholar
  10. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Magazine of Security and Privacy, pages 33--39, July/August 2003 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Moore, C. Shannon, and J. Brown. Code-Red: a Case Study on the Spread and Victims of an Internet Worm. In Proceedings of the Second Internet Measurement Workshop, pages 273--284, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code, 2003.Google ScholarGoogle Scholar
  13. D. Nojiri, J. Rowe, and K. Levitt. Cooperative Response Strategies for Large Scale Attack Mitigation. In Proc. DARPA DISCEX III Conference, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  14. C. Shannon and D. Moore. The Spread of the Witty Worm. To appear in IEEE Security and Privacy, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Sing, C. Estan, G. Varghese, and S. Savage. The EarlyBird System for Realtime Detection of Unknown Worms: UCSD Tech Report CS2003-0761.Google ScholarGoogle Scholar
  16. S. Staniford. Containment of Scanning Worms in Enterprise Networks. Journal of Computer Security, to appear, 2004.Google ScholarGoogle Scholar
  17. S. Staniford and C. Kahn. Worm Containment in the Internal Network. Technical report, Silicon Defense, 2003.Google ScholarGoogle Scholar
  18. S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in Your Spare Time. In Proceedings of the 11th USENIX Security Symposium. USENIX, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. The Honeynet Project. http://lwww.honeynet.org/l.Google ScholarGoogle Scholar
  20. J. Twycross and M. M. Williamson. Implementing and Testing a Virus Throttle. In Proceedings of the 12th USENIX Security Symposium. USENIX, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Venkataraman, D. Song, P. Gibbons, and A. Blum. New Streaming Algorithms for Fast Detection of Superspreaders.Google ScholarGoogle Scholar
  22. A. Wagner, T. Dubendorfer, B. Plattner, and R. Hiestand. Experiences with Worm Propagation Simulations. In Proceedings of the 2003 ACM workshop on Rapid Malcode, pages 34--41, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In The First ACM Workshop on Rapid Malcode (WORM), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Weaver, S. Staniford, and V. Paxson. Very Fast Containment of Scanning Worms. Submitted to Usenix Security 2004, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Mobile Malicious Code. In ACSAC, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. Zhang, N. Duffield, V. Paxson, and S. Shenker. On the Constancy of Internet Path Properties. In Proc. ACM SIGCOMM Internet Measurement Workshop, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The top speed of flash worms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode
        October 2004
        100 pages
        ISBN:1581139705
        DOI:10.1145/1029618
        • Program Chair:
        • Vern Paxson

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader