The Community for Technology Leaders
Workshop on Principles of Advanced and Distributed Simulation (PADS'05) (2005)
Monterey, Californi
June 1, 2005 to June 3, 2005
ISSN: 1087-4097
ISBN: 0-7695-2383-8
pp: 199-206
Cliff C. Zou , University of Massachusetts at Amherst
Don Towsley , University of Massachusetts at Amherst
Weibo Gong , University of Massachusetts at Amherst
Songlin Cai , University of Massachusetts at Amherst
<p>Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this paper, we present an advanced worm called "routing worm", which implements two advanced attacking techniques. First, a routing worm uses BGP routing tables to only scan the Internet routable address space, which allows it propagate three times faster than a traditional worm. Second, and more importantly, the geographic information of BGP routing prefixes enables a routing worm to conduct pinpoint "selective attacks" by imposing heavy damage to vulnerable computers in a specific country, company, Internet Service Provider, or Autonomous System, without collateral damage done to others.</p> <p>Because of the inherent publicity of BGP routing tables, attackers can easily deploy routing worms, which distinguishes the routing worm from other "worst-case" worms. Compared to a traditional worm, a routing worm could possibly cause more severe congestion to the Internet backbone since all scans sent out by a routing worm are Internet routable (and can only be dropped at the destinations). In addition, it is harder to quickly detect a routing-worm infected computer since we cannot distinguish illegal scans from regular connections without waiting for traffic responses. In order to defend against routing worms and all scanning worms, an effective way is to upgrade the current Internet from IPv4 to IPv6, although such an upgrade will require a tremendous effort and is still a controversial issue.</p>

S. Cai, D. Towsley, C. C. Zou and W. Gong, "Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information," Workshop on Principles of Advanced and Distributed Simulation (PADS'05)(PADS), Monterey, Californi, 2005, pp. 199-206.
93 ms
(Ver 3.3 (11022016))