Creation of the importance scanning worm using information collected by Botnets

  • Authors:
  • Yoon-Ho Choi;Peng Liu;Seung-Woo Seo

  • Affiliations:
  • College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA;College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802, USA;School of Electrical Engineering and Computer Sciences, Seoul National University, Seoul 151-744, Republic of Korea

  • Venue:
  • Computer Communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.24

Visualization

Abstract

Importance scanning worm exploits a non-uniform distribution of vulnerable hosts on the Internet. To realize an importance scanning worm, the attacker needs to obtain or estimate the distribution of vulnerable hosts. Zesheng Chen and Chuanyi Ji claimed that a worm can infer the distribution of vulnerable hosts on the Internet by either using public information (e.g., empirical distribution of web servers) or using the distribution of worm-infected hosts during worm propagation. However, the first method may often fail and the second method may not be fast as expected. In this paper, we answer the question, ''How do we determine which part on the Internet is more vulnerable, while maintaining a simple worm propagation mechanism?''. To learn the distribution of vulnerable hosts on the Internet, the proposed estimation method applies statistical sampling and estimation theory while using a Botnet, which is a distributed network of Bots. From analytical models and their validation results, we show the proposed estimation method can get sufficiently accurate estimations; in many cases, the good-enough sampling ratio is as small as 0.6%. Also, it is shown that the estimated distribution is unbiased toward the actual distribution of vulnerable hosts on the Internet. Thus, we believe that the estimated distribution table of vulnerable hosts on the Internet will help the worm identify target systems more effectively.