摘要
由于预先搜集漏洞的目标列表蠕虫很难被检测到并且传播速度快,所以那些自动预防机制可能无法及时做出反应。在此试验了一种新的称作随机网络地址的前摄预防机制,其目标是加固网络尤其是抵抗目标列表蠕虫,探索并介绍了其原型,试验了方法的有效性及局限性。此方法通过频繁更改主机地址的方法使得目标列表失效,达到限制或是减慢了目标列表蠕虫的感染速度并且迫使他们暴露特征,使得他们更容易在边界处就被清除。
It's hard to detecting hitlist worm when it collects vulnerability in advance. And hitlist worm has a high speed of propagation , so automated defenses may not be able to react in a timly. The article examines a new proactive defense mechanism called network address space randomization whose objective is to harden networks specifically against hitlist worm. We explore and introduce a prototype of it as well as examining the effectiveness and limitations of the approach. The idea behind this method is that hitlist information could be rendered stale if hosts are forced to frequently change their IP addresses. Network address space randomization limits or slows down hitlist worms and forced them exhibit features that make them easier to clear at the perimeter.
出处
《微计算机信息》
2009年第6期85-87,共3页
Control & Automation