The Microcosmic Model of Worm Propagation

作者: Y. Wang , S. Wen , S. Cesare , W. Zhou , Y. Xiang

DOI: 10.1093/COMJNL/BXR082

关键词: Computer securitySoftwareDistributed computingSecurity industrySoftware deploymentComputer scienceComplex matrixNetwork securityComponent (UML)Process (computing)General Computer Science

摘要: Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems various popular software to prevent exploitation by worms. Modeling propagation process can help us devise effective strategies against those worms’ spreading. This paper presents a microcosmic analysis worm procedures. Our proposed model is different from traditional methods examines deep inside procedure among nodes network concentrating probability time delay described complex matrix. Moreover, since gives insight into worm's propagation, avoid errors that usually concealed macroscopic analytical models. The objectives this address three practical aspects preventing propagation: (i) where do we patch? (ii) how many need (iii) when We implement series experiments evaluate effects each major component our model. Based results drawn experiments, for high-risk vulnerabilities, it critical networks reduce number vulnerable below 80%. believe benefit security industry allowing them save significant deployment their schemes.

参考文章(21)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Robert M. May, Roy M. Anderson, Infectious Diseases of Humans: Dynamics and Control ,(1991)
Tom Britton, Håkan Andersson, Stochastic Epidemic Models and Their Statistical Analysis ,(2000)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, Citra Dwi Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Systems With Applications. ,vol. 38, pp. 306- 313 ,(2011) , 10.1016/J.ESWA.2010.06.066
Cliff Changchun Zou, Weibo Gong, Don Towsley, Worm propagation modeling and analysis under dynamic quarantine defense workshop on rapid malcode. pp. 51- 60 ,(2003) , 10.1145/948187.948197
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
M. Bailey, E. Cooke, F. Jahanian, D. Watson, J. Nazario, The Blaster worm: then and now ieee symposium on security and privacy. ,vol. 3, pp. 26- 31 ,(2005) , 10.1109/MSP.2005.106