Evaluation of attacks and countermeasures in large scale networks

作者: Karsten Bsufka , Joel Chinnow , Sahin Albayrak , Seyit Ahmet Camtepe , Rainer Bye

DOI:

关键词: Scale (chemistry)Computer wormComputer securityNetwork topologyIntervention (law)HarmEngineeringCounter measures

摘要: Computer worms represent a serious threat for modern communication infrastructures. These epidemics can cause great damage such as financial losses or interruption of critical services which support lives citizens. spread with speed prevents instant human intervention. Therefore automatic detection and mitigation techniques need to be developed. However, if these are not designed intensively tested in realistic environments, they may even more harm heavily interfere high volume flows. We present simulation model allows studies worm counter measures large scale multi-AS topologies millions IP addresses.

参考文章(22)
G. Kesidis, L. Li, P. Liu, Y. C. Jhi, Evaluation of collaborative worm containment on the DETER testbed usenix security symposium. pp. 5- 5 ,(2007)
G.F. Riley, M.I. Sharif, Wenke Lee, Simulating Internet worms modeling, analysis, and simulation on computer and telecommunication systems. pp. 268- 274 ,(2004) , 10.1109/MASCOT.2004.1348281
Jaeyeon Jung, V. Paxson, A.W. Berger, H. Balakrishnan, Fast portscan detection using sequential hypothesis testing ieee symposium on security and privacy. pp. 211- 225 ,(2004) , 10.1109/SECPRI.2004.1301325
Stephan Schmidt, Rainer Bye, Joël Chinnow, Karsten Bsufka, Ahmet Camtepe, Sahin Albayrak, Application-level Simulation for Network Security international conference on advances in system simulation. ,vol. 86, pp. 311- 330 ,(2010) , 10.1177/0037549709340730
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Byungseung Kim, Hyogon Kim, Saewoong Bahk, None, FDF: Frequency detection-based filtering of scanning worms Computer Communications. ,vol. 32, pp. 847- 857 ,(2009) , 10.1016/J.COMCOM.2008.12.010
Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert Cunningham, A taxonomy of computer worms workshop on rapid malcode. pp. 11- 18 ,(2003) , 10.1145/948187.948190
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
George Bakos, Vincent H. Berk, Early detection of Internet worm activity by metering ICMP destination unreachable messages Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement. ,vol. 4708, pp. 33- 42 ,(2002) , 10.1117/12.479290