Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior

作者: Kevin R. B. Butler , Patrick D. McDaniel

DOI: 10.1007/11593980_3

关键词:

摘要: Worms are becoming increasingly hostile. The exponential growth of infection rates allows small outbreaks to have worldwide consequences within minutes. Moreover, the collateral damage caused by infections can cripple entire Internet. While harmful, such behaviors historically been short-lived. We assert future holds much more caustic malware. Attacks based on mutation and covert propagation likely be ultimately damaging long lasting. This assertion is supported observations natural systems, where similarly behaving parasites represent far most successful class living creatures. talk considers a parasite for Internet, providing biological metaphors its behavior demonstrating structure pathogens. Through simulation, we show that even with low rates, mutating pathogen will eventually infect an community. posit inevitability consider ways they mitigated.

参考文章(34)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
George Macdonald, The Epidemiology and Control of Malaria. The Epidemiology and Control of Malaria.. pp. 102- 102 ,(1957)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Charles Darwin, On the Origin of Species, 1859 Routledge. ,(2004) , 10.4324/9780203509104
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Rajeev Alur, Kousha Etessami, P. Madhusudan, A Temporal Logic of Nested Calls and Returns tools and algorithms for construction and analysis of systems. ,vol. 2988, pp. 467- 481 ,(2004) , 10.1007/978-3-540-24730-2_35
Luca de Alfaro, Marta Kwiatkowska, Gethin Norman, David Parker, Roberto Segala, Symbolic Model Checking of Probabilistic Processes Using MTBDDs and the Kronecker Representation tools and algorithms for construction and analysis of systems. pp. 395- 410 ,(2000) , 10.1007/3-540-46419-0_27
S. Rubin, S. Jha, B.P. Miller, Automatic generation and analysis of NIDS attacks annual computer security applications conference. pp. 28- 38 ,(2004) , 10.1109/CSAC.2004.9
Xin Yao, An overview of evolutionary computation european conference on machine learning. pp. 442- 459 ,(1993) , 10.1007/3-540-56602-3_163