Worm damage minimization in enterprise networks

作者: Surasak Sanguanpong , Urupoj Kanlayasiri

DOI: 10.1016/J.IJHCS.2006.09.001

关键词:

摘要: Attackers utilize many forms of intrusion via computer networks; currently, worms are an important vector with the potential for widespread damage. None strategies is effective and rapid enough to mitigate worm propagation. Therefore, it extremely organizations better understand behaviour adopt a strategy minimize damage due attacks. This paper describes approach infection in enterprise networks. The includes: (1) analyzing effect parameters influencing infection: openness, homogeneity, trust, (2) predicting number infected nodes by fuzzy decision, (3) optimizing trust parameter control. Experiments using real attacks show that selected strongly correlated actual rates, prediction produces accurate estimates, optimization can lessen from infection.

参考文章(28)
Karl Levitt, Steven Cheung, Jeremy Frank, Raymond Yip, Rick Crawford, Mark Dilger, Stuart Staniford-Chen, Jim Hoagland, Je Rowe, Dan Zerkle, The Design of GrIDS: A Graph-Based Intrusion Detection System ,(2007)
Ronald Christensen, Foundations of inductive reasoning ,(1964)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Eric A. Brewer, Alexander Aiken, David A. Wagner, Jeffrey S. Foster, A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. network and distributed system security symposium. ,(2000)
Perry Wagle, Jonathan Walpole, Calton Pu, Steve Beattie, Aaron Grier, Crispin Cowan, Heather Hintony, Qian Zhang, Peat Bakke, Dave Maier, StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks usenix security symposium. pp. 5- 5 ,(1998)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Vishal Misra, Wei-Bo Gong, Don Towsley, Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED acm special interest group on data communication. ,vol. 30, pp. 151- 160 ,(2000) , 10.1145/347057.347421
Darrell M. Kienzle, Matthew C. Elder, Recent worms: a survey and trends workshop on rapid malcode. pp. 1- 10 ,(2003) , 10.1145/948187.948189
Lotfi A. Zadeh, Fuzzy logic, neural networks, and soft computing Communications of The ACM. ,vol. 37, pp. 77- 84 ,(1994) , 10.1145/175247.175255