Analysis of a scanning model of worm propagation

作者: Ezzat Kirmani , Cynthia S. Hood

DOI: 10.1007/S11416-008-0111-3

关键词:

摘要: The traditional approach to modeling of internet worm propagation is adopt a mathematical model, usually inspired by the spread infectious diseases, describing expected number hosts infected as function time since start infection. predictions such model are then used evaluate, improve, or develop defense and containment strategies against worms. However, proper complete understanding goes well beyond formula given chosen for at time. Thus, questions fitting assessing extent which specific realization may differ from model’s predictions, behavior points infections occur, estimation effects misspecification parameters must also be considered. In this paper, we address well-known random constant (RCS) propagation. We first generalize RCS our nonhomogeneous scanning (NHRS) model. NHRS allows worm’s contact rate vary during it thus captures far more situations interest than assumes in consider problem these models empirical data give simulation procedure epidemic. show how obtain confidence interval unknown addition, use prior information about discussed. results methodologies paper illuminate structure application

参考文章(12)
David Dagon, Cliff Wang, Wenke Lee, Botnet Detection: Countering the Largest Security Threat Springer Publishing Company, Incorporated. ,(2010)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
Giuseppe Serazzi, Stefano Zanero, Computer Virus Propagation Models Performance Tools and Applications to Networked Systems. pp. 26- 50 ,(2004) , 10.1007/978-3-540-24663-3_2
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Sihan Qing, Weiping Wen, A survey and trends on Internet worms Computers & Security. ,vol. 24, pp. 334- 346 ,(2005) , 10.1016/J.COSE.2004.10.001
David Moore, Colleen Shannon, k claffy, Code-Red: a case study on the spread and victims of an internet worm acm special interest group on data communication. pp. 273- 284 ,(2002) , 10.1145/637201.637244
David M. Nicol, The impact of stochastic variance on worm propagation and detection Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 57- 64 ,(2006) , 10.1145/1179542.1179555
Z. Chen, L. Gao, K. Kwiat, Modeling the spread of active worms international conference on computer communications. ,vol. 3, pp. 1890- 1900 ,(2003) , 10.1109/INFCOM.2003.1209211
J.O. Kephart, S.R. White, Measuring and modeling computer virus prevalence ieee symposium on security and privacy. pp. 2- 15 ,(1993) , 10.1109/RISP.1993.287647
D. Moore, C. Shannon, G.M. Voelker, S. Savage, Internet quarantine: requirements for containing self-propagating code international conference on computer communications. ,vol. 3, pp. 1901- 1910 ,(2003) , 10.1109/INFCOM.2003.1209212