On the performance of internet worm scanning strategies

作者: Cliff C. Zou , Don Towsley , Weibo Gong

DOI: 10.1016/J.PEVA.2005.07.032

关键词:

摘要: In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to security Internet. order defend against future it is important first understand how worms propagate different scanning strategies affect worm propagation dynamics. this paper, we systematically model analyze under various strategies, uniform scan, routing hit-list cooperative local preference sequential divide-and-conquer target etc. We also provide an analytical accurately Witty worm's destructive behavior. By using same modeling framework, reveal underlying similarity relationship between strategies. addition, based on our simulation analysis monitoring, a guideline for building better monitoring infrastructure.

参考文章(29)
David Moore, Colleen Shannon, Geoffrey M Voelker, Stefan Savage, Network Telescopes: Technical Report ,(2004)
Eugene H. Spafford, The internet worm: crisis and aftermath Communications of The ACM. ,(1989)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
David M. Nicol, Michael Liljenstam, Models of Active Worm Defenses Coordinated Science Laboratory, University of Illinois at Urbana-Champaign. ,(2004)
Yang Wang, D. Chakrabarti, Chenxi Wang, C. Faloutsos, Epidemic spreading in real networks: an eigenvalue viewpoint symposium on reliable distributed systems. pp. 25- 34 ,(2003) , 10.1109/RELDIS.2003.1238052
Niels Provos, A virtual honeypot framework usenix security symposium. pp. 1- 1 ,(2004)
George Kesidis, Ihab Hamadeh, Soranun Jiwasurat, Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms Quality of Service in Multiservice IP Networks. ,vol. 3375, pp. 101- 109 ,(2005) , 10.1007/978-3-540-30573-6_8
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
Sarma Vangala, Kevin A. Kwiat, Lixin Gao, Jiang Wu, An Effective Architecture and Algorithm for Detecting Worms with Various Scan. network and distributed system security symposium. ,(2004)
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130