Distributed Worm Simulation with a Realistic Internet Model

作者: Songjie Wei , J. Mirkovic , M. Swany

DOI: 10.1109/PADS.2005.7

关键词:

摘要: Internet worm spread is a phenomenon involving millions of hosts, who interact in complex and diverse environment. Scanning speed each infected host depends on its resources the defenses at work network. Aggressive worms further with underlying topology .. dynamics constrained by limited bandwidth network links, high-volume scan traffic leads to BGP router failure thus affecting global routing. Worm also interacts legitimate background competing for (and often winning) resources. To faithfully simulate other Internet-wide events such as DDoS, flash crowds spam we need detailed model, packet-level simulation relevant event features, realistic model whole Internet. The memory CPU requirements exceed single machineýs resources, creating distributed simulation. We propose design present implementation simulator, called PAWS. PAWS runs Emulab testbed, which facilitates use researchers. validate variety scenarios, evaluate costs benefits

参考文章(26)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
K.S. Perumalla, S. Sundaragopalan, High-fidelity modeling of computer network worms annual computer security applications conference. pp. 126- 135 ,(2004) , 10.1109/CSAC.2004.21
G.F. Riley, M.I. Sharif, Wenke Lee, Simulating Internet worms modeling, analysis, and simulation on computer and telecommunication systems. pp. 268- 274 ,(2004) , 10.1109/MASCOT.2004.1348281
Cliff C. Zou, Weibo Gong, Don Towsley, Lixin Gao, Monitoring and Early Detection for Internet Worms ,(2004)
Brian White, Jay Lepreau, Leigh Stoller, Robert Ricci, Shashi Guruprasad, Mac Newbold, Mike Hibler, Chad Barb, Abhijeet Joglekar, An integrated experimental environment for distributed systems and networks ACM SIGOPS Operating Systems Review. ,vol. 36, pp. 255- 270 ,(2002) , 10.1145/844128.844152
Cliff Changchun Zou, Weibo Gong, Don Towsley, Code red worm propagation modeling and analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 138- 147 ,(2002) , 10.1145/586110.586130
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, Monitoring and early warning for internet worms computer and communications security. pp. 190- 199 ,(2003) , 10.1145/948109.948136
Feng Wang, Lixin Gao, On inferring and characterizing internet routing policies internet measurement conference. pp. 15- 26 ,(2003) , 10.1145/948205.948208
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, Inside the Slammer worm ieee symposium on security and privacy. ,vol. 1, pp. 33- 39 ,(2003) , 10.1109/MSECP.2003.1219056
David M. Nicol, Jason Liu, Michael Liljenstam, Simulation of large scale networks II: development of an internet backbone topology for large-scale network simulations winter simulation conference. pp. 694- 702 ,(2003) , 10.5555/1030818.1030911