Virtual Playgrounds for Worm Behavior Investigation

نویسندگان

  • Xuxian Jiang
  • Dongyan Xu
  • Helen J. Wang
  • Eugene H. Spafford
چکیده

To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their infection, damage, and propagation. However, major challenges exist in realizing such “worm playgrounds”, including the playgrounds’ fidelity, confinement, scalability, as well as convenience in worm experiments. In this paper, we present a virtualizationbased platform to create virtual worm playgrounds, called vGrounds, on top of a physical infrastructure. A vGround is an all-software virtual environment dynamically created for a worm attack. It has realistic end-hosts and network entities, all realized as virtual machines (VMs) and confined in a virtual network (VN). The salient features of vGround include: (1) high fidelity supporting real worm codes exploiting real vulnerable services, (2) strict confinement making the real Internet totally invisible and unreachable from inside a vGround, (3) high resource efficiency achieving sufficiently large scale of worm experiments, and (4) flexible and efficient worm experiment control enabling fast (tens of seconds) and automatic generation, re-installation, and final teardown of vGrounds. Our experiments with real-world worms (including multi-vector worms and polymorphic worms) have successfully exhibited their probing and propagation patterns, exploitation steps, and malicious payloads, demonstrating the value of vGrounds for worm detection and defense research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Whoʼs Watching Your Children? Value Propositions in Preteen Virtual Worlds

This poster presents a critical, values-oriented investigation of a specific space within the online universe: shared virtual playgrounds designed for preteens. Specifically we investigate three preteen worlds with a focus on the sites’ technical features designed to support value concerns (e.g. privacy, security, obedience) and critically examine the potential influence of these features from ...

متن کامل

40 per Va Si V E Computing Play and Interactive Playgrounds

P lay has been widely studied in the human sciences because of its importance in children’s physical and cognitive development.1 Recently, computer scientists have also begun to address play by building interactive playgrounds—technology-enhanced installations that combine the fun and immersion of digital games with the benefits of traditional free play. The size of these colocated spaces can v...

متن کامل

Investigation of Incidence of Taenia Echinocococus Worm on Stray Dogs in Tehran

SUMMARY hydatic cyst is a serious disease of man. That cause by a worm called taenia echinocococus, the adult worm lives in small bowel of dog and other canine host. The dog is the usual definitive host of this parasite and is important for transmition of this disease. In this study a total of 283 stray dags Teheran country were investigated for the present of intestinal metazoan parasites. T...

متن کامل

The Impact Of Playground Green Space To Supply Physical And Mental Needs Of 9-12 Years Old Children For Their Emotional, Social And Cognitive Development

Childhood is a very important age period and often has been overlooked. As unawareness that many behavioral traits affect experiences of the early years of our lives so the environment in action and learning during the operation, play a crucial role. When it comes to in public areas and keeping with their peers, children could learn many life circums‌tances, known as social behaviors. This s‌tu...

متن کامل

CERIAS Tech Report 2005-81 CSD TR #05-028 PROVENANCE-AWARE TRACING OF WORM BREAK-IN AND CONTAMINATIONS: A PROCESS COLORING APPROACH

To investigate the exploitation and contamination by self-propagating Internet worms, a provenanceaware tracing mechanism is highly desirable. Provenance unawareness causes difficulties in fast and accurate identification of a worm’s break-in point (namely, a remotely-accessible vulnerable service running in the infected host), and incurs significant log data inspection overhead. This paper pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005