Internet Quarantine: Requirements for Containing Self-Propagating Code

نویسندگان

  • David Moore
  • Colleen Shannon
  • Geoffrey M. Voelker
  • Stefan Savage
چکیده

It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such “worm” outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period – incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, there is considerable effort focused on developing technical means for detecting and containing worm infections before they can cause such damage. This paper does not propose a particular technology to address this problem, but instead focuses on a more basic question: How well will any such approach contain a worm epidemic on the Internet? We describe the design space of worm containment systems using three key parameters – reaction time, containment strategy and deployment scenario. Using a combination of analytic modeling and simulation, we describe how each of these design factors impacts the dynamics of a worm epidemic and, conversely, the minimum engineering requirements necessary to contain the spread of a given worm. While our analysis cannot provide definitive guidance for engineering defenses against all future threats, we demonstrate the lower bounds that any such system must exceed to be useful today. Unfortunately, our results suggest that there are significant technological and administrative gaps to be bridged before an effective defense can be provided in today’s Internet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tartarus: A honeypot based malware tracking and mitigation framework

On a daily basis many of the hosts connected to the Internet experience continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the concern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on kn...

متن کامل

Synthesis of Al2O3-ZrO2 Nanocomposite by Mechanical Activated Self-propagating High Temperature Synthesis(MASHS) and Ignited via Laser

By consideration of unique properties of composite Al2O3-ZrO2 such as high toughness, high wear resistant and relative low thermal expansion, in this study, nanocomposite of Al2O3-ZrO2 was produced by Mechanical activated Self propagating High-temperature Synthesis (MASHS) using laser beam for ignition. First Al and ZrO2 powders were mixed in the mole ratio of 1:1 and milled for 1, 3 and 6 hour...

متن کامل

Petri Net and Probabilistic Model Checking Based Approach for the Modelling, Simulation and Verification of Internet Worm Propagation.

Internet worms are analogous to biological viruses since they can infect a host and have the ability to propagate through a chosen medium. To prevent the spread of a worm or to grasp how to regulate a prevailing worm, compartmental models are commonly used as a means to examine and understand the patterns and mechanisms of a worm spread. However, one of the greatest challenge is to produce meth...

متن کامل

Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace

The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system’s capability to produce a stable view of the overall network reachability. Several global-scale Internet failures driven by the uncontrollable spreading of self-propagating code exploiting homogeneous security vulnerabilities ...

متن کامل

Monitoring and Early Detection for Internet Worms

After several Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threat, we must build an early detection system to detect the presence of a worm as quickly as possible in order to give people enough time for counteractions. In this paper, we firs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003