Self-adaptive Worms and Countermeasures
نویسندگان
چکیده
In this paper, we address issues related to defending against widespreading worms on the Internet. We study a new class of worms called the selfadaptive worms. These worms dynamically adapt their propagation patterns to defensive countermeasures, in order to avoid or postpone detection, and to eventually infect more computers. We show that existing worm detection schemes cannot effectively defend against these self-adaptive worms. To counteract these worms, we introduce a game-theoretic formulation to model the interaction between worm propagator and defender. We show that the effective integration of multiple defensive schemes (e.g., worm detection, forensics analysis) is critical for defending against self-adaptive worms. We propose different combinations of defensive schemes for different kinds of self-adaptive worms, and evaluate the performance of defensive schemes based on real-world traffic traces.
منابع مشابه
Detecting Scanners: Empirical Assessment on a 3G Network
Malicious agents like self-propagating worms often rely on port or address scanning to discover new potential victims. The ability to detect active scanners based on passive traffic monitoring is an important prerequisite for taking appropriate countermeasures. In this work we evaluate experimentally two common algorithms for scanner detection based on extensive analysis of real traffic traces ...
متن کاملOptimal Control Model for Attack of Worms in Wireless Sensor Network
Wireless Sensor Network (WSN) is composed of large number of sensor nodes which communicate with each other through wireless medium. Such networks are prone to the attack of self-replicating worms known as malware used to bring different form of attacks on the WSN during the communication of the sensor nodes. Efficient countermeasures to anticipate malware hazards are to be developed and unders...
متن کاملGenetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures
Internet worms remain one of the major threats to the Internet infrastructure. Modeling allows forecasting the malware propagation consequences and evolution trends, planning countermeasures and many other tasks that cannot be investigated without harm to production systems in the wild. Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. foreca...
متن کاملWorm Propagation and Countermeasures
Recent history has amply demonstrated the threat that worms pose to the Internet and those who rely on its correct functioning. Most of the damage done by worms can be traced to the burden they place on networks due to their characteristic exponential growth as they seek to propagate themselves. As such, if security professionals can develop a framework for preventing worm propagation then they...
متن کاملA Comparison of Self-Compassion and Self-Esteem Based on Their Relationship With Adaptive and Maladaptive Emotion Regulation Strategies
Objective: The purpose of this study was to investigate the relationship between adaptive and maladaptive cognitive emotion regulation strategies, self-compassion, and self-esteem; and to determine whether self-compassion compared to self-esteem, was a better predictor of the scores on the adaptive and maladaptive cognitive emotion regulation strategies. Methods: This was a cross-section...
متن کامل