An Automated Defense System to Counter Internet Worms

نویسندگان

  • Riccardo Scandariato
  • John C. Knight
چکیده

Our society is highly dependent on network services such as the Web, email, and collaborative P2P enterprise applications. But what if such infrastructures were suddenly torn down? Both past incidents and research studies show that a well-engineered Internet worm can accomplish such a task in a fairly simple way and, most notably, in a matter of a few minutes. This clearly rules out the possibility of manually countering worm outbreaks. We present a testbed that operates on a cluster of computers and emulates very large networks for purposes of experimentation. A wide variety of worm properties can be studied and network topologies of interest constructed. A reactive control system, based on the Willow architecture, operates on top of the testbed and provides a monitor/analyze/respond approach to deal with infections automatically. The logic driving the control system is synthesized from a formal specification, which is based on control rules that correlate sensor events. Details of our highly configurable testbed, the theory of operation of the Willow architecture, the features of the specification language, and various experimental performance results are presented. Index Terms Internet worm, emulation platform, defense system, Willow architecture, reactive control, policy rules Submission category Regular paper Approximate word count 10510 The material included in this paper has been cleared through the authors’ affiliations

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Response in Distributed Firewall Systems

Firewalls are currently the prominent defense against network attacks. These devices can play a crucial role in preserving the wellbeing of commercial as well as personal networks. However, the correct configuration of firewalls is hardly a trivial task, especially in distributed environments. A variety of anomalies can affect the proper functioning of firewalls. This paper discusses possible f...

متن کامل

Defending against hitlist worms using network address space randomization q

Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescales where human responses are unlikely to be effective. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where ...

متن کامل

Peer-to-peer system-based active worm attacks: Modeling, analysis and defense

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.08.008 * Corresponding author. Tel.: +1 214 208 5951. E-mail addresses: [email protected] (W. Yu), ch pan), [email protected] (X. Wang), xuan@cs Active worms continue to pose major threats to the security of today’s Internet. This is due to the ability of active worms to automatically propagate themselves and co...

متن کامل

Concept, Characteristics and Defending Mechanism of Worms

Worms are a common phenomenon in today’s Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types– Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The In...

متن کامل

DEFENDING AGAINST INTERNET WORMS By YONG TANG A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy DEFENDING AGAINST INTERNET WORMS By Yong Tang May 2006 Chair: Dr. Shigang Chen Major Department: Computer and Information Science and Engineering With the capability of infecting hundreds of thousands of hosts, worms represent a major th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003