Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation

نویسندگان

  • Ming Wan
  • Ying Liu
  • Jianqiang Tang
  • Hongke Zhang
  • Si-yu Lin
چکیده

As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier separation, we systematically analyze the mitigation of worm propagation in three aspects: address semantics, address space and mapping delay. By applying the classical AAWP and SIR worm propagation models, we give a quantitative comparison between today’s Internet and networks with locator/identifier separation. In particular, our research results show that, the characteristics of locator/identifier separation can help to markedly mitigate worm propagation, and networks with locator/identifier separation are more resistant to worm propagation than today’s Internet.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Initial Studies on Worm Propagation in Manets for Future Army Combat Systems

This study presents an analysis of computer worm propagation in a Mobile Ad-hoc Network (MANET). According to the recent DARPA BAA Defense Against Cyber Attacks on MANETS (DARPA, 2004), ”One of the most severe cyber threats is expected to be worms with arbitrary payload that can infect and saturate MANET-based networks on the order of seconds”. Critical to the design of effective worm counter m...

متن کامل

The Study of different rations of spawning efficiency of siamese fighting fish (Bettasplendens)

The effects of five different foods including: blood worm, artemia cyst, Artemia mass powder, gammarus mass powder and ordinary commercial food were studied on Siamese fighting fish (Bettasplendens) propagation efficiency during thirty days in a Randomize Totally Design with 4 repeats .Experimental plots had been consisted of twenty 30*30*40 (cm) aquarium which a pair of male and female brood s...

متن کامل

Modeling, Analysis, and Mitigation of Internet Worm Attacks

In recent years, worms have become one of the major threats to the security of the Internet. In this talk, I will present our research on modeling, analysis, and mitigation of Internet worm attacks, which includes: (1) We present a “two-factor worm model”, which considers the impact of human counteractions and network congestion on a worm's propagation. (2) To detect the presence of an Internet...

متن کامل

Can TCP and Locator/ID Separation get along?

Aiming at solving the scalability problem that the current Internet is facing, the separation of the IP namespace into two different namespaces (the Locator and the Identifier namespaces) is one of the most promising paradigms. However, the impact of this new paradigm on the Internet traffic is yet to be assessed. In this extended abstract, we present a preliminary analysis of TCP performance i...

متن کامل

Implementing the Locator/ID Separation Protocol: Design and experience

During the last few years, the network research community and the industry have been working on the design of an alternate Internet Routing Architecture aiming at solving the issues arising in the current architecture. It is widely accepted that applying a Locator/ID Separation paradigm would result in a more scalable and flexible architecture. As the name suggests, in Locator/ID Separation the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Computational Intelligence Systems

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2012