Pulse quarantine strategy of internet worm propagation: Modeling and analysis
نویسندگان
چکیده
Article history: Available online 6 September 2011 0045-7906/$ see front matter 2011 Elsevier Ltd doi:10.1016/j.compeleceng.2011.07.009 q Reviews processed and approved for publication ⇑ Corresponding author at: College of Information E-mail addresses: [email protected], haveb Worms can spread throughout the Internet very quickly and are a great security threat. Constant quarantine strategy is a defensive measure against worms, but its reliability in current imperfect intrusion detection systems is poor. A pulse quarantine strategy is thus proposed in the current study. The pulse quarantine strategy adopts a hybrid intrusion detection system with both misuse and anomaly detection. Through analysis of corresponding worm propagation models, its stability condition is obtained: when the basic reproduction number is less than one, the model is stable at its infection-free periodic equilibrium point where worms get eliminated. Numerical and simulation experiments show that constant quarantine strategy is inefficient because of its high demand on the patching rate at ‘‘birth’’, whereas the pulse quarantine strategy can lead to worm elimination with a relatively low value. As patching almost all hosts in the actual network is difficult, the pulse quarantine strategy is more effective in worm elimination. 2011 Elsevier Ltd. All rights reserved.
منابع مشابه
Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to the Internet. In general, users may immunize their computers with countermeasures in exposed and infectious state, which may take a period of time. Through theoretical analysis, time delay may lead to Hopf bifurcation phenomenon so that the worm propagation system will be unstable and u...
متن کاملHopf bifurcation in an Internet worm propagation model with time delay in quarantine
Internet worm attacks reduce network security and cause economic losses. The use of a quarantine strategy is prominent in defending against worms, and it has been applied to various worm propagation models. Although theoretical analysis suggests that worms must get eliminated under quarantine, such a result does not appear in a real network. The time delay considered in this paper, which is cau...
متن کاملModeling, Analysis, and Mitigation of Internet Worm Attacks
In recent years, worms have become one of the major threats to the security of the Internet. In this talk, I will present our research on modeling, analysis, and mitigation of Internet worm attacks, which includes: (1) We present a “two-factor worm model”, which considers the impact of human counteractions and network congestion on a worm's propagation. (2) To detect the presence of an Internet...
متن کاملPetri Net and Probabilistic Model Checking Based Approach for the Modelling, Simulation and Verification of Internet Worm Propagation.
Internet worms are analogous to biological viruses since they can infect a host and have the ability to propagate through a chosen medium. To prevent the spread of a worm or to grasp how to regulate a prevailing worm, compartmental models are commonly used as a means to examine and understand the patterns and mechanisms of a worm spread. However, one of the greatest challenge is to produce meth...
متن کاملStability Analysis of a Worm Propagation Model with Quarantine and Vaccination
Internet worms pose a serious threat to the Internet security. In order to effectively defend against Internet worms, this paper proposes a novel epidemic e-SEIQV model with quarantine and vaccination. Using this e-SEIQV model, we obtain the basic reproduction number for determining whether the worm dies out completely. The global stability of the worm-free equilibrium and the local stability o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Electrical Engineering
دوره 38 شماره
صفحات -
تاریخ انتشار 2012