A Novel Cloud-based Worm Propagation Model
نویسندگان
چکیده
Cloud computing technology not only provides us powerful computing, on-demand service, rapid elasticity, but also possible great destruction by the internet criminal accordingly. This prompts us to consider the cloud-based worm propagation problem. We set up the analytical model through a highly abstract network environment and achieve the overall characteristics of the worm research purposes. In this paper, we firstly analyze the factors affect worm scan and propagation in the cloud and put forward a novel cloud-based worm model: the MapReduce Divide-and-Conquer model (MRDC). Secondly, we analyze the architecture and performance of MRDC worm contrast to Code Red, the hit-list worm, and flash worm, etc. the simulation shows that the MRDC worm significantly improves the worm propagation. And finally, we discuss some threat trends of cloud-based worm propagation and some possible solutions. Our simulation shows that the MRDC worm propagate much faster than the other worms that the MRDC worm can scan and infect entire IPv4 space in no more than 10 minutes, the perfect MRDC worm can infect 360,000 vulnerable machines in no more than 1 second and all vulnerable machines in the entire IPv4 space in no more than 10 seconds.
منابع مشابه
A Novel Cloud - based Benign Worm Defense Technology ⋆
Due to the proactive defend against the worm propagation and patch the susceptible hosts, benign worms are attracting wide attentions in the field of worm research. In this paper, we point out the errors of worm-anti-worm model (WAW) and present a revised model named Re-WAW based on the law of worm propagation and Two-Factor model. Based on the discussion of the worm propagation factors such as...
متن کاملEiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks
Based on the epidemic theory, this paper proposes a novel model for analyzing the dynamics of worm propagation in Wireless Sensor Networks (WSNs). The proposed model supports the sleep and work interleaving schedule policy for sensor nodes, and it can also describe the process of multi-worm propagation in WSNs. In addition, a necessary condition for worms to spread in WSNs is derived, which may...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملProactive Worm Prevention Based on P2p Networks
According to the features of worm propagation, a novel model for proactive worm prevention based on peer-to-peer (P2P) networking technologies is proposed in this paper. At first, we present the backgrounds and security issues related to P2P networks. Then, a structured P2P overlay network designed for worm prevention is specified. Based on that, we present the methods for Internet worm forecas...
متن کاملAn Analytical Model for Flame Propagation through Moist Lycopodium Particles with Non-unity Lewis Number
In this investigation, the structure of one-dimensional flame propagation in uniform cloud of volatile organic particles has been analyzed in which the structure of flame is divided into three zones. The first zone is preheat zone which is divided into three subzones itself. In first subzone (heating), particle cloud heated until the moisty particles reach to vapor vaporization temperature. In ...
متن کامل