A New Ecology Model for Internet Worm Security Threat Evaluation

نویسنده

  • Sun Yunxiao
چکیده

Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation analysis, including exploring mechanisms of predator-prey worms’ propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection. In this paper, an integrated worm ecology model is given to study the propagation of such worms. The analytical results provide insights of the worm design and impact to network. The simulation results verify the correctness of our model and show the effectiveness of the worm model by applying it to the LiOn/Cheese and MSBlaster/Welchia.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination

Internet worms pose a serious threat to the Internet security. In order to effectively defend against Internet worms, this paper proposes a novel epidemic e-SEIQV model with quarantine and vaccination. Using this e-SEIQV model, we obtain the basic reproduction number for determining whether the worm dies out completely. The global stability of the worm-free equilibrium and the local stability o...

متن کامل

Emulation of “single-packet” UDP Scanning Worms in Large Enterprises

Worms are a serious threat to Internet security. The past research on worm has been focused on mathematical modeling, numerical analysis, and simulation in addition to proposed defense strategies. We believe a fine-grained, packet-level emulation of worm propagation in enterprise networks is highly beneficial for the deep understanding of worm dynamics and a prerequisite for worm containment an...

متن کامل

Design and Implementation of a Lab Worm

ISBN 555555555/$10.00  2004 IEEE Abstract – Malicious worms have presented a formidable threat to the security community in recent years. Beginners to internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This worm is also useful to researchers needing see how a typical worm w...

متن کامل

Worm Meets Beehive

Internet worms continue to plague the Internet infrastructure with wider and deeper impact since the Morris Worm in early 1988. It has been further shown that better-engineered worms like Warhol worms and Flash worms could spread across the Internet in minutes or even tens of seconds rather than hours. Such virulent spreading invalidates any manual counter-measures and poses an extremely seriou...

متن کامل

Vulnerabilities of Passive Internet Threat Monitors

Passive Internet monitoring is a powerful tool for measuring and characterizing interesting network activity like worms or distributed denial of service attacks. By employing statistical analysis on the captured network traffic, Internet threat monitors gain valuable insight into the nature of Internet threats. In the past, these monitors have been successfully used not only to detect DoS attac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013