Paper Title:
Internet Worm Modeling and Analysis in IPv6 Networks
  Abstract

With the development of IPv6, it is taken as a natural cover to defend against Internet worm due to its huge address space. We demonstrate that an intelligent worm can compromise the IPv6 network according to using adaptive means. Based on the analysis of the scanning strategies in IPv6 network and correlative typical propagation technologies, a general worm model named Next Generation Internet worm model (NGIWM) is established for analyzing the propagation of IPv6 worm which is made up of three layers. The three layers have the function to accelerate the spread of NGIWM, and make NGIWM has the capability to form large scale of prevalence. The result indicates the rationality of scanning strategies and the effectiveness of the propagation compared to IPv4 network worm. The simulation shows that the implementation of NGIWM has the potential to become a major threat to IPv6 network. The performance of the worm depends heavily on domain name generator algorithm and scanning strategies in local network. We also analyze the effect of experiment parameters on the model in the simulation part. In the future, detailed implementation of the proposed model and more defense mechanisms are to be studied.

  Info
Periodical
Advanced Materials Research (Volumes 268-270)
Edited by
Feng Xiong
Pages
1514-1519
DOI
10.4028/www.scientific.net/AMR.268-270.1514
Citation
F. Su, W. J. Xu, Z. W. Lin, Y. Ma, "Internet Worm Modeling and Analysis in IPv6 Networks", Advanced Materials Research, Vols. 268-270, pp. 1514-1519, 2011
Online since
July 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Li Yuan
Chapter 6: Applied Materials
Abstract:Internet worms have been a severe threat to the Internet infrastructure and hosts recently. However, because of its outbreak of a sudden and...
758
Authors: Yu Lin Wang, Jin Heng Wang
Chapter 7: Communication and Information Technologies, Algorithms and Numerical Methods of Data Processing
Abstract:With the development of Internet virtual network , In the network environment , a variety of pathways and complex application environments...
1792
Authors: Ye Yang Jiang, Tian Fu Chai
Chapter 4: Information Technologies, WEB and Networks Engineering, Information Security, Software Application and Development, E-Applications
Abstract:This paper studies the impact of network time-lag on the spread of worms and virus, uses Lotka-Volterra equation theory with time delay, and...
2229