Network Application Technology with High-Fidelity Modeling of Worm Containment with Benign Worms

Article Preview

Abstract:

Worm infection is a critical problem for network application technology and security. In order to decrease the destruction of worm to network application technology, a worm containment method using benign worms was proposed, and an approach of high-fidelity modeling on packet-level of worm propagation and containment with benign worms was designed. The experiment results show that benign worms can contain the infection of malicious worms effectively, and the initial locality of worm, the delay time between the start time of benign worm and malicious worm, background traffic of the network will affect the propagation and containment of worms.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

184-189

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Li, M. Salour, and X. Su, A survey of internet worm detection and containment, IEEE Communication Surveys & Tutorials, vol. 10, No. 1, 2008, pp.20-35.

DOI: 10.1109/comst.2008.4483668

Google Scholar

[2] Su Fei, Lin Zhaowen, Ma Yan. Worm Propagation Modeling based on Two-Factor Model[C]. In: Pro. Of the IEEE, 2009, 978-1-4244-3693-4/09.

Google Scholar

[3] Zou CC, Towley D, Gong W. Email virus propagation modeling and analysis. Technical Report, TR-03-CSE-04, (2003).

Google Scholar

[4] D. Nicol, M. Liljenstam, and J. Liu, Multi-scale Modeling and Simulation of Worm Effects on the Internet Routing Infras- tructure[C]. International Conference on Modeling Techniques and Tools for Computer Performance Evaluation (Performance TOOLS), Urbana, IL, 2003. 1-10.

DOI: 10.1007/978-3-540-45232-4_1

Google Scholar

[5] M. Liljenstam, Y. Yuan, B. Premore, and D. Nicol. A mixed abstraction level simulation model of large-scale internet worm infestations. In Proceedings of the, 2002 MASCOTS Conference, July (2002).

DOI: 10.1109/mascot.2002.1167067

Google Scholar

[6] Deng Jie, Haixin Duan, Fine-granular Simulation and Modeling of Worm Propagation Using SSFNet[J]. Journal of Chinese Computer Systems. Vol. 29 No. 1 2008, pp.145-149.

Google Scholar

[7] Provos N. A virtual honeypot framework. Technical Report, 03-1. Center of Information Technology Integration, University of Michigan, 2003. http: /www. citi. umich. edu/ techreports/reports/ citi-tr-03-1. pdf.

Google Scholar

[8] Y Guo and M.L. Zhu, Research into agent-oriented worm defense system, Journal of Computer Applications, vol. 26, no. l2, pp.2931-2934, Dec. (2006).

Google Scholar

[9] Castaneda Frank, Sezery Emre Can, Xu Jun. WORM vs WORM: Preliminary study of an active counterattack mechanism[C]. Staniford S. Proc of the ACM CCS Workshop on Rapid Malcode(WORM 2003). New York: ACM, 2004: 83-93.

DOI: 10.1145/1029618.1029631

Google Scholar

[10] C. Kiddle, R. Simmonds, C. Williamson, and B. Unger, Hybrid Packet/Fluid Flow Network Simulation, presented at IEEE/ACM Workshop on Parallel and Distributed Simulation (PADS), San Diego, CA, (2003).

DOI: 10.1109/pads.2003.1207430

Google Scholar

[11] Kalyan S Perumalla,Srikanth Sundaragopalan.High-fidelity modeling of computer network worms[C].In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04),December 6-1 0, 2004.

DOI: 10.1109/csac.2004.21

Google Scholar