The Research on Control Strategy of Worms Spread in Complex Network in Industry

Article Preview

Abstract:

Internet worms have been a severe threat to the Internet infrastructure and hosts recently. However, because of its outbreak of a sudden and massive make the worm’s research facing enormous challenges. This article describes a simulation system based on NS2 worm - WSS. First, by processing BGP routing table information to the Internet used for simulation of the abstract network, then the model-based epidemiological model of worm propagation, and finally in the two in NS2 combination to achieve the simulation of worm propagation. Experiments show that, WSS can get in a lab environment similar to actual worm outbreak statistics, in understanding the macroscopic behavior of the worm, the worm flow forecasting, transmission speed and damage have a wide range of applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

758-763

Citation:

Online since:

March 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C.C. Zou, W. Gong, and D. Towsley. On the performance of Internet worm scanning strategies. In Technical Report, TR-03-CSE-07, Electrical and Computer Engineering Department, University of Massachusetts, 2003.

Google Scholar

[2] University of Oregon Route Views Project: Available on http://www.routeviews.org/

Google Scholar

[3] S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In USENIX Security Symposium, 2002.

Google Scholar

[4] D. Moore, C. Shannon, J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In ACM/USENIX Internet Measurement Workshop, Marseille, France, November 2002, pp.273-284.

DOI: 10.1145/637201.637244

Google Scholar

[5] D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaveer. Inside the Slammer Worm. In IEEE Magazine on Security and Privacy, July 2003, Vol.1 (4):pp.33-39.

DOI: 10.1109/msecp.2003.1219056

Google Scholar

[6] M. Liljenstam, Y. Yuan, B. J. Premore, and D. M. Nicol. A mixed abstraction level simulation model of large-scale internet worm infestations. In 10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society, 2002, pp.109-116.

DOI: 10.1109/mascot.2002.1167067

Google Scholar

[7] Hong-Zheng, Wu-fa, WANG Yuanyuan, computer engineering [J], negative selection based on the inhibition model of network worms, Beijing: PLA University of Science and Technology Press,2007:125-12.

Google Scholar