Defending against the propagation of active worms

被引:1
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Sch Management & Informat Syst, Ctr Intelligent & Networked Syst, Rockhampton, Qld 4702, Australia
来源
JOURNAL OF SUPERCOMPUTING | 2010年 / 51卷 / 02期
关键词
Network security; Invasive software; Worms; Propagation; Modeling; Defense; SPREAD;
D O I
10.1007/s11227-009-0283-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Active worms propagate across networks by employing the various target discovery techniques. The significance of target discovery techniques in shaping a worm's propagation characteristics is derived from the life cycle of a worm. The various target discovery techniques that could be employed by active worms are discussed. It is anticipated that future active worms would employ multiple target discovery techniques simultaneously to greatly accelerate their propagation. To accelerate a worm's propagation, the slow start phase in the worm's propagation must be shortened by letting the worm infect the first certain percentage of susceptible hosts as soon as possible. Strategies that future active worms might employ to shorten the slow start phase in their propagation are studied. Their respective cost-effectiveness is assessed. A novel active defense mechanism is proposed, which could be an emerging solution to the active worm problem. Our major contributions in this article are first, we found the combination of target discovery techniques that can best accelerate the propagation of active worms; second, we proposed several strategies to shorten a worm's slow start phase in its propagation and found the cost-effective hit-list size and average size of internally generated target lists; third, we proposed a novel active defense mechanism and evaluated its effectiveness; and fourth, we proposed three novel discrete time deterministic propagation models of active worms.
引用
收藏
页码:167 / 200
页数:34
相关论文
共 50 条
  • [21] Propagation Model of Active Worms in P2P Networks
    Feng, Chaosheng
    Qin, Zhiguang
    Cuthbet, Laurence
    Tokarchuk, Laurissa
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1908 - +
  • [22] Adaptive IP Mutation: A Proactive Approach for Defending Against Worm Propagation
    Lin, Changting
    Wu, Chunming
    Huang, Min
    Wen, Zhenyu
    Cheng, Qiumei
    2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 61 - 66
  • [24] A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology
    Jafarabadi, Ahmad
    Azgomi, Mohammad Abdollahi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1008 - 1022
  • [25] Propagation of Active Worms in P2P Networks: Modeling and Analysis
    Tang, Haokun
    Lu, Yukui
    Zhu, Shitong
    Huang, Jun
    JOURNAL OF COMPUTERS, 2014, 9 (11) : 2514 - 2524
  • [26] Defending Polymorphic Worms in Computer Network using Honeypot
    Goswami, R. T.
    Mondal, Avijit
    Mishra, Bimal Kumar
    Mahanti, N. C.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (10) : 63 - 65
  • [27] An Analysis of Propagation and Capability to Attack of Active P2P Worms
    Luo, Weimin
    Liu, Jingbo
    Xu, Jialiang
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 506 - 509
  • [28] A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology
    Ahmad Jafarabadi
    Mohammad Abdollahi Azgomi
    Peer-to-Peer Networking and Applications, 2015, 8 : 1008 - 1022
  • [29] DEFENDING ACTIVE LEARNING AGAINST ADVERSARIAL INPUTS IN AUTOMATED DOCUMENT CLASSIFICATION
    Pi, Lei
    Lu, Zhuo
    Sagduyu, Yalin
    Chen, Su
    2016 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2016, : 257 - 261
  • [30] Propagation modeling of active P2P worms based on ternary matrix
    Chen, Ting
    Zhang, Xiao-song
    Li, Hong-yuan
    Wang, Dong
    Wu, Yue
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (05) : 1387 - 1394