Fluid-based large-scale bandwidth-limited worm simulation model

被引:0
|
作者
Nie X.-F. [1 ]
Jing J.-W. [1 ]
Wang Y.-W. [1 ]
Xiang J. [1 ]
机构
[1] State Key Laboratory of Information Security, The Chinese Academy of Sciences, Graduate University
来源
Ruan Jian Xue Bao/Journal of Software | 2011年 / 22卷 / 09期
关键词
Bandwidth-limited worm; Fluid simulation; Model; Multi-level fidelity-preserving; Ripple effect;
D O I
10.3724/SP.J.1001.2011.03854
中图分类号
学科分类号
摘要
In this paper, based on the subnet abstraction mechanism, a fluid-based large-scale bandwidth-limited worm simulation model is proposed. In this model, the fluid simulation paradigm is leveraged to take away the huge volume of scanning traffic to reduce the requirements of computational capability and memory usage. Through extensive comparisons with the packet-level worm simulation and the measurement datasets, experiments demonstrate that the proposed simulation model is capable of high fidelity and low resource consumption, and thus, can fulfill the needs of the analysis of bandwidth-limited worm propagation characteristics and the verification of worm defense strategies. ©2011, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:2157 / 2181
页数:24
相关论文
共 21 条
  • [1] Moore D., Paxson V., Savage S., Shannon C., Staniford S., Weaver N., Inside the slammer worm, IEEE Security and Privacy, 1, 4, pp. 33-39, (2003)
  • [2] Shannon C., Moore D., The spread of the witty worm, IEEE Security and Privacy, 2, 4, pp. 46-50, (2004)
  • [3] Wen W.P., Qing S.H., Jiang J.C., Wang Y.J., Research and development of Internet worms, Journal of Software, 15, 8, pp. 1208-1219, (2004)
  • [4] Zou C.C., Gong W.B., Towsley D., Code red worm propagation modeling and analysis, Proc. of the 9th ACM Symp. on Computer and Communication Security (CCS 2002), pp. 138-147, (2002)
  • [5] Chen Z., Gao L., Kwiat K., Modeling the spread of active worms, Proc. of the IEEE INFOCOM 2003, pp. 1890-1900, (2003)
  • [6] Riley G.F., Sharif M.I., Lee W., Simulating Internet worms, Proc. of the 12th IEEE/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2004), pp. 268-274, (2004)
  • [7] Wang Y.W., Liu P., Jing J.W., Jia X.Q., A multi-level fidelity-preserving bandwidth-limited worm simulation model and its application, Proc. of the 41st IEEE Annual Simulation Symp. (ANSS 2008), pp. 308-318, (2008)
  • [8] The Georgia tech network simulator (GTNetS)
  • [9] Liu B., Figueiredo D.R., Guo Y., Kurose J., Towsley D., A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation, Proc. of the IEEE INFOCOM 2001, pp. 1244-1253, (2001)
  • [10] Kesidis G., Hamadeh I., Jin Y.M., Jiwasurat S., Vojnovic M., A model of the spread of randomly scanning Internet worms that saturate access links, ACM Trans. on Modeling and Computer Simulation (TOMACS), 18, 2, (2008)