Defending against the propagation of active worms

被引:1
|
作者
Fan, Xiang [1 ]
Xiang, Yang [1 ]
机构
[1] Cent Queensland Univ, Sch Management & Informat Syst, Ctr Intelligent & Networked Syst, Rockhampton, Qld 4702, Australia
来源
JOURNAL OF SUPERCOMPUTING | 2010年 / 51卷 / 02期
关键词
Network security; Invasive software; Worms; Propagation; Modeling; Defense; SPREAD;
D O I
10.1007/s11227-009-0283-8
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Active worms propagate across networks by employing the various target discovery techniques. The significance of target discovery techniques in shaping a worm's propagation characteristics is derived from the life cycle of a worm. The various target discovery techniques that could be employed by active worms are discussed. It is anticipated that future active worms would employ multiple target discovery techniques simultaneously to greatly accelerate their propagation. To accelerate a worm's propagation, the slow start phase in the worm's propagation must be shortened by letting the worm infect the first certain percentage of susceptible hosts as soon as possible. Strategies that future active worms might employ to shorten the slow start phase in their propagation are studied. Their respective cost-effectiveness is assessed. A novel active defense mechanism is proposed, which could be an emerging solution to the active worm problem. Our major contributions in this article are first, we found the combination of target discovery techniques that can best accelerate the propagation of active worms; second, we proposed several strategies to shorten a worm's slow start phase in its propagation and found the cost-effective hit-list size and average size of internally generated target lists; third, we proposed a novel active defense mechanism and evaluated its effectiveness; and fourth, we proposed three novel discrete time deterministic propagation models of active worms.
引用
收藏
页码:167 / 200
页数:34
相关论文
共 50 条
  • [1] Defending against the propagation of active worms
    Xiang Fan
    Yang Xiang
    [J]. The Journal of Supercomputing, 2010, 51 : 167 - 200
  • [2] Defending against the Propagation of Active Worms
    Fan, Xiang
    Xiang, Yang
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 350 - +
  • [3] Defending against Instant Messaging Worms
    Liu, Zhijun
    Shu, Guoqiang
    Li, Na
    Lee, David
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [4] Propagation of active worms: A Survey
    Xiang, Yang
    Fan, Xiang
    Zhu, Wen Tao
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (03): : 157 - 172
  • [5] Defending against Internet worms: A signature-based approach
    Tang, Y
    Chen, SG
    [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1384 - 1394
  • [6] Characterizing and defending against divide-conquer-scanning worms
    Chen, Chao
    Chen, Zesheng
    Li, Yubin
    [J]. COMPUTER NETWORKS, 2010, 54 (18) : 3210 - 3222
  • [7] A feasibility study on defending against ultra-fast topological worms
    Xie, Liang
    Zhu, Sencun
    [J]. P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 61 - 68
  • [8] Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy
    Hsu, Fu-Hau
    Wu, Min-Hao
    Hwang, Yan-Ling
    Chen, Jian-Xin
    Huang, Jian-Hong
    Wang, Hao-Jyun
    Lai, Yi-Wen
    [J]. INFORMATION, 2023, 14 (10)
  • [9] Defending against hitlist worms using network address space randomization
    Antonatos, S.
    Akritidis, P.
    Markatos, E. P.
    Anagnostakis, K. G.
    [J]. COMPUTER NETWORKS, 2007, 51 (12) : 3471 - 3490
  • [10] Modeling and defending against adaptive bittorrent worms in peer-to-peer networks
    [J]. 1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (09):