skip to main content
research-article

A model of the spread of randomly scanning Internet worms that saturate access links

Published:28 April 2008Publication History
Skip Abstract Section

Abstract

We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled Kermack-McKendrick (a.k.a. stratified susceptibles-infectives (SI)) equations, captures both the measured scanning activity of the worm and the network limitation of its spread, that is, the effective scan-rate per worm/infective. The Internet is modeled as an ideal core network to which each peripheral (e.g., enterprise) network is connected via a single access link. It is further assumed in this note that as soon as a single end-system in the peripheral network is infected by the worm, the subsequent scanning of the rest of the Internet saturates the access link, that is, there is “instant” saturation. We fit our model to available data for the Slammer worm and demonstrate the model's ability to accurately represent Slammer's total scan-rate to the core.

References

  1. Chen, Z., Gao, L., and Kwait, K. 2003. Modeling the spread of active worms. In Proceedings of IEEE INFOCOM (San Fransisco, CA).Google ScholarGoogle Scholar
  2. Cooke, E., Bailey, M., Mao, Z., Watson, D., Jahanian, F., and McPherson, D. 2004. Toward understanding distributed blackhole placement. In Proceedings of ACM WORM (Washington, DC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Daley, D. and Gani, J. 1999. Epidemic Modeling, an Introduction. Cambridge University Press, Cambridge, U.K.Google ScholarGoogle Scholar
  4. Kesidis, G., Hamadeh, I., and Jiwasurat, S. 2005. Coupled Kermack-McKendrick models for randomly scanning and bandwidth saturating Internet worms. In Proceedings of QoS-IP. Springer-Verlag, Berlin, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kurtz, T. 1981. Approximation of population processes. In Proceedings of the CBMS-NSF Regional Conference Series in Applied Mathematics. Vol. 36.Google ScholarGoogle ScholarCross RefCross Ref
  6. Li, L., Jiwasurat, S., Hamadeh, I., Kesidis, G., Neumann, C., and Liu, P. 2006. Emulating sequential scanning worms on the DETER testbed. In Proceedings of IEEE/Create-Net TridentCom. (Barcelona, Spain).Google ScholarGoogle Scholar
  7. Liljenstam, M., Nicol, D., Berk, V., and Gray, R. 2003. Simulating realistic network worm traffic for worm warning system design and testing. In Proceedings of ACM WORM (Washington, DC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., and Weaver, N. 2003a. Inside the Slammer worm. IEEE Sec. Priv. 1, 4, 33--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Moore, D., Shannon, C., Voelker, G. M., and Savage, S. 2003b. Internet quarantine: Requirements for containing self-propagating code. In Proceedings of IEEE INFOCOM. (San Francisco, CA).Google ScholarGoogle Scholar
  10. Staniford, S., Paxson, V., and Weaver, N. 2002. How to own the Internet in your spare time. In Proceedings of USENIX Security Symposium. 149--167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Weaver, N., Hamadeh, I., Kesidis, G., and Paxson, V. 2004a. Preliminary results using scale-down to explore worm dynamics. In Proceedings of ACM WORM (Washington, DC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Weaver, N., Staniford, S., and Paxson, V. 2004b. Very fast containment of scanning worms. In Proceedings of the 13th USENIX Security Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Zou, C., Gong, W., and Towsley, D. 2002. Code Red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS'02, Washington, DC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Zou, C., Gong, W., and Towsley, D. 2003. Worm propagation modeling and analysis under dynamic quarantine defense. In Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM'03, Washington, DC). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A model of the spread of randomly scanning Internet worms that saturate access links

      Recommendations

      Reviews

      Cecilia G. Manrique

      Internet worms are computer programs that are launched to infiltrate machines, and replicate themselves to infect other machines, often with code to make those machines crash or fail. This very interesting technical paper provides readers with the mathematical explanation for the spread of several known worms. The paper uses tables, graphs, figures, and mathematical equations to explain the simple mathematical model developed to show the spread of randomly scanning and bandwidth saturating worms, such as Slammer and Witty, which have been determined to spread extremely rapidly. The model uses coupled Kermack-McKendrick equations; it shows the impact that the worm would have on the core of the Internet, and applies the model to the Slammer worm, which the model seems to accurately represent. In the appendix, the authors provide the mathematical proof of the theorem. Their simulation code is also available online. The value of such studies lies in the ability to understand the spread of one of the major cyber threats to our dependence on the Internet: the use of viruses and worms to downgrade the value of technology. By constantly testing and expanding the explanations, as well as our understanding of such activities on the Internet, we may be better able to diagnose them, ward them off, and maybe even prevent their spread and impact on the many machines and users in the system-a true service to the accumulation of knowledge that has practical real-world applications. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Modeling and Computer Simulation
        ACM Transactions on Modeling and Computer Simulation  Volume 18, Issue 2
        April 2008
        97 pages
        ISSN:1049-3301
        EISSN:1558-1195
        DOI:10.1145/1346325
        Issue’s Table of Contents

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 April 2008
        • Accepted: 1 April 2006
        • Revised: 1 October 2005
        • Received: 1 December 2004
        Published in tomacs Volume 18, Issue 2

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader