skip to main content
10.5555/1404803.1404804acmconferencesArticle/Chapter ViewAbstractPublication PagesspringsimConference Proceedingsconference-collections
research-article

Modeling and analysis of worm defense using stochastic activity networks

Published: 25 March 2007 Publication History

Abstract

Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling and analysis of systems described within a SAN framework. This paper presents a SAN model of a local area network's defense against Internet worm propagation, measuring the effectiveness of a defensive strategy based on removing hosts from the local network once an infection is detected. We consider the problem of deciding whether to allocate resources to remove an infected host (and thereby reduce the threat), or remove a susceptible but as-yet uninfected host, to directly save it from attack. Considering a parameterized range of policies that makes this decision based on the number of infections in the local network, we find marked preference for always removing one type of hosts when possible, over the other, regardless of the infection state. We futhermore see whether preference should be given to infected hosts or susceptible hosts depends on the relative speeds at which they are removed. Finally, we see that a worm attack can be effectively countered provided that the aggregate rate at which hosts can be removed is on the order of the aggregate infection rate at the time the defense is engaged. Our effort demonstrates the utility of using sophisticated modeling tools to study worm defense, and policy decisions surrounding it.

References

[1]
CERT Coordination Center. CERT Advisory CA-2001-19 'Code Red' Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, July 2001; http://www.cert.org/advisories/CA-2001-19.html.
[2]
Cisco Security Advisories. 'Code Red'Worm - Customer Impact, July 2001; http://www.cisco.com/warp/public/707/cisco-code-red-worm-pub.shtml.
[3]
C. Shannon, D. Moore, and J. Brown. "Code-Red: A Case Study on the Spread and Victims of an Internet Worm," Proc. Internet Measurement Workshop (IMW), ACM Press, 2002, pp. 273284.
[4]
H. Berghel. The Code Red Worm, Communications of the ACM, 2001. 44(12):p. 15--19.
[5]
Mobius. http://www.mobius.uiuc.edu/.
[6]
S. Friedl. Analysis of the new 'Code Red II' Variant, Aug. 2001; http://www.unixwiz.net/techtips/CodeRedII.html.
[7]
N. Weaver. The Spread of the Sapphire/Slammer Worm, http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
[8]
D. Moore and C. Shannon. The Spread of the Witty Worm, http://www.caida.org/analysis/security/witty/.
[9]
Linksys. Linksys Data Sheet, http://www.linksys.com/servlet/Satellite?c=L_Product_C2&childpagename=US%2FLayout & cid=1150490915278&pagename=Linksys%2FCommon%2FVisitorWrapper
[10]
D. M. Nicol. The Impact of Stochastic Variability on Worm Detection, In Proceedings of the 2006 ACM Workshop on Rapid Malmare (WORM '06), Alexandria, VA, pp. 57--64.

Cited By

View all
  • (2013)Quantitative survivability evaluation of three virtual machine-based server architecturesJournal of Network and Computer Applications10.1016/j.jnca.2012.12.00636:2(781-790)Online publication date: 1-Mar-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SpringSim '07: Proceedings of the 2007 spring simulation multiconference - Volume 3
March 2007
351 pages
ISBN:1565553144

Sponsors

Publisher

Society for Computer Simulation International

San Diego, CA, United States

Publication History

Published: 25 March 2007

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Quantitative survivability evaluation of three virtual machine-based server architecturesJournal of Network and Computer Applications10.1016/j.jnca.2012.12.00636:2(781-790)Online publication date: 1-Mar-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media