MODELING AND AUTOMATED CONTAINMENT OF WORMS
#1

Submitted by
N.KALIRAGAVENDRAN
J.ARUN KUMAR
T.AVINASH
S.SRIKAR

[attachment=14002]
ABSTRACT
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormously adverse impact on the Internet.
Thus, there is great interest in the research community in modeling the spread of worms and in providing adequate defense mechanisms against them. In this paper, we present a (stochastic) branching process model for characterizing the propagation of Internet worms.
The model is developed for uniform scanning worms and then extended to preference scanning worms.
This model leads to the development of an automatic worm containment strategy that prevents the spread of a worm beyond its early stage.
Specifically, for uniform scanning worms, we are able to determine whether the worm spread will eventually stop. We then extend our results to contain uniform scanning worms.
Our automatic worm containment schemes effectively contain both uniform scanning worms and local preference scanning worms, and it is validated through simulations and real trace data to be non intrusive.
INTRODUCTION
Objective

The Scope of system is to reduce the spread of worms in starting stage through uniform scanning of worms and extend to preference scanning worms
Over View of the System
The Internet has become critically important to the financial viability of the national and the global economy. Meanwhile, we are witnessing an upsurge in the incidents of malicious code in the form of computer viruses and worms. One class of such malicious code, known as random scanning worms, spreads itself without human intervention by using a scanning strategy to find vulnerable hosts to infect. Code Red, SQL Slammer, and Sasser are some of the more famous examples of worms that have caused considerable damage. Network worms have the potential to infect many vulnerable hosts on the Internet before human countermeasures take place. The aggressive scanning traffic generated by the infected hosts has caused network congestion, equipment failure, and blocking of physical facilities such as subway stations, 911 call centers, etc. As a representative example, consider the Code RedwormVersion 2 that exploited buffer overflow vulnerability in the Microsoft IISWebservers. It was released on19 July 2001 Andover a period of less than 14 hours infected more than 359,000 machines. The cost of the epidemic, including subsequent strains of Code Red, has been estimated by Computer Economics to be $2.6 billion.
The goal of our research is to provide a model for the propagation of random scanning worms and the corresponding development of automatic containment mechanisms that prevent the spread of worms beyond their early stages. This containment scheme is then extended to protect an enterprise network from a preference scanning worm. A host infected with random scanning worms finds and infects other vulnerable hosts by scanning a list of randomly generated IP addresses. Worms using other strategies to find vulnerable hosts to infect are not within the scope of this work. Some examples of nonrandom-scanning worms are e-mail worms, peer-to-peer worms, and worms that search the local host for addresses to scan.
Most models of Internet-scale worm propagation are based on deterministic epidemic models. They are acceptable for modeling worm propagation when the number of infected hosts is large. However, it is generally accepted that they are inadequate to model the early phase of worm propagation accurately because the number of infected hosts early on is very small. The reason is that epidemic models capture only expected or means behavior while not being able to capture the variability around this mean, which could be especially dramatic during the early phase of worm propagation. Although stochastic epidemic models can be used to model this early phase, they are generally too complex to provide useful analytical solutions.
In this paper, we propose a stochastic branching process model for the early phase ofwormpropagation.1Weconsider the generation-wise evolution of worms, with the hosts that are infected at the beginning of the propagation forming generation zero. The hosts that are directly infected by hosts in generation n are said to belong to generation n þ 1. Our model captures the worm spreading dynamics for worms of arbitrary scanning rate, including stealth worms that may turn themselves off at times. We show that it is the total number of scans that an infected host attempts, and not the more restrictive scanning rate, which determines whether worms can spread. Moreover, we can probabilistically bound the total number of infected hosts. These insights lead us to develop an automatic worm containment strategy. The main idea is to limit the total number of distinct IP addresses contacted (denote the limit as MC) per host over a period we call the containment cycle, which is of the order of weeks or months. We show that the value of MC does not need to be as carefully tuned as in the traditional rate control mechanisms. Further, we show that this scheme will have only marginal impact on the normal operation of the networks. Our scheme is fundamentally different from rate limiting schemes because we are not bounding instantaneous scanning rates. Preference scanning worms are a common class of worms but have received significantly less attention from the research community. Unlike uniform scanning worms, this type of worm prefers to scan random IP addresses in the local network to the overall Internet. We show that a direct application of the containment strategy for uniform scanning worms to the case of preference scanning worms makes the system too restrictive in terms of the number of allowable scans from a host. We therefore propose a local worm containment system based on restricting a host’s total number of scans to local unused IP addresses (denoted as N). We then use a stochastic branching process model to come up with a bound on the value of N to ensure that the worm spread is stopped.
The main contributions of the paper are summarized as follows: We provide a means to accurately model the early phase of propagation of uniform scanning worms. We also provide an equation that lets a system designer probabilistically bound the total number of infected hosts in a worm epidemic. The parameter that controls the spread is the number of allowable scans for any host. The insight from our model provides us with a mechanism for containing both fast-scanning worms and slow-scanning worms without knowing the worm signature in advance or needing to detect whether a host is infected. This scheme is non-intrusive in terms of its impact on legitimate traffic. Our model and containment scheme is validated through analysis, simulation, and real traffic statistics.
Reply
#2

to get information about the topic Modeling and automated containment of worms full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-modeling-au...t-of-worms

http://studentbank.in/report-modeling-au...-computing

http://studentbank.in/report-modeling-an...rms--23570

http://studentbank.in/report-modeling-au...4#pid45824
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: modeling and automated containment of worms, modelling and automated containment of worms seminar, modeling and automated containment of worms source code download, andover ks, modeling propagation dynamics of bluetooth worms extended version, modeling automated containment of worms project source code, modeling and automated containement of worms documentation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  The Impact of the Automated Teller Machine smart paper boy 2 2,378 08-01-2018, 09:52 AM
Last Post: RaymondGom
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,047 15-02-2017, 03:40 PM
Last Post: jaseela123d
  application projects in java and vb.net (titles and topics) project topics 1 5,468 28-11-2012, 01:11 PM
Last Post: seminar details
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,168 24-10-2012, 01:09 PM
Last Post: seminar details
  Design and Analysis of the Gateway Relocation and Admission Control Algorithm in Mobi Projects9 1 1,721 10-10-2012, 12:22 PM
Last Post: seminar details
  Automated Iris Recognition Technology & Iris Biometric System smart paper boy 1 2,027 25-02-2012, 11:08 AM
Last Post: seminar paper
  HARDWARE ENHANCED ASSOCIATION RULE MINING WITH HASHING AND PIPELINING - KNOWLEDGE AND electronics seminars 3 3,885 20-02-2012, 04:33 PM
Last Post: seminar paper
  Emerging JAVA and .NET Technology And Critical Trends seminar class 1 2,271 11-02-2012, 12:07 PM
Last Post: seminar addict
  MODELING & AUTOMATED CONTAINMENT OF WORMS-DEPENDABLE AND SECURE COMPUTING electronics seminars 5 5,264 09-02-2012, 11:17 AM
Last Post: seminar addict
  Automated Network Administration Tool project topics 2 2,210 06-02-2012, 10:00 AM
Last Post: yusaf

Forum Jump: