MODELING & AUTOMATED CONTAINMENT OF WORMS
#5


Sarah Sellke, Ness B. Shroff, and Saurabh BagchiSchool of Electrical and Computer EngineeringPurdue University

Abstract
Self-propagating codes, called worms, such as CodeRed, Nimda, and Slammer, have drawn significant attentiondue to their enormous adverse impact on the Internet. Thereis a great interest in the research community in modeling thespread of worms and in providing adequate defense mecha-nisms against them.In this paper, we present a (stochastic) branching pro-cess model for characterizing the propagation of Internetworms. This model leads to the development of an auto-matic worm containment strategy that prevents the spreadof worms beyond its early stages. Specifically, using thebranching process model, we are able to (1) provide a pre-cise condition that determines whether the worm will even-tually die out and (2) provdide the probability that the to-tal number of hosts that the worm infects will be below acertain level. We use these insights to develop a simple au-tomatic worm containment scheme, which is demonstrated,through simulations and real trace data, to be both effectiveand non-intrusive.Keywords: Internet scanning worms, stochastic wormmodeling, branching process model, early phase propaga-tion, automatic worm containment.

Introduction
The Internet has become critically important to the finan-cial viability of the national and global economy. Mean-while, we are witnessing an upsurge in the incidents of ma-licious code in the form of computer viruses and worms.One class of such malicious code, known as worms, spreadsitself without human intervention by using a scanning strat-egy to find vulnerable hosts to infect. Code Red, SQL Slam-mer, and Sasser are some of the more famous examplesof worms that have caused considerable damage. Networkworms have the potential to infect many vulnerable hostson the Internet before human countermeasures take place.The aggressive scanning traffic generated by the infectedhosts have caused network congestion, equipment failure,and blocking of physical facilities such as subway stations,911 call centers, etc. As a representative example, con-sider the Code Red worm version 2 that exploited a bufferoverflow vulnerability in the Microsoft IIS web servers. Itwas released on July 19th, 2001 and over a period of lessthan 14 hours infected more than 359,000 machines. Thecost of the epidemic, including subsequent strains of CodeRed is estimated by Computer Economics to be $2.6 billion. While Code Red was particularly virulent in its eco-nomic impact it provides an indication ofthe magnitude of the damage that can be inflicted by suchworms. Thus, there is a need to carefully characterize thespread of worms and develop efficient strategies for worm containment.
In the current literature, three broad classes of strategieshave been identified for mitigating the risks of worms.(i) Prevention: This involves improving the security andheterogeneity of software on the Internet and automaticallychecking hosts for vulnerabilities worms could exploit, andpatching them before a worm incident happens; (ii) Treat-ment: This involves eliminating the vulnerability exploitedby the worm after the incident has become known and re-moving the worm from the host itself; (iii) Containment:This involves blocking or slowing down the communicationbetween infected and uninfected hosts. These three strate-gies complement each other and in this paper, our focus willbe on developing an effective containment strategy.The goal of our research is to provide a model for thepropagation of random scanning worms and the correspond-ing development of automatic containment mechanisms thatprevent the spread of worms beyond its early stages.Several early worm warning and detection systems havebeen proposed [10, 20, 21]. Most models of worm propaga-tion are based on deterministic epidemic models.They are acceptable for modeling worm propagation whenthe number of infected hosts is large. However, it is generally accepted that they are inadequate to model the earlyphase of worm propagation accurately because the numberof infected hosts earlier on is very small [10]. The reason isthat epidemic models capture only expected or mean behav-ior, while not being able to capture the variability aroundthis mean, which could be especially dramatic during theearly phase of worm propagation. While stochastic epi-demic models can be used to model this early phase, theyare generally too complex to provide useful analytical solu-tions.

For more


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: project venona containment, i want modeling and containment of worms code full project code, who is sarah silverman, modelling and automated containment of worms seminar, modeling automated containment of worms project source code, automated containment worms, modeling of worms using java source code,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: MODELING & AUTOMATED CONTAINMENT OF WORMS - by seminar surveyer - 20-01-2011, 11:04 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Voice Based Automated Transport Enquiry System seminar class 2 3,191 05-10-2016, 09:34 AM
Last Post: ijasti
  IMAGE CAPTURE AUTOMATED TOLL GATE smart paper boy 3 2,988 11-07-2015, 01:43 PM
Last Post: Guest
  Micro controller based automated irrigation system Electrical Fan 28 20,999 29-01-2015, 05:32 PM
Last Post: Guest
  AUTOMATED TRAFFIC SIGNAL CONTROLLER full report project topics 7 10,322 02-09-2013, 10:40 PM
Last Post: Guest
  Modeling and Testing of a Digital Distance Relay Using MATLAB/SIMULINK smart paper boy 6 4,043 09-08-2013, 10:56 AM
Last Post: computer topic
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,372 08-04-2013, 03:28 PM
Last Post: computer topic
  Automated alarm CirCuits mechanical wiki 2 3,360 17-11-2012, 12:15 PM
Last Post: seminar details
  Modeling and Simulation of a Robust e-Voting System seminar class 1 1,316 02-11-2012, 03:39 PM
Last Post: seminar details
  AUTOMATED LIGHT SWITCHING CONTROL SYSTEM seminar surveyer 1 2,248 16-02-2012, 10:54 AM
Last Post: seminar paper
  Modeling & Simulation of a Dynamic Voltage Restorer (DVR) smart paper boy 1 2,494 30-11-2011, 10:22 PM
Last Post: VickyBujju

Forum Jump: