Skip to main content

Worm Nonlinear Model Optimization and Feature Detection Technology

  • Conference paper
Wireless Communications and Applications (ICWCA 2011)

Abstract

The static worm propagation model can not accurately describe the propagation of worm. This paper analyzes worm non-linear propagation models, draws out the worm propagation trend and proposes a new dynamic worm non-linear propagation model. Then the worm feature detection technology is designed based on the worm non-linear propagation models. The system uses rule-based detection method to monitor network worms, and gives alarms to server. Experimental results show that the scheme is a good solution to worm detection in multiple network environments and possess with higher detection rate and lower false alarm rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Xu, Y.-g., Qian, H.-y., Li, H.-f.: Routing worm propagation model in IPv6 networks. Application Research of Computers 3920 (2009)

    Google Scholar 

  2. Zhang, D.-x., Peng, J., Hong, H.E.: Research the Propagation Model of Internet Worm. Network Communication and Security, 1244–1246 (2007)

    Google Scholar 

  3. Zhang., X.-y., Qing, S.-h., Li, Q., Li, D.-z., He, C.-h.: A Coordinated Worm Detection Method Based on Local Nets. Journal of Software, 412–421 (2007)

    Google Scholar 

  4. Zhao, g., Zhang, t.: Design of the worm detection system Based on the worm propagation characteristics. Computer Security, 114–118 (2009)

    Google Scholar 

  5. Ram, D., Cangussu, W., Sudeep, P.: Fast Worm Containment Using Feedback Control. Dependable and Secure Computing 5(2), 119–136 (2007)

    Article  Google Scholar 

  6. Kim, H.A., Karp, B.: Autograph. Toward Automated, Distributed Worm Signature Detection. In: Proceedings of the 13th USENIX Security Symposium, San Diego, CA, pp. 59–66 (2004)

    Google Scholar 

  7. Dagon, D., Qin, X., Gu, G., Lee, W., Grizzard, J.B., Levine, J.G., Owen, H.L.: HoneyStat: Local worm detection using honeypots. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 39–58. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Tang, Y., Chen, S.: Defending against internet worms: A signature-based approach. In: Proceedings of IEEE INFOCOM 2005, Hong Kong, pp. 13–23 (2005)

    Google Scholar 

  9. Eugene, H.: The Internet worm programs. ACM Computer 23(3), 17–57 (1989)

    Google Scholar 

  10. Wang, Y., Wang, C.X.: Modeling The Effects of Timing Parameters on Virus Propagation. In: Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM 2003), pp. 61–66. ACM press, Washington (2003)

    Chapter  Google Scholar 

  11. Dantu, R., Cangussu, J., Yelimeli, A.: Dynamic control of worm propagation. Information Technology 1(3), 419–423 (2004)

    Google Scholar 

  12. Streftaris, G., Gibson, G.J.: Statistical Inference for Stochastic Epidemic Models. In: Proceedings of the 17th International Workshop on Statistical Modeling, China, pp. 609–616 (2002)

    Google Scholar 

  13. Zou, C.C., Gong, W., Towsley, D.: Code Red Worm Propagation Modeling and Analysis. In: Proceedings of the 9th ACM Symp on Computer and Communication Security, pp. 138–147. ACM Press, Washington (2002)

    Google Scholar 

  14. Bishop, M.: A Model of Security Monitoring. In: Proceedings of Fifth AnnualComputer Security Applications Conference, New Orleans, pp. 249–251. IEEE Computer Society, Washington DC, USA (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Tong, X., Wang, Z. (2012). Worm Nonlinear Model Optimization and Feature Detection Technology. In: Sénac, P., Ott, M., Seneviratne, A. (eds) Wireless Communications and Applications. ICWCA 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 72. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29157-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29157-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29156-2

  • Online ISBN: 978-3-642-29157-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics