Skip to main content

Model and Estimation of Worm Propagation Under Network Partition

  • Conference paper
Information Security Practice and Experience (ISPEC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3903))

Abstract

Several worm propagation models have been proposed to describe the behavior of worms in order to find the weak link in the worm propagation for the purpose of further treatment measures. In this paper, we investigate the relation between worm spread and the scale of network. The partition-based model of worm propagation is developed, in which we focus on two key factors: the subnet number of the network to be partitioned into and the time to perform partition. Using a combination of analytic modeling and simulations, we describe how each of these two factors impacts the dynamics of worm epidemic. Based on our simulation experiment results, we propose the network partitioning approach to deescalate network scale and thus restrict the worm propagation in large scale networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Moore, D., Shannon, C., Claffy, K.: Code Red: A case study on the spread and victims of an Internet worm. In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, pp. 273–284 (2002)

    Google Scholar 

  2. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Magazine of Security and Privacy 1(4), 33–39 (2003)

    Article  Google Scholar 

  3. Wen, W.P., Qing, S.H., Jiang, J.C., Wang, Y.J.: Research and Development of Internet Worm. Journal of Software 15(8), 1208–1219 (2004)

    MATH  Google Scholar 

  4. Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and Early Warning for Internet- Worms. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 190–199 (2003)

    Google Scholar 

  5. Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: requirements for containing self-propagating code. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, 30 March-3 April, vol. 3, pp. 1901–1910. IEEE, Los Alamitos (2003)

    Google Scholar 

  6. Hung, J.C., Lin, K.-C., Chang, A.Y., Lin, N.H., Lin, L.H.: A Behavior-based Anti- Worm System. In: International Conference on Advanced Information Networking and Applications (AINA 2003), pp. 812–815 (2003)

    Google Scholar 

  7. Morrison. Honeypot technology. (2001) http://www.xfocus.net/articles/200103/121.html

  8. Streftaris, G., Gibson, G.J.: Statistical inference for stochastic epidemic models. In: Proc. of the 17th International Workshop on Statistical Modelling, Chania, pp. 609–616 (2002)

    Google Scholar 

  9. Frauenthal, J.: Mathematical Modeling in Epidemiology. Springer, New York (1980)

    MATH  Google Scholar 

  10. Wang, Y., Wang, C.X.: Modeling the effects of timing parameters on virus propagation. In: Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003), p. 7 (2003)

    Google Scholar 

  11. SSFNET. Modeling the Global Internet, http://www.ssfnet.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, P., Fang, B., Yun, X. (2006). Model and Estimation of Worm Propagation Under Network Partition. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Information Security Practice and Experience. ISPEC 2006. Lecture Notes in Computer Science, vol 3903. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11689522_6

Download citation

  • DOI: https://doi.org/10.1007/11689522_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33052-3

  • Online ISBN: 978-3-540-33058-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics