Browse > Article
http://dx.doi.org/10.3837/tiis.2010.04.007

The Analysis of Random Propagating Worms using Network Bandwidth  

Ko, Kwang-Sun (School of Information and Communication Engineering, Sungkyunkwan University)
Jang, Hyun-Su (School of Information and Communication Engineering, Sungkyunkwan University)
Park, Byuong-Woon (School of Information and Communication Engineering, Sungkyunkwan University)
Eom, Young-Ik (School of Information and Communication Engineering, Sungkyunkwan University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.4, no.2, 2010 , pp. 191-204 More about this Journal
Abstract
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model uses the number of infected hosts in a domain as a factor in the worms' propagation. However, there are difficulties in explaining the characteristics of new Internet worms because they have several considerable new features: the denial of service by network saturation, the utilization of a faster scanning strategy, a smaller size in the worm's propagation packet, and to cause maximum damage before human-mediated responses are possible. Therefore, more effective factors are required instead of the number of infected hosts. In this paper, the network bandwidth usage rate is found to be an effective factor that explains the propagations of the new Internet worms with the random scanning strategy. The analysis and simulation results are presented using this factor. The simulation results show that the scan rate is more sensitive than the propagation packet for detecting worms' propagations.
Keywords
Random propagating worms; network bandwidth;
Citations & Related Records

Times Cited By Web Of Science : 0  (Related Records In Web of Science)
Times Cited By SCOPUS : 0
연도 인용수 순위
  • Reference
1 D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "Inside the Slammer Worm," IEEE Security & Privacy, vol.1, no.4, 2003.
2 J.C. Frauenthal, "Mathematical Modeling in Epidemiology," Springer-Verlag, 1980.
3 C.C. Zou, W. Gong, D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in Proc. of CCS02, 2002.
4 CAIDA (Cooperative Association for InternetData Analysis). http://www.caida.org.
5 IANA (Internet Assigned Numbers Authority). http://www.iana.org.
6 The network simulator: NS-2. http://www.isi.edu/nsnam/ns.
7 The MathWorks. http://www.mathworks.com.
8 C.C. Zou, D. Towsley, W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," IEEE Transactions on Dependable and Secure Computing, vol.4, no.2, pp.105-118, 2007.   DOI
9 C.C. Zou, W. Gong, D. Towsley, L. Gao, "The monitoring and early detection of internet worms," IEEE/ACM Transactions on Networking (TON), vol.13, no.5, pp.961-974, 2005.   DOI
10 N. Provos, J. McClain, K. Wang, "Search Worms," in Proc. of the 4th ACM Workshop on Recurring Malcode, pp.1-8, 2006.
11 D. Moore, C. Shannon, G.M. Voelker, S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," in Proc. of IEEE Conference(INFOCOM 2003), 2003.
12 S. Staniford, V. Paxson, N. Weaver, "How to Own the Internet in Your Spare Time," in Proc. of the 11th USENIX Security Symposium, pp.149-167, 2002.
13 H.W. Hethcote, "The Mathematics of Infectious Diseases," In SIAM Review, vo.42, no.4, pp. 599-653, 2000.   DOI   ScienceOn
14 D. Moore, C. Shannon, "Code-Red: a Case Study on the Spread and Victims of an Internet Worm," in Proc. of the 2002 ACM SIGCOMM Internet Measurement Workshop, pp.273-284, 2002.
15 Morris worm. http://en.wikipedia.org/wiki/Morris worm.
16 Norman T. J. BAILEY, "The Mathematical Theory of Epidemics," Hafner Publishing Co, 1957.
17 C.C. Zou, D. Towsley, W. Gong, S. Cai, "Advanced Routing Worm and Its Security Challenges," Simulation, vol.82, no.1, pp.75-85, 2006.   DOI   ScienceOn
18 D.M. Kienzle, M.C. Elder, "Recent worms: a survey and trends," in Proc. of the ACM Workshop on Rapid Malcode, pp.1-10, 2003.
19 S. Qing, W. Wen, "A survey and trends on Internet worms," Computers & Security, vol.24, pp. 334-346, 2005.   DOI   ScienceOn