Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.3.43

A Hybrid Modeling Method for RCS Worm Simulation  

Kim, Jung-Sik (Hanyany University)
Park, Jin-Ho (Hanyany University)
Cho, Jae-Ik (Hanyany University)
Choi, Kyoung-Ho (Hanyany University)
Im, Eul-Gyu (Hanyany University)
Abstract
Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. Simulation is one of the most widely used method to study internet worms. But, it is quite challenging to simulate very large-scale worm attacks because of various reasons. In this paper, we propose a hybrid modeling method for RCS(Random Constant Spreading) worm simulation. The proposed hybrid model simulates worm attacks by synchronizing modeling network and packet network. So, this model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet. Moreover, our model have the capability of dynamic updates of the modeling parameters. Finally, we simulate the hybrid model with the CodeRed worm to show validity of our proposed model for RCS worm simulation.
Keywords
RCS Worm Simulation; Hybrid Model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yong Liu, Francesco Lo Presti, Vishal Misra. 'Fluid Models and Solutions for Large-Scale IP Networks'. ACM SIGMETRICS Performance Evaluation Review, Volume 31, Issue 1, pp. 91-101, 2003   DOI
2 D.J.Daley, J.Gani. 'Epidemic modelling : an introduction', Cambridge University Press, 1999
3 David Moore, Colleen Shannon. 'The Spread of the Code-Red Worm (CRvw)'. CAIDA Analysis page. www.caida.org/analysis/security/codered/coderedv2_analysis.xml
4 Stuart Staniford, Vern Paxson, Nicholas Weaver. 'How to Own the Internet in Your Spare Time'. In Proceedings of the 11th USENIX Security Symposium, pp. 149-167, 2002
5 Cameron Kiddle, Rob Simmonds, Carey Williamson, Brian Unger. 'Hybrid packet/fluid flow network simulation'. In Proceedings of the Seventeenth Workshop on Parallel and Distributed Simulation (PADS'03), pp. 143, 2003
6 Benjamin Melamed, Shuo Pan, Yorai Wardi. 'Hybrid discrete-continuous fluid-flow simulation'. SPIE, Volume 4526, pp. 263-270, 2001   DOI
7 David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver. 'The Spread of the Sapphire/Slammer Worm'. CAIDA Technical report, 2003
8 NS-2 Web page. http://www.isi.edu/nsnam/ns/
9 Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray. 'Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing'. In Proceedings of the ACM WORM 2003, pp.24-33
10 Vishal Misra, Wei-Bo Gong, Don Towsley. 'Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED'. ACM SIGCOMM Computer Communication Review, Volume 30, Issue 4, pp. 151-160, 2000   DOI
11 Kalyan S. Perumalla, Srikanth Sundaragopalan. 'High-Fidelity Modeling of Computer Network Worms'. In Proceedings of the 20th Annual Computer Security Applications Conference(ACSAC '04), pp. 126-135, 2004
12 SSFNet Web page. http://www.ssfnet.org/
13 Xiang Zeng, Rajive Bagrodia, Mario Gerla. 'GloZeng, Rajive BagrodiaMoSim: A library for parallel simulation of large-scale wireless networks'. In Proceedings of the 12th Workshop on Parallel and Distributed Simulation, pp. 154-161, 1998