Browse > Article
http://dx.doi.org/10.13089/JKIISC.2007.17.5.73

A Study of Worm Propagation Modeling extended AAWP, LAAWP Modeling  

Jun, Young-Tae (Korea University)
Seo, Jung-Taek (The Attacked Institute of ETRI)
Moon, Jong-Sub (Korea University)
Abstract
Numerous types of models have been developed in recent years in response to the cyber threat posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical modeling techniques such as Epidemic, AAWP (Analytical Active Worm Propagation Modeling) and LAAWP (Local AAWP). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the entire nv4 network and fail to consider the effects of countermeasures, making it difficult to analyze the extent of damage done by them and the effects of countermeasures in a specific network. This paper extends the equations and parameters of AAWP and LAAWP and suggests ALAAWP (Advanced LAAWP), a new worm simulation technique that rectifies the drawbacks of existing models.
Keywords
Worm; Worm Modeling; AAWP; LAAWP; ALAAWP;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.trendmicro.com/kr/products/network/viruswall1200/evaluate/cases/kookminilbo.htm
2 Hyundo Park, Heejo Lee, 'Detection Unknown Worms Using Randomness Check', KOREA University
3 Brian D. Carrier, Sundararaman Jeyaraman, Sarah Sellke, 'IMPACT OF NETWORK DESIGN ON WORM PROPAGATION', Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086
4 A. Machie, J. Roculan, R. Russell, and M. V. Velzen, 'Nimda Worm Analysis,' Tech. Rep., Incident Analysis, SecurityFocus, Sept. 2001
5 D. Song, R. Malan, and R. Stone, 'A Snapshot of Global Internet Worm Activity,' Tech. Rep., Arbor Networks, Nov. 2001
6 Zesheng Chen, Lixin Gao, Kevin Kwiat, 'Modeling the Spread of Active Worms' pp. 1-11, ieee
7 S. Staniford, V. Paxson, N. Weaver, 'How to Own the Internet in your spare time,' in Proc. of the 11th USENIX Security Symposium (Secu- rity'02), San Francisco, CA, Aug. 2002
8 Zesheng Chen, Chuanyi Ji, 'Optimal wormscanning method using vulnerable-host distributions'
9 R. Russell and A. Machie, 'Code Red II Worm,' Tech. Rep., Incident Analysis, SecurityFocus, Aug. 2001
10 http://www.caida.org/analysis/security/code-red/#crii
11 J. O. Kephart and S. R. White, 'Directedgraph Epidemiological Models of Computer Viruses,' in Proc. of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 1991, pp. 343-359
12 Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense', Univ. Massachusetts Amherst, MA1
13 Cliff Changchun Zou, Weibo Gong, Don Towsley 'Code Red Worm Propagation Modeling and Analysis', Conference on Computer and Communications Security, 2002
14 N.Weaver, WarholWorms, 'The Potential for Very Fast Internet Plagues', http://www.cs.berkeley.edu/-nweaver/warhol.html., august 15th, 2001
15 Yong Huang, 'Code-Red: a case study on the spread and victims of an Internet worm' 15-20, David Moore, Colleen Shannon, K Claffy CAIDA, San Diego Supercomputer Center, UCSD IMW 2002 Presented by: Yong Huang
16 F.B Cohen, 'A Formal Definition of Computer Worms and Some Related Results', Computers & Security, 7(11) (1992), pp. 641-652, ISSN 0167-4048, 1992
17 CERT/CC, 'CERT Advisory CA-2001-26 Nimda Worm,' http://www.cert.org/advisories/CA-2001-26.html, Sept. 2001
18 http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
19 http://www.caida.org/analysis/security/code-red/#crii
20 Dr. Winfried Gleissner, 'A Mathematical Theory for the Spread of Computer Viruses', Computers & Security, 8, 1989, pp. 35-41, ISSN 0167-4048, February 1989   DOI   ScienceOn
21 Stuart Staniford, Vern Paxson, Nicholas Weaver, David Moore, 'The Top Speed of Flash Worms', Workshop on Rapid Malcode, 2004