Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/948187.948196acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Worm anatomy and model

Published: 27 October 2003 Publication History

Abstract

We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of a worm based on a survey of contemporary worms. We build on that life cycle by developing a relational model that associates worm parameters, attributes of the environment, and the subsequent potency of the worm. We then provide a worm analytic framework that captures the generalized mechanical process a worm goes through while moving through a specific environment and its state as it does so. The key contribution of this work is a worm analytic framework. This framework can be used to evaluate worm potency and develop and validate defensive countermeasures and postures in both static and dynamic worm conflict. This framework will be implemented in a modeling and simulation language in order to evaluate the potency of specific worms within an environment.

References

[1]
http://www.cert.org/body/advisories/CA200126_FA200126.html
[2]
Fred Cohen, "Computer Viruses: Theory and Experiments", Computers and Security, Volume 6, Number 1, January, 1987, pp 22--35.
[3]
Fred Cohen, "A Formal Definition of Computer Worms and Some Related Results", Computers and Security, Volume 11, Number 7, November, 1992, pp 641--652.
[4]
Stuart Staniford-Chen, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, D. Zerkle, "GrIDS A Graph-Based Intrusion Detection System for Large Networks", In the Proceedings of the 19th National Information Systems Security Conference, 1996.
[5]
Robert Baldwin, Rule Based Analysis of Computer Security. PhD Thesis, MIT EE, June 1987.
[6]
Dan Zerkle, Karl Levitt, "NetKuang -- A Multi-Host Configuration Vulnerability Checker", In 6th USENIX Security Symposium, San Jose, California, July 1996.
[7]
Paul Ammann, Duminda Wijesekera, Saket Kaushik, "Scalable, Graph-based Network Vulnerability Analysis", ACM CCS 2002, November 18-22, 2002, Washington, DC.
[8]
Oleg Sheyner, Somesh Jha, Jeannette M. Wing, "Automated Generation and Analysis of Attack Graphs", Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
[9]
J. O. Kephat, S. R. White, "Directed-graph Epidemiological Models of Computer Viruses", Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343--359.
[10]
J. O. Kephart, S. R. White, and Chess, "Computers and Epidemiology", IEEE Spectrum, May 1993.
[11]
Stuart Staniford, Vern Paxson, Nicholas Weaver, "How to 0wn the Internet in Your Spare Time", Proceedings of the 11th USENIX Security Symposium 2002.
[12]
Cliff Changchun Zou, Weibo Gong, Don Towsley, "Code Red Worm Propagation Modeling and Analysis", ACM CCS 2002, November 18-22, 2002, Washington, DC.
[13]
Chenxi Wang, John Knight, Matthew Elder, "On Computer Viral Infection and the Effect of Immunization", ACSAC 2000, pp 246--25.
[14]
http://www.sophos.com/virusinfo/analyses/w32nachia.html
[15]
http://www.whitehats.com/library/worms/lion/

Cited By

View all
  • (2020)Generalization Performance Comparison of Machine Learners for the Detection of Computer Worms Using Behavioral FeaturesSoft Computing: Theories and Applications10.1007/978-981-15-4032-5_62(677-693)Online publication date: 30-Jun-2020
  • (2019)Toward Network Worm Victims Identification Based on Cascading Motif DiscoveryElectronics10.3390/electronics80201838:2(183)Online publication date: 5-Feb-2019
  • (2013)Evaluating Security and Resilience of Critical Networked Infrastructures after StuxnetCritical Information Infrastructure Protection and Resilience in the ICT Sector10.4018/978-1-4666-2964-6.ch012(242-256)Online publication date: 2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
October 2003
92 pages
ISBN:1581137850
DOI:10.1145/948187
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. network modeling
  2. network security
  3. turing machine
  4. worm

Qualifiers

  • Article

Conference

CCS03
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)6
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Generalization Performance Comparison of Machine Learners for the Detection of Computer Worms Using Behavioral FeaturesSoft Computing: Theories and Applications10.1007/978-981-15-4032-5_62(677-693)Online publication date: 30-Jun-2020
  • (2019)Toward Network Worm Victims Identification Based on Cascading Motif DiscoveryElectronics10.3390/electronics80201838:2(183)Online publication date: 5-Feb-2019
  • (2013)Evaluating Security and Resilience of Critical Networked Infrastructures after StuxnetCritical Information Infrastructure Protection and Resilience in the ICT Sector10.4018/978-1-4666-2964-6.ch012(242-256)Online publication date: 2013
  • (2013)Study on Computer Network Intrusion Effect EvaluationProceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control10.1109/IMCCC.2013.80(349-353)Online publication date: 21-Sep-2013
  • (2013)PLC security and critical infrastructure protection2013 IEEE 8th International Conference on Industrial and Information Systems10.1109/ICIInfS.2013.6731959(81-85)Online publication date: Dec-2013
  • (2013)Agents in Simulation of Cyberattacks to Evaluate Security of Critical InfrastructuresMultiagent Systems and Applications10.1007/978-3-642-33323-1_6(129-146)Online publication date: 2013
  • (2011)Agent‐based modeling of malware dynamics in heterogeneous environmentsSecurity and Communication Networks10.1002/sec.2986:12(1576-1589)Online publication date: 25-Feb-2011
  • (2011)Internet epidemiology: healthy, susceptible, infected, quarantined, and recoveredSecurity and Communication Networks10.1002/sec.2874:2(216-238)Online publication date: 5-Jan-2011
  • (2010)Community epidemic detection using time-correlated anomaliesProceedings of the 13th international conference on Recent advances in intrusion detection10.5555/1894166.1894191(360-381)Online publication date: 15-Sep-2010
  • (2010)Defending against the propagation of active wormsThe Journal of Supercomputing10.1007/s11227-009-0283-851:2(167-200)Online publication date: 1-Feb-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media