A closed-form expression for static worm-scanning strategies

被引:4
作者
Chen, Zesheng [1 ]
Chen, Chao [2 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
[2] Purdue Univ, Indiana Univ, Dept Engn, Ft Wayne, IN 46805 USA
来源
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13 | 2008年
关键词
D O I
10.1109/ICC.2008.304
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately capture the worm propagation speed before the number of infections becomes large and explicitly demonstrate the effects of important parameters such as the vulnerable-host distribution and the worm-scanning strategy. Our approach is based on the mean-field theory that investigates the average number of infected hosts over time. Experiments are carried out based on the parameters chosen from the Witty worm. Experimental results verify that the closed-form expression can accurately reflect the mean value of infections over time before the infected hosts become saturated for a wide range of scanning methods. Therefore, our model can help defenders design better detection and defense systems and provide a stepping stone towards obtaining closed-form expressions for the propagation of dynamic worm-scanning strategies.
引用
收藏
页码:1573 / +
页数:2
相关论文
共 18 条
[1]  
Abu Rajab M, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P225
[2]  
CHEN Z, 2008, P INFOCOM 08 MIN PHO
[3]  
CHEN Z, 2007, P INFOCOM 07 ANCH AK
[4]  
CHEN Z, 2005, P ACM CCS WORKSH RAP, P22
[5]   Understanding localized-scanning worms [J].
Chen, Zesheng ;
Chen, Chao ;
Ji, Chuanyi .
2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, :186-+
[6]  
Chen ZS, 2003, IEEE INFOCOM SER, P1890
[7]  
CHEN ZS, 2007, INT J SECURITY NETWO, V2
[8]  
NICOL DM, 2006, P ACM CCS WORKSH RAP
[9]  
ROHLOFF K, 2005, P 14 ICCCN
[10]   The spread of the witty worm [J].
Shannon, C ;
Moore, D .
IEEE SECURITY & PRIVACY, 2004, 2 (04) :46-50