A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing

被引:0
作者
Shahzad, Khurram [1 ]
Woodhead, Steve [1 ]
Bakalis, Panos [1 ]
机构
[1] Univ Greenwich, Internet Secur Res Lab, Chatham, Kent, England
来源
ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS | 2013年 / 381卷
关键词
Worms; malware; Slammer; testbed; virtualization; VMware;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer network worms are one of the most significant malware threats and have gained wide attention due to their increased virulence, speed and sophistication in successive Internet-wide outbreaks. In order to detect and defend against network worms, a safe and convenient environment is required to closely observe their infection and propagation behaviour. The same facility can also be employed in testing candidate worm countermeasures. This paper presents the design, implementation and commissioning of a novel virtualized malware testing environment, based on virtualization technologies provided by VMware and open source software. The novelty of this environment is its scalability of running virtualised hosts, high fidelity, confinement, realistic traffic generation, and efficient log file creation. This paper also presents the results of an experiment involving the launch of a Slammer-like worm on the testbed to show its propagation behaviour.
引用
收藏
页码:54 / 64
页数:11
相关论文
共 21 条
[1]  
Årnes A, 2006, LECT NOTES COMPUT SC, V4064, P144
[2]  
Benzel T., 2007, DETER, P1
[3]  
Dunlap G., 2002, P USENIX 5 S OP SYST, P208
[4]  
EDIGER B, SIMULATING NETWORK W
[5]   A virtual environment for network testing [J].
Fagen, Wade A. ;
Cangussu, Joao W. ;
Dantu, Ram .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (01) :184-214
[6]   A novel testbed for detection of malicious software functionality [J].
Jensen, Jostein .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :292-+
[7]  
Jiang X, 2004, P 4 IEEE ACM INT S C, P633
[8]  
Jiang XX, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P128
[9]  
Jiang XX, 2006, LECT NOTES COMPUT SC, V3858, P1
[10]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51