The Effect of Infection Time on Internet Worm Propagation

Size: px
Start display at page:

Download "The Effect of Infection Time on Internet Worm Propagation"

Transcription

1 The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1

2 Background Worms are self propagating programs that spread over a network, usually the Internet Unlike viruses, worms are not dependent on other programs, like clients Worms spread by scanning the network for vulnerable machines and then infecting them The Effect of Infection Time oninternet Worm Propagation p 2

3 Worm Spread Internet worms can spread devastatingly quickly July 2001: Code Red infects 359,000 computers in less than 14 hours January 2003: SQL Slammer infects 75,000 computers in 10 minutes August 2003: MSBlaster infects 120,000 computers in 24 hours The Effect of Infection Time oninternet Worm Propagation p 3

4 Existing Models Propagation Models Staniford, Paxson & Weavers s Random Constant Spread Model (RCS) Kephart & White s Epidemiological Model Kermack-Mckendrick Epidemic Model Chen, Gao & Kwiat s Analytical Active Worm Propagation Model (AAWP) Specialized Models Williamson & Léveillé s Virus Scanner Model Zou, Gong & Towsley s Dynamic Quarantine Model The Effect of Infection Time oninternet Worm Propagation p 4

5 Infection Time These models ignore the fact that computers are not infected instantaneously It takes time for the worm to transer its code to the infected machine Does transfer time significantly effect the time it takes a worm to spread? The Effect of Infection Time oninternet Worm Propagation p 5

6 Approach Extend the Kermack-Mckendrick Epidemic Model to have a state for scanned computers The Effect of Infection Time oninternet Worm Propagation p 6

7 Assumptions Computers are not entering the network Removed computers never re-enter the network Computers are only removed after they have been fully infected Any computer can reach any other computer in one hop, and scanning is random The network is large The worm in running on an IPv4 network Infected machines rarely scan the same machine at the same time The network speed is not affected by the worm The Effect of Infection Time oninternet Worm Propagation p 7

8 Assumptions Computers are not entering the network Removed computers never re-enter the network Computers are only removed after they have been fully infected Any computer can reach any other computer in one hop, and scanning is random The network is large The worm in running on an IPv4 network Infected machines rarely scan the same machine at the same time The network speed is not affected by the worm The Effect of Infection Time oninternet Worm Propagation p 7

9 My Model: Populations Define the following populations: V : Vulnerable machines S: Scanned machines I: Infected machines R: Removed machines The Effect of Infection Time oninternet Worm Propagation p 8

10 My Model: Constants Define the following constants: η: Scans per second from an infected machine β: η 2 32, the chance a scan hits a real IP address γ: Removal rate of infected machines γ 1 is the average number of seconds an infected machine will spread the worm τ: The average network transfer rate in KB/s σ: The size of the worm in KB The Effect of Infection Time oninternet Worm Propagation p 9

11 My Model: Equations dv dt = βiv di dt = τ σ S γi ds dt = βiv τ σ S dr dt = γi The Effect of Infection Time oninternet Worm Propagation p 10

12 Results: Code Red These results show the effect of scanning for the Code Red worm For this simulation V 0 = 500,000, I 0 = 1, t max = 100 hours, η = 2 scans/s, and γ = For the scanning model (right) σ = 4 KB, τ = 001 KB/s 5 x 105 Worm Spread Under the Kermack Mckendrick Epidemic Model 5 x 105 Worm Spread Under the Scanning Model Population size % of total population Infected Removed Vulnerable Population size % of total population Infected Removed Vulnerable Scanned time (hours) time (hours) The Effect of Infection Time oninternet Worm Propagation p 11

13 Results: SQL Slammer These results show the effect of scanning for the Code Red worm For this simulation V 0 = 75,000, I 0 = 10, t max = 600 seconds, η = 4000 scans/s, and γ = For the scanning model (right) σ = 04 KB, τ = 001 KB/s 8 x 104 Worm Spread Under the Kermack Mckendrick Epidemic Model 8 x 104 Worm Spread Under the Scanning Model Population size % of total population Infected Removed Vulnerable Population size % of total population Infected Removed Vulnerable Scanned time (seconds) time (seconds) The Effect of Infection Time oninternet Worm Propagation p 12

14 Analysis Choice of network speed: 001 KB/s reflects the network slowing due to the worm Code Red: The download time for the worm is not significant when the scan rate is low SQL Slammer: The download time for the worm is significant when the scan rate is high Extensions: Model the network speed as a function of the number of infected computers The Effect of Infection Time oninternet Worm Propagation p 13

15 References [1] David Becker & Matt Hines FBI arrests MSBlast worm suspect [2] CAIDA Analysis of Code Red [3] Zesheng Chen, Lixin Gao, & Kevin Kwiat Modeling the Spread of Active Worms wwwlabreatechnologiescom/aawppdf [4] Cliff Changchun Zou, Weibo Gong, & Don Towsley Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense tennisecsumassedu/~czou/research/dynamicquarantinepdf [5] Kimberly Claffy Internet traffic characterization citeseeristpsuedu/claffy94internethtml [6] David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, & Nicholas Weaver The Spread of the Sapphire/Slammer Worm The Effect of Infection Time oninternet Worm Propagation p 14

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

Optimal worm-scanning method using vulnerable-host distributions

Optimal worm-scanning method using vulnerable-host distributions Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,

More information

IPv4 Routing Worm - A Fast, Selective Attack

IPv4 Routing Worm - A Fast, Selective Attack 1 Routing Worm: A Fast, Selective Attack Worm based on IP Address Information Cliff C. Zou, Don Towsley, Weibo Gong, Songlin Cai Department of Electrical & Computer Engineering Department of Computer Science

More information

The Spread of the Sapphire/Slammer Worm

The Spread of the Sapphire/Slammer Worm The Spread of the Sapphire/Slammer Worm By (in alphabetical order) David Moore Vern Paxson Stefan Savage Colleen Shannon Stuart Staniford Nicholas Weaver CAIDA & UCSD CSE ICIR & LBNL UCSD CSE CAIDA Silicon

More information

Source Code Analysis of Worms

Source Code Analysis of Worms Source Code Analysis of Worms Puja Bajaj, Arjun Guha Roy Department of Computer Science St. Cloud State University, St. Cloud MN 56301 [email protected], [email protected] Abstract New

More information

A Study of Mass-mailing Worms

A Study of Mass-mailing Worms A Study of Mass-mailing Worms Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang Carnegie Mellon University 5 Forbes Avenue, Pittsburgh, PA, 15213 {cindywon, bielski, jonmccune, chenxi}@cmu.edu

More information

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay [email protected]

More information

Review Study on Techniques for Network worm Signatures Automation

Review Study on Techniques for Network worm Signatures Automation Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,

More information

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006 CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your

More information

Code Red Worm Propagation Modeling and Analysis

Code Red Worm Propagation Modeling and Analysis Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou Dept. Electrical & Computer Engineering Univ. Massachusetts Amherst, MA [email protected] Weibo Gong Dept. Electrical & Computer Engineering

More information

How To Attack A Server With A Ddos Attack On A Zombie Army Of Your Computer (For A Free Download)

How To Attack A Server With A Ddos Attack On A Zombie Army Of Your Computer (For A Free Download) Outline Early DoS and Worms Ben Wilde 7 February, 2005 Comp 290 Network Intrusion Detection Introduction to worms Potential damage that *could* be caused (theoretical) Examples of recent worms and DoS

More information

How To Understand The History Of The Witty Worm

How To Understand The History Of The Witty Worm The Spread of the Witty Worm Colleen Shannon David Moore cshannon @ caida.org dmoore @ caida.org www.caida.org SDRIW, June 15, 2004 UCSD CSE What is CAIDA? Cooperative Association for Internet Data Analysis

More information

MODELING AND DEFENDING AGAINST INTERNET WORM ATTACKS

MODELING AND DEFENDING AGAINST INTERNET WORM ATTACKS MODELING AND DEFENDING AGAINST INTERNET WORM ATTACKS A Thesis Presented to The Academic Faculty by Zesheng Chen In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School

More information

A Firewall Network System for Worm Defense in Enterprise Networks

A Firewall Network System for Worm Defense in Enterprise Networks 1 A Firewall Network System for Worm Defense in Enterprise Networks Cliff C. Zou, Don Towsley, Weibo Gong {czou,gong}@ecs.umass.edu, [email protected] Univ. Massachusetts, Amherst Technical Report:

More information

Distributed Worm Simulation with a Realistic Internet Model

Distributed Worm Simulation with a Realistic Internet Model Distributed Worm Simulation with a Realistic Internet Model Songjie Wei, Jelena Mirkovic, Martin Swany Computer & Information Sciences University of Delaware Newark, DE 19716 (weis, sunshine, [email protected])

More information

A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks

A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks A Real-Time Network Traffic Based Worm Detection System for Enterprise Networks Long-Quan Zhao 1, Seong-Chul Hong 1, Hong-Taek Ju 2 and James Won-Ki Hong 1 1 Dept. of Computer Science and Engineering,

More information

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast? First Worm Ever Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in November 9 Worm was

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

An Approach against a Computer Worm Attack

An Approach against a Computer Worm Attack 48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono;

More information

Lecture 19 - Network Security

Lecture 19 - Network Security Lecture 19 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Exploiting the network... The Internet is extremely

More information

Inferring Internet Denial-of

Inferring Internet Denial-of Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested

More information

Tartarus: A honeypot based malware tracking and mitigation framework

Tartarus: A honeypot based malware tracking and mitigation framework Tartarus: A honeypot based malware tracking and mitigation framework Samuel Oswald Hunter Dept. Computer Science Rhodes University Grahamstown, South Africa Email: [email protected] Barry Irwin Dept.

More information

Analysis of Attacks towards Turkish National Academic Network

Analysis of Attacks towards Turkish National Academic Network Analysis of Attacks towards Turkish National Academic Network Murat SOYSAL, Onur BEKTAŞ Abstract Monitoring unused IP address is an emerging method for capturing Internet security threads. Either an attack

More information

CSE331: Introduction to Networks and Security. Lecture 14 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 14 Fall 2006 CSE331: Introduction to Networks and Security Lecture 14 Fall 2006 Announcements Homework 1 has been graded: Class average: 82 Std. Dev.: 13 CSE331 Fall 2004 2 Malicious Code Trapdoors (e.g. debugging

More information

INTRUSION DETECTION SYSTEMS. Edited by Pawel Skrobanek

INTRUSION DETECTION SYSTEMS. Edited by Pawel Skrobanek INTRUSION DETECTION SYSTEMS Edited by Pawel Skrobanek Intrusion Detection Systems Edited by Pawel Skrobanek Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright 2011 InTech All chapters

More information

2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks

2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks 2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor

More information

Slammer (sometimes called Sapphire) was the

Slammer (sometimes called Sapphire) was the Inside the Slammer Worm Slammer Worm Dissection DAVID MOORE Cooperative Association for Internet Data Analysis and University of California, San Diego VERN PAXSON International Computer Science Institute

More information

Lecture 13 - Network Security

Lecture 13 - Network Security Lecture 13 - Network Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Exploiting the network... The Internet is extremely

More information

Software & Hardware Security

Software & Hardware Security Software & Hardware Security Erik Poll Digital Security group Radboud University Nijmegen The Netherlands Nijmegen 2 Digital Security group Rigorous & formal methods to design & analyse secure ICT systems

More information

Computer Security DD2395

Computer Security DD2395 Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare

More information

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across

More information

Nonlinear Analysis: Real World Applications

Nonlinear Analysis: Real World Applications Nonlinear Analysis: Real World Applications 11 (21) 4335 4341 Contents lists available at ScienceDirect Nonlinear Analysis: Real World Applications journal homepage: www.elsevier.com/locate/nonrwa Fuzzy

More information

How to Detect and Prevent Cyber Attacks

How to Detect and Prevent Cyber Attacks Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040583 6-9 Jul 2004 updated S3-040566 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040566 based on the comments on SA3 mailing list Source:

More information

Malware: Malicious Software

Malware: Malicious Software Malware: Malicious Software 10/21/2010 Malware 1 Viruses, Worms, Trojans, Rootkits Malware can be classified into several categories, depending on propagation and concealment Propagation Virus: human-assisted

More information

On the Development of an Internetwork-centric Defense for Scanning Worms

On the Development of an Internetwork-centric Defense for Scanning Worms On the Development of an Internetwork-centric Defense for Scanning Worms Scott E. Coull Department of Computer Science University of North Carolina 01 South Columbia Street Chapel Hill, NC 7599, USA [email protected]

More information

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:

More information

1 Introduction. Agenda Item: 7.23. Work Item:

1 Introduction. Agenda Item: 7.23. Work Item: 3GPP TSG SA WG3 Security S3#34 S3-040682 6-9 Jul 2004 updated S3-040632 Acapulco, Mexico Title: Selective Disabling of UE Capabilities; updated S3-040583 based on the comments in SA3#34 meeting Source:

More information

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

HoneyBOT User Guide A Windows based honeypot solution

HoneyBOT User Guide A Windows based honeypot solution HoneyBOT User Guide A Windows based honeypot solution Visit our website at http://www.atomicsoftwaresolutions.com/ Table of Contents What is a Honeypot?...2 How HoneyBOT Works...2 Secure the HoneyBOT Computer...3

More information

Firewalls and intrusion detection systems

Firewalls and intrusion detection systems Firewalls and intrusion detection systems Markus Peuhkuri 2005-03-22 Lecture topics Firewalls Security model with firewalls Intrusion detection systems Intrusion prevention systems How to prevent and detect

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =

More information

A Realistic Simulation of Internet-Scale Events

A Realistic Simulation of Internet-Scale Events A Realistic Simulation of Internet-Scale Events Songjie Wei and Jelena Mirkovic Department of Computer and Information Sciences University of Delaware Newark, DE 19716 (weis, sunshine)@cis.udel.edu ABSTRACT

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

A Survey Paper on Malicious Computer Worms

A Survey Paper on Malicious Computer Worms A Survey Paper on Malicious Computer Worms I B. Rajesh, II Y.R. Janardhan Reddy, III B. Dillip Kumar Reddy I,II,III Asst. Professor, G.Pulla Reddy Engg. College, Kurnool, Andhra Pradesh, India Abstract

More information

Research in Computer Viruses and Worms. Tom Chen SMU [email protected]

Research in Computer Viruses and Worms. Tom Chen SMU tchen@engr.smu.edu Research in Computer Viruses and Worms Tom Chen SMU [email protected] Outline About Me and SMU Background on Viruses/Worms Research Activities - - - Virus research lab Early detection Epidemic modeling

More information

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration

Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration Frequently Asked Questions for New Electric Mail Administrators 1 Domain Setup/Administration 1.1 How do I access the records of the domain(s) that I administer? To access the domains you administer, you

More information

Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions

Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305 Extended

More information

A SURVEY OF INTERNET WORM DETECTION

A SURVEY OF INTERNET WORM DETECTION 1ST QUARTER 2008, VOLUME 10, NO. 1 IEEE COMMUNICATIONS SURVEYS The Electronic Magazine of Original Peer-Reviewed Survey Articles www.comsoc.org/pubs/surveys A SURVEY OF INTERNET WORM DETECTION AND CONTAINMENT

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Malware Defense Using Network Security Authentication

Malware Defense Using Network Security Authentication Proceedings of the IEEE International Information Assurance Workshop, 2005 Malware Defense Using Network Security Authentication Joseph V. Antrosio and Errin W. Fulp Wake Forest University Department of

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information