Self-adaptive Worms and Countermeasures

نویسندگان

  • Wei Yu
  • Nan Zhang
  • Wei Zhao
چکیده

In this paper, we address issues related to defending against widespreading worms on the Internet. We study a new class of worms called the selfadaptive worms. These worms dynamically adapt their propagation patterns to defensive countermeasures, in order to avoid or postpone detection, and to eventually infect more computers. We show that existing worm detection schemes cannot effectively defend against these self-adaptive worms. To counteract these worms, we introduce a game-theoretic formulation to model the interaction between worm propagator and defender. We show that the effective integration of multiple defensive schemes (e.g., worm detection, forensics analysis) is critical for defending against self-adaptive worms. We propose different combinations of defensive schemes for different kinds of self-adaptive worms, and evaluate the performance of defensive schemes based on real-world traffic traces.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Scanners: Empirical Assessment on a 3G Network

Malicious agents like self-propagating worms often rely on port or address scanning to discover new potential victims. The ability to detect active scanners based on passive traffic monitoring is an important prerequisite for taking appropriate countermeasures. In this work we evaluate experimentally two common algorithms for scanner detection based on extensive analysis of real traffic traces ...

متن کامل

Optimal Control Model for Attack of Worms in Wireless Sensor Network

Wireless Sensor Network (WSN) is composed of large number of sensor nodes which communicate with each other through wireless medium. Such networks are prone to the attack of self-replicating worms known as malware used to bring different form of attacks on the WSN during the communication of the sensor nodes. Efficient countermeasures to anticipate malware hazards are to be developed and unders...

متن کامل

Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures

Internet worms remain one of the major threats to the Internet infrastructure. Modeling allows forecasting the malware propagation consequences and evolution trends, planning countermeasures and many other tasks that cannot be investigated without harm to production systems in the wild. Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. foreca...

متن کامل

Worm Propagation and Countermeasures

Recent history has amply demonstrated the threat that worms pose to the Internet and those who rely on its correct functioning. Most of the damage done by worms can be traced to the burden they place on networks due to their characteristic exponential growth as they seek to propagate themselves. As such, if security professionals can develop a framework for preventing worm propagation then they...

متن کامل

A Comparison of Self-Compassion and Self-Esteem Based on Their Relationship With Adaptive and Maladaptive Emotion Regulation Strategies

Objective: The purpose of this study was to investigate the relationship between adaptive and maladaptive cognitive emotion regulation strategies, self-compassion, and self-esteem; and to determine whether self-compassion compared to self-esteem, was a better predictor of the scores on the adaptive and maladaptive cognitive emotion regulation strategies.  Methods: This was a cross-section...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006