DocumentCode :
160525
Title :
A Pseudo-Worm Daemon (PWD) for empirical analysis of zero-day network worms and countermeasure testing
Author :
Shahzad, Khurram ; Woodhead, Steve
Author_Institution :
Dept. of Electr., Univ. of Greenwich, London, UK
fYear :
2014
fDate :
11-13 July 2014
Firstpage :
1
Lastpage :
6
Abstract :
The cyber epidemiological analysis of computer worms has emerged a key area of research in the field of cyber security. In order to understand the epidemiology of computer worms; a network daemon is required to empirically observe their infection and propagation behavior. The same facility can also be employed in testing candidate worm countermeasures. In this paper, we present the architecture and design of Pseudo-Worm Daemon; termed (PWD), which is designed to perform true random scanning and hit-list worm like functionality. The PWD is implemented as a proof-of-concept in C programming language. The PWD is platform independent and can be deployed on any host in an enterprise network. The novelty of this worm daemon includes; its UDP based propagation, a user-configurable random scanning pool, ability to contain a user defined hit-list, authentication before infecting susceptible hosts and efficient logging of time of infection. Furthermore, this paper presents experimentation and analysis of a Pseudo-Witty worm by employing the PWD with real Witty worm outbreak attributes. The results obtained by Pseudo-Witty worm outbreak are quite comparable to real Witty worm outbreak; which are further quantified by using the Susceptible Infected (SI) model.
Keywords :
C language; invasive software; program testing; C programming language; PWD; UDP based propagation; computer worms; cyber epidemiological analysis; cyber security; enterprise network; hit-list worm like functionality; pseudo-witty worm outbreak; pseudo-worm daemon; random scanning functionality; susceptible infected model; user-configurable random scanning pool; worm countermeasure testing; worm infection behavior; worm propagation behavior; zero-day network worms; Computational modeling; Computer worms; Grippers; IP networks; Mathematical model; Servers; Silicon; cyber; hit-list; scanning; witty; worm;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on
Conference_Location :
Hefei
Print_ISBN :
978-1-4799-2695-4
Type :
conf
DOI :
10.1109/ICCCNT.2014.6963124
Filename :
6963124
Link To Document :
بازگشت