DocumentCode :
2028702
Title :
A propagation model of a vulnerability mitigation computer worm - seawave
Author :
Al-Salloum, Ziyad S. ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group, R. Holloway, Univ. of London, London, UK
fYear :
2011
fDate :
6-8 Sept. 2011
Firstpage :
347
Lastpage :
352
Abstract :
In this paper, we propose and analyze an analytical propagation model of a vulnerability mitigation worm (Seawave). The model takes into consideration the topology structure of enterprise networks such as switches, LANs, and backbone, proposing the first computer worm that use layer two of the OSI model as its main propagation medium. The model also addresses the worm´s communication delays due to CAM table reading (α), neighbor switch communication (β), and backbone mapping (ε). We also propose a bandwidth model to measure the traffic generated within different stages of worm propagation. Different simulations of different hierarchical topologies of enterprise networks have been driven to further evaluate and observe the defensive worm´s performance in large scale networks.
Keywords :
computer network security; invasive software; local area networks; telecommunication network topology; CAM table reading; backbone mapping; backbone network; bandwidth model; enterprise network; large scale network; local area network; neighbor switch communication; seawave worm; switch network; vulnerability mitigation computer worm; worm communication delay; worm propagation model; Bandwidth; Computational modeling; Delay; Grippers; Network topology; Switches; Topology;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and System Security (NSS), 2011 5th International Conference on
Conference_Location :
Milan
Print_ISBN :
978-1-4577-0458-1
Type :
conf
DOI :
10.1109/ICNSS.2011.6060028
Filename :
6060028
Link To Document :
بازگشت