Title :
Analyzing the performance of Internet worm attack approaches
Author_Institution :
Dept. of Comput. Sci., Texas A&M Univ., College Station, TX
Abstract :
Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency
Keywords :
Internet; invasive software; Internet worm attack; P2P hitlist-based victim selection strategy; active worm propagation event; worm instance cooperation; Computer crime; Computer science; Computer worms; Diversity reception; Humans; IP networks; Internet; Intrusion detection; Numerical analysis; Performance analysis;
Conference_Titel :
Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. 13th International Conference on
Conference_Location :
Chicago, IL
Print_ISBN :
0-7803-8814-3
DOI :
10.1109/ICCCN.2004.1401717