DocumentCode
2700635
Title
Analyzing the performance of Internet worm attack approaches
Author
Yu, Wei
Author_Institution
Dept. of Comput. Sci., Texas A&M Univ., College Station, TX
fYear
2004
fDate
11-13 Oct. 2004
Firstpage
501
Lastpage
506
Abstract
Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency
Keywords
Internet; invasive software; Internet worm attack; P2P hitlist-based victim selection strategy; active worm propagation event; worm instance cooperation; Computer crime; Computer science; Computer worms; Diversity reception; Humans; IP networks; Internet; Intrusion detection; Numerical analysis; Performance analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. 13th International Conference on
Conference_Location
Chicago, IL
ISSN
1095-2055
Print_ISBN
0-7803-8814-3
Type
conf
DOI
10.1109/ICCCN.2004.1401717
Filename
1401717
Link To Document