• DocumentCode
    2700635
  • Title

    Analyzing the performance of Internet worm attack approaches

  • Author

    Yu, Wei

  • Author_Institution
    Dept. of Comput. Sci., Texas A&M Univ., College Station, TX
  • fYear
    2004
  • fDate
    11-13 Oct. 2004
  • Firstpage
    501
  • Lastpage
    506
  • Abstract
    Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. In this paper, we address the issue by analyzing the impacts of worm attack approaches on Internet worm propagation. In particular, we analyze four worm attack approaches with considering following attack strategies: pure random-based/ PlP (peer-to-peer) hitlist-based strategies for victim selection and cooperation-based/ non-cooperation-based strategies for worm instance coordination. Our numerical analysis results show that the attack approach with combining the worm instance cooperation and P2P hitlist-based victim selection strategies achieves the best performance compared to all other attack approaches in term of attack efficiency
  • Keywords
    Internet; invasive software; Internet worm attack; P2P hitlist-based victim selection strategy; active worm propagation event; worm instance cooperation; Computer crime; Computer science; Computer worms; Diversity reception; Humans; IP networks; Internet; Intrusion detection; Numerical analysis; Performance analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. 13th International Conference on
  • Conference_Location
    Chicago, IL
  • ISSN
    1095-2055
  • Print_ISBN
    0-7803-8814-3
  • Type

    conf

  • DOI
    10.1109/ICCCN.2004.1401717
  • Filename
    1401717