Abstract
A feedback control model has been previously proposed to regulate the number of connections at different levels of a network. This regulation is applied in the presence of a worm attack resulting in a slow down of the spreading worm allowing time to human reaction to properly eliminate the worm in the infected hosts. The feedback model constitutes of two queues, one for safe connections and another for suspected connections. The behavior of the proposed model is based on three input parameters to the model. These parameters are: (i) the portion of new connection requests to be sent to the suspect queue, (ii) the number of requests to be transferred from the suspect to the safe queue, and (iii) the time out value of the requests waiting in the suspect queue. The more we understand the effects of these parameters on the model, the better we can calibrate the model. Based on this necessity, a sensitivity analysis of the model is presented here. The analysis allows for the computation of the effects of changing parameters in the output of the model. In addition, the use of a sensitivity matrix permits the computations of not only changes in one parameter but also combined changes of these parameters. From the sensitivity analysis we have verified our assumption that the changes in the input parameters have no effect on the overall system stability. However, there will be a short period of instability before reaching a stable state.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Staniford, S., Paxson, V., Weaver, N.: How to own internet in your spare time. In: Proceedings of the USENIX Security Symposium, August 2002, pp. 149–167 (2002)
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The spread of the sapphire worm, http://cs.berkely.edu/~nweaver/sapphire
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: 18th Annual Computer Security Applications Conference, December 2002, pp. 61–68 (2002)
Sensitivity Analysis. John Wiley & Sons, Chichester (2000)
Dantu, R., Cangussu, J.W., Yelimeli, A.: Dynamic control of worm propagation. In: Proceedings of ITCC 2004, International Conference on Information Technology, April 5-7, 2004, vol. 1, pp. 419–423 (2004)
Brewer, J.W.: Matrix calculus and the sensitivity analysis of linear dynamic systems. IEEE Transactions on Automatic Control 23, 748–751 (1978)
DeCarlo, R.A.: Linear systems: A state variable approach with numerical implementation. Prentice-Hall, Upper Saddle River (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dantu, R., Cangussu, J.W., Turi, J. (2005). Sensitivity Analysis of an Attack Containment Model. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_11
Download citation
DOI: https://doi.org/10.1007/11427995_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)