Skip to main content

Hybrid Modeling for Large-Scale Worm Propagation Simulations

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3975))

Abstract

Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. As results, Internet and web services become core infrastructure for a company or an institute. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. It is difficult to find and close all security flaws in a computer system that is connected to a network. Internet worms take advantages of these security flaws, and attack a large number of hosts with self-propagating techniques. To study and analyze internet worms, one of the most feasible ways is to use simulations. It is quite challenging to simulate very large-scale worm attacks. In this paper, we propose a hybrid model for large-scale worm propagation simulations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lala, C., Panda, B.: Evaluating damage from cyber attacks: A model and analysis. IEEE Transactions on Systems, Man and Cybernetics 31, 300–310 (2001)

    Article  Google Scholar 

  2. Center, C.C.: CERT advisories (2004), http://www.cert.org/advisories/

  3. Liljenstam, M., Nicol, D.M., Berk, V.H., Gray, R.S.: Simulating realistic network worm traffic for worm warning system design and testing. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 24–33. ACM Press, New York (2003)

    Chapter  Google Scholar 

  4. Yun, J.B., Park, E.K., Im, E.-G., In, H.P.: A scalable, ordered scenario-based network security simulator. In: Baik, D.-K. (ed.) AsiaSim 2004. LNCS (LNAI), vol. 3398, pp. 487–494. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Gu, Y., Liu, Y., Towsley, D.: On integrating fluid models with packet simulation. In: Proceedings of the IEEE INFOCOM (2004)

    Google Scholar 

  6. Mostow, J.R., Roberts, J.D., Bott, J.: Integration of an internet attack simulator in an HLA environment. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  7. Welch, D., Greg Conti, J.M.: A framework for an information warfare simulation. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)

    Google Scholar 

  8. Breslau, L., Estrin, D., Fall, K., Floyd, S., Heidemann, J., Helmy, A., Huang, P., McCanne, S., Varadhan, K., Xu, Y., Yu, H.: Advances in network simulation. IEEE Computer, Expanded version available as USC TR 99-702b 33, 59–67 (2000)

    Google Scholar 

  9. Technology, O.: Opnet modeler (2001)

    Google Scholar 

  10. SSFnet. SSF Research Network (2004), http://www.ssfnet.org/

  11. Kim, H., Hou, J.C.: Network calculus based simulation for tcp congestion control: Theorems, implementation and evaluation. In: Proceedings of the IEEE INFOCOM, pp. 2844–2855 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Im, E.G., Seo, J.T., Kim, DS., Song, Y.H., Park, Y. (2006). Hybrid Modeling for Large-Scale Worm Propagation Simulations. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_59

Download citation

  • DOI: https://doi.org/10.1007/11760146_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34478-0

  • Online ISBN: 978-3-540-34479-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics