Abstract
How to detect and contain worms is an open issue as worm becomes a major threat to network security nowadays. Based on the help between neighbors in social network, this paper presents a model to mitigate the rapid spread of worms, and describes its dynamic equation. Since the performance of our model depends on the trust between neighbors, a method to calculate the trust is given in this paper. TPM can protect the authenticity of trust between neighbors, and thus decrease the worm propagation. Experimental results demonstrate that this model can greatly suppress the propagation of worms.
Supported by the National Natural Science Foundations of China under Grant No.60673071 and No.60633020, and by Hi-Tech Research and Development Foundations of China under Grant No.2006AA01Z442, and by Hubei Natural Science Foundations of China under Grant No.2005AA101C44.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nachenberg, C.: From AntiVirus to AntiWorm: A New Strategy for A New Threat Landscape[R]. In: Proceedings of ACM Workshop on Rapid Malcode WORM 2004, USA (2004)
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for Internet worms. Technical Report, TR-CSE-03-01, Electrical and Computer Engineering Department, University of Massachusetts (2003)
Singh, S., et al.: Automated Worm Fingerprinting. In: Proceedings of Usenix Symp. Operating System Design and Implementation, Usenix Assoc. pp. 45–60 (2004)
Kim, H.A., Karp, B.: Autograph: Toward Automated Distributed Worm Signature Detection. In: Proceedings of Usenix Security Symp., Usenix Assoc. pp. 271–286 (2004)
Cai, M., Hwang, K., et al.: Fast Internet Worm Containment. IEEE Security and Privacy (2005)
Zou, C.C., et al.: Monitoring and Early Warning for Internet Worms. In: Proceedings of 10th ACM Conf. Computer and Comm. Security CCS 2003, pp. 190–199. ACM Press, New York (2003)
Wang, H.J., et al.: Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In: Proceedings of ACM SIGCOMM, ACM Press, New York (2004)
Sandhu, R., Xinwen, Z.: Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: Proceedings of SACMAT 2005, Stockholm, Sweden (2005)
Whyte, D., Kranakis, E., van Oorschot, P.: DNS based detection of scanning worms in an enterprise network. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium (2005)
Feng, Y., Haixin, D., Xing, L.: Modeling and analyzing interaction between worm and antiworm in network worm spread. SCIENCE IN CHINA SERIES E 34(8), 841–856 (2004)
Lidong, Z., Lintao, Z., Frank, M., Nicole, I., Manuel, C., Steve, C.: A first look at Peer-to-Peer Worms: Threats and Defense. In: Proceedings of the Peer-to-Peer Systems 4th International Workshop. Ithaca, NY, USA, pp. 24–35 (2005)
Jianming, F., Zhiyi, H., Binglan, C., Jingsong, C.: Containing Worm Based on Immune-group in Scale-free P2P. In: Proceedings of the First International Conference on Complex Systems and Applications, Huhhot, China, pp. 945–949 (2006)
Pastor Satorras, R., Vespignani, A.: Immunization of complex networks. Phys. Rev. E (2002)
Reuven, C., Shlomo, H., Danie, B.A.: Efficient Immunization Strategies for Computer Networks and Populations. Phys. Rev. Lett. (2003)
Weaver, N., Staniford, S., Paxson, V.: Very Fast Containment of Scanning Worms, In: Proceedings of 13th Usenix Security Symp., Usenix Assoc. pp. 29–44 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, J., Chen, B., Zhang, H. (2007). A Worm Containment Model Based on Neighbor-Alarm. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_46
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_46
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)