skip to main content
10.1145/1216993.1217023acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
Article

Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs

Published:05 February 2007Publication History

ABSTRACT

In this paper, we propose a new approach for mitigation of worm propagation through tactical Mobile Ad-Hoc Networks (MANETs) which is based upon performance signatures and software rejuvenation. Three application performance signature and software rejuvenation algorithms are proposed and analyzed. These algorithms monitor critical applications' responsiveness and trigger actions for software rejuvenation when host resources degrade due to a co-resident worm competing for host resources. We analyze the effectiveness of our algorithms through analytic modeling and detailed, extensive simulation studies. The key performance metrics investigated are application response time, mean time between rejuvenations and the steady state probability of host infection. We also use simulation models to investigate several design and parameter tuning issues. We investigate the relationship between the rate at which the application performance monitors can detect out-of-specification applications and the rate of worm propagation in the network.

References

  1. A. Avritzer, A. Bondi and E. J. Weyuker, Ensuring Stable Performance for Systems that Degrade, Proc. Fifth International Workshop on Software and Performance 2005, Palma de Mallorca, Spain, July, 2005, pp. 43--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Avritzer, A. Bondi, M. Grottke, K. Trivedi and E. J. Weyuker Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms, Proc. of the International Conference on Dependable Systems and Networks 2006, Philadelphia, PA, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Avritzer, R. G. Cole, N. Phamdo and A. Terzis, The Wireless Taps Worm Mitigation Architecture for Tactical MANETS, JHU / Applied Physics Laboratory Technical Report, July, 2006.Google ScholarGoogle Scholar
  4. N. T. Bailey, The Mathematical Theory of Infectious Diseases and its Applications, Hafner Press, New York, 1975.Google ScholarGoogle Scholar
  5. L. Briesemeister and P. Porras, Microscopic Simulation of a Group Defense Strategy, ACM/IEEE Parallel and Distributed Simulation (PADS), Monterey CA, June, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. G. Cole, N. Phamdo, M. A. Rajab and A. Terzis, Requirements on Worm Mitigation Technologies in MANETS, ACM/IEEE Parallel and Distributed Simulation (PADS), Monterey CA, June, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. G. Cole, Studies of Worm Propagation in Mobile Ad-Hoc Networks for Future Combat Systems, Army Science Conference 2004, Orlando FL, December, 2004.Google ScholarGoogle Scholar
  8. M. Costa, et.al, Vigilante: End-to-End Containment of Internet Worms, SOSP'05, Brighton, United Kingdom, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. C. Frauenthal, Mathematical Modeling in Epidemiology, Springer-Verlag, New York, 1980.Google ScholarGoogle Scholar
  10. H. Kim and B. Karp, Autograph: Toward automated, distributed worm signature detection, USENIX Security Symposium August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Kreibich and J. Crowcroft, Honeycomb - creating intrusion detection signatures using honey pots, In HotNets, November 2003.Google ScholarGoogle Scholar
  12. V. Paxson, Bro. a system for detecting network intruders in real time, Computer Networks 31, 23-24, pp 2435-2463, December, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Sidiroglou and A. Keromytis, A Network Worm Vaccine Architecture, in Proceedings of the 12th IEEE WET ICE / STCA Security Workshop, June, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. K. Singh and A. Lakhotia, Analysis and detection of computer viruses and worms: An annotated bibliography, ACM SIGPLAN Notes, vol. 37, no. 2, pp 29 35, February, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Wagner and B. Plattner, Entropy Based Worm and Anomaly Detection in Fast IP Networks, in Proceedings of the 14th IEEE WET ICE / STCA Security Workshop, June, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Weaver, S. Staniford and V. Paxson, Very fast containment of scanning worms, In USENIX Security Symposium, August, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Wilander and M. Kamkar, A comparison of publicly available tools for dynamic buffer overflow prevention, NDSS, February 2003.Google ScholarGoogle Scholar
  18. M. Williamson, Throttling Viruses: Restricting propagation to defeat malicious mobile code, in the Annual Computer Security Applications Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WOSP '07: Proceedings of the 6th international workshop on Software and performance
          February 2007
          216 pages
          ISBN:1595932976
          DOI:10.1145/1216993

          Copyright © 2007 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 February 2007

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate149of241submissions,62%

          Upcoming Conference

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader