skip to main content
research-article

A model of the spread of randomly scanning Internet worms that saturate access links

Published: 28 April 2008 Publication History

Abstract

We present a simple, deterministic mathematical model for the spread of randomly scanning and bandwidth-saturating Internet worms. Such worms include Slammer and Witty, both of which spread extremely rapidly. Our model, consisting of coupled Kermack-McKendrick (a.k.a. stratified susceptibles-infectives (SI)) equations, captures both the measured scanning activity of the worm and the network limitation of its spread, that is, the effective scan-rate per worm/infective. The Internet is modeled as an ideal core network to which each peripheral (e.g., enterprise) network is connected via a single access link. It is further assumed in this note that as soon as a single end-system in the peripheral network is infected by the worm, the subsequent scanning of the rest of the Internet saturates the access link, that is, there is “instant” saturation. We fit our model to available data for the Slammer worm and demonstrate the model's ability to accurately represent Slammer's total scan-rate to the core.

References

[1]
Chen, Z., Gao, L., and Kwait, K. 2003. Modeling the spread of active worms. In Proceedings of IEEE INFOCOM (San Fransisco, CA).
[2]
Cooke, E., Bailey, M., Mao, Z., Watson, D., Jahanian, F., and McPherson, D. 2004. Toward understanding distributed blackhole placement. In Proceedings of ACM WORM (Washington, DC).
[3]
Daley, D. and Gani, J. 1999. Epidemic Modeling, an Introduction. Cambridge University Press, Cambridge, U.K.
[4]
Kesidis, G., Hamadeh, I., and Jiwasurat, S. 2005. Coupled Kermack-McKendrick models for randomly scanning and bandwidth saturating Internet worms. In Proceedings of QoS-IP. Springer-Verlag, Berlin, Germany.
[5]
Kurtz, T. 1981. Approximation of population processes. In Proceedings of the CBMS-NSF Regional Conference Series in Applied Mathematics. Vol. 36.
[6]
Li, L., Jiwasurat, S., Hamadeh, I., Kesidis, G., Neumann, C., and Liu, P. 2006. Emulating sequential scanning worms on the DETER testbed. In Proceedings of IEEE/Create-Net TridentCom. (Barcelona, Spain).
[7]
Liljenstam, M., Nicol, D., Berk, V., and Gray, R. 2003. Simulating realistic network worm traffic for worm warning system design and testing. In Proceedings of ACM WORM (Washington, DC).
[8]
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., and Weaver, N. 2003a. Inside the Slammer worm. IEEE Sec. Priv. 1, 4, 33--39.
[9]
Moore, D., Shannon, C., Voelker, G. M., and Savage, S. 2003b. Internet quarantine: Requirements for containing self-propagating code. In Proceedings of IEEE INFOCOM. (San Francisco, CA).
[10]
Staniford, S., Paxson, V., and Weaver, N. 2002. How to own the Internet in your spare time. In Proceedings of USENIX Security Symposium. 149--167.
[11]
Weaver, N., Hamadeh, I., Kesidis, G., and Paxson, V. 2004a. Preliminary results using scale-down to explore worm dynamics. In Proceedings of ACM WORM (Washington, DC).
[12]
Weaver, N., Staniford, S., and Paxson, V. 2004b. Very fast containment of scanning worms. In Proceedings of the 13th USENIX Security Symposium.
[13]
Zou, C., Gong, W., and Towsley, D. 2002. Code Red worm propagation modeling and analysis. In Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS'02, Washington, DC).
[14]
Zou, C., Gong, W., and Towsley, D. 2003. Worm propagation modeling and analysis under dynamic quarantine defense. In Proceedings of the ACM CCS Workshop on Rapid Malcode (WORM'03, Washington, DC).

Cited By

View all
  • (2021)Smart Trash Bin Model Design and Future for Smart CityApplied Sciences10.3390/app1111481011:11(4810)Online publication date: 24-May-2021
  • (2019)Reefer container monitoring system using PLC-based communication technology for maritime edge computingThe Journal of Supercomputing10.1007/s11227-019-02864-z76:7(5221-5243)Online publication date: 27-Apr-2019
  • (2018)Malware Propagations in Wireless Ad Hoc NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2016.264219115:6(1016-1026)Online publication date: 1-Nov-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Modeling and Computer Simulation
ACM Transactions on Modeling and Computer Simulation  Volume 18, Issue 2
April 2008
97 pages
ISSN:1049-3301
EISSN:1558-1195
DOI:10.1145/1346325
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 April 2008
Accepted: 01 April 2006
Revised: 01 October 2005
Received: 01 December 2004
Published in TOMACS Volume 18, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet worms
  2. communications/computer networking
  3. epidemiology
  4. modeling

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Smart Trash Bin Model Design and Future for Smart CityApplied Sciences10.3390/app1111481011:11(4810)Online publication date: 24-May-2021
  • (2019)Reefer container monitoring system using PLC-based communication technology for maritime edge computingThe Journal of Supercomputing10.1007/s11227-019-02864-z76:7(5221-5243)Online publication date: 27-Apr-2019
  • (2018)Malware Propagations in Wireless Ad Hoc NetworksIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2016.264219115:6(1016-1026)Online publication date: 1-Nov-2018
  • (2013)A Survey on Biologically Inspired Algorithms for Computer NetworkingIEEE Communications Surveys & Tutorials10.1109/SURV.2013.010413.0017515:3(1160-1191)Online publication date: Nov-2014
  • (2013)Toward early warning against Internet worms based on critical-sized networksSecurity and Communication Networks10.1002/sec.5346:1(78-88)Online publication date: 1-Jan-2013
  • (2010)An Introduction to Models of Online Peer-to-Peer Social NetworkingSynthesis Lectures on Communication Networks10.2200/S00313ED1V01Y201011CNT0083:1(1-125)Online publication date: Jan-2010
  • (2010)On the Privacy of Peer-Assisted Distribution of Security Patches2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)10.1109/P2P.2010.5569988(1-10)Online publication date: Aug-2010
  • (2010)Understanding Peer Exchange in BitTorrent Systems2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)10.1109/P2P.2010.5569967(1-8)Online publication date: Aug-2010
  • (2010)A survey on bio-inspired networkingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.10.02454:6(881-900)Online publication date: 1-Apr-2010
  • (2010)A taxonomy of biologically inspired research in computer networkingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2009.08.02254:6(901-916)Online publication date: 1-Apr-2010
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media