skip to main content
10.1145/948109.948136acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Monitoring and early warning for internet worms

Published:27 October 2003Publication History

ABSTRACT

After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulnerable computers before people can take effective countermeasures. The fast spreading nature of worms calls for a worm monitoring and early warning system. In this paper, we propose effective algorithms for early detection of the presence of a worm and the corresponding monitoring system. Based on epidemic model and observation data from the monitoring system, by using the idea of "detecting the trend, not the rate" of monitored illegitimated scan traffic, we propose to use a Kalman filter to detect a worm's propagation at its early stage in real-time. In addition, we can effectively predict the overall vulnerable population size, and correct the bias in the observed number of infected hosts. Our simulation experiments for Code Red and SQL Slammer show that with observation data from a small fraction of IP addresses, we can detect the presence of a worm when it infects only 1% to 2% of the vulnerable computers on the Internet.

References

  1. B.D.O. Anderson and J. Moore. Optimal Filtering. Prentice Hall, 1979.Google ScholarGoogle Scholar
  2. V.H. Berk, R.S. Gray, and G. Bakos. Using sensor networks and data fusion for early detection of active worms. In Proc. of the SPIE AeroSense, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  3. Cooperative Association for Internet Data Analysis. http://www.caida.orgGoogle ScholarGoogle Scholar
  4. CERT Coordination Center. http://www.cert.orgGoogle ScholarGoogle Scholar
  5. Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms, In IEEE INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. CNN News. Computer worm grounds flights, blocks ATMs. http://europe.cnn.com/2003/TECH/internet/01/25/internet.attack/Google ScholarGoogle Scholar
  7. eEye Digital Security. .ida "Code Red" Worm. 2001. http://www.eeye.com/html/Research/Advisories/AL20010717.htmlGoogle ScholarGoogle Scholar
  8. USA Today News. The cost of Code Red: $1.2 billion. http://www.usatoday.com/tech/news/2001-08-01-code-red-costs.htmGoogle ScholarGoogle Scholar
  9. CounterMalice: military-grade worm containment. http://www.silicondefense.com/products/countermalice/Google ScholarGoogle Scholar
  10. D.J. Daley and J. Gani. Epidemic Modelling: An Introduction. Cambridge University Press, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  11. Dave Goldsmith. Possible CodeRed Connection Attempts. Incidients maillist. http://lists.jammed.com/incidents/2001/07/0149.htmlGoogle ScholarGoogle Scholar
  12. Honeynet Project. Know Your Enemy: Honeynets. http://project.honeynet.org/papers/honeynet/Google ScholarGoogle Scholar
  13. J. O. Kephart and S. R. White. Directed-graph Epidemiological Models of Computer Viruses. In Proc. of IEEE Symposimum on Security and Privacy, pages 343--359, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. O. Kephart, D. M. Chess, and S. R. White. Computers and Epidemiology. In IEEE Spectrum, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. O. Kephart and S. R. White. Measuring and Modeling Computer Virus Prevalence. In Proc. of IEEE Symposimum on Security and Privacy, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Internet Storm Center. http://isc.incidents.org/Google ScholarGoogle Scholar
  17. D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet Worm. In Proc. ACM/USENIX Internet Measurement Workshop, France, November, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In IEEE INFOCOM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  19. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4):33--39, July 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Moore. Network Telescopes: Observing Small or Distant Security Events. In USENIX Security, 2002.Google ScholarGoogle Scholar
  21. D. Seeley. A tour of the worm. In Proc. of the Winter Usenix Conference, San Diego, CA, 1989.Google ScholarGoogle Scholar
  22. CAIDA. Dynamic Graphs of the Nimda worm. http://www.caida.org/dynamic/analysis/security/nimda/Google ScholarGoogle Scholar
  23. SANS Institute. http://www.sans.orgGoogle ScholarGoogle Scholar
  24. S. Staniford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In 11th Usenix Security Symposium, San Francisco, August, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Symantec Early Warning Solutions. Symantec Corp. http://enterprisesecurity.symantec.com/SecurityServices/content.cfm?ArticleID=1522Google ScholarGoogle Scholar
  26. V. Yegneswaran, P. Barford, and J. Ullrich. Internet Intrusions: Global Characteristics and Prevalence. In ACM SIGMETRICS, June, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C.C. Zou, W. Gong, and D. Towsley. Code Red Worm Propagation Modeling and Analysis. In 9th ACM Symposium on Computer and Communication Security, pages 138-147, Washington DC, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Monitoring and early warning for internet worms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
        October 2003
        374 pages
        ISBN:1581137389
        DOI:10.1145/948109

        Copyright © 2003 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2003

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader