1,085 research outputs found
On the Design of an Immersive Environment for Security-Related Studies
The Internet has become an essential part of normal operations of both public and private sectors. Many security issues are not addressed in the original Internet design, and security now has become a large concern for networking research and study. There is an imperative need to have an simulation environment that can be used to help study security-related research problems. In the thesis we present our effort to build such an environment: Real-time Immersive Network Simulation Environment (RINSE). RINSE features flexible configuration of models using various networking protocols and real-time user interaction. We also present the Estimate Next Infection (ENI) model we developed for Internet scanning worms using RINSE, and the effort of combining multiple resolutions in worm modeling
Distributed interaction between computer virus and patch: A modeling study
The decentralized patch distribution mechanism holds significant promise as
an alternative to its centralized counterpart. For the purpose of accurately
evaluating the performance of the decentralized patch distribution mechanism
and based on the exact SIPS model that accurately captures the average dynamics
of the interaction between viruses and patches, a new virus-patch interacting
model, which is known as the generic SIPS model, is proposed. This model
subsumes the linear SIPS model. The dynamics of the generic SIPS model is
studied comprehensively. In particular, a set of criteria for the final
extinction or/and long-term survival of viruses or/and patches are presented.
Some conditions for the linear SIPS model to accurately capture the average
dynamics of the virus-patch interaction are empirically found. As a
consequence, the linear SIPS model can be adopted as a standard model for
assessing the performance of the distributed patch distribution mechanism,
provided the proper conditions are satisfied
Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting
From the security point of view malware evolution forecasting is very important, since it provides an opportunity to predict malware epidemic outbreaks, develop effective countermeasure techniques and evaluate information security level. Genetic algorithm approach for mobile malware evolution forecasting already proved its effectiveness. There exists a number of simulation tools based on the Genetic algorithms, that could be used for malware forecasting, but their main disadvantages from the userâs point of view is that they are too complicated and can not fully represent the security entity parameter set. In this article we describe the specialized evolution forecasting simulation tool developed for security entities, such as different types of malware, which is capable of providing intuitive graphical interface for users and ensure high calculation performance. Tool applicability for the evolution forecasting tasks is proved by providing mobile malware evolution forecasting results and comparing them with the results we obtained in 2010 by means of MATLAB
Modeling, analysis and defense strategies against Internet attacks.
Third, we have analyzed the tradeoff between delay caused by filtering of worms at routers, and the delay due to worms' excessive amount of network traffic. We have used the optimal control problem, to determine the appropriate tradeoffs between these two delays for a given rate of a worm spreading. Using our technique we can minimize the overall network delay by finding the number of routers that should perform filtering and the time at which they should start the filtering process.Many early Internet protocols were designed without a fundamentally secure infrastructure and hence vulnerable to attacks such as denial of service (DoS) attacks and worms. DoS attacks attempt to consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Network forensics is an emerging area wherein the source or the cause of the attacker is determined using IDS tools. The problem of finding the source(s) of attack(s) is called the "trace back problem". Lately, Internet worms have become a major problem for the security of computer networks, causing considerable amount of resources and time to be spent recovering from the disruption of systems. In addition to breaking down victims, these worms create large amounts of unnecessary network data traffic that results in network congestion, thereby affecting the entire network.In this dissertation, first we solve the trace back problem more efficiently in terms of the number of routers needed to complete the track back. We provide an efficient algorithm to decompose a network into connected components and construct a terminal network. We show that for a terminal network with n routers, the trace back can be completed in O(log n) steps.Second, we apply two classical epidemic SIS and SIR models to study the spread of Internet Worm. The analytical models that we provide are useful in determining the rate of spread and time required to infect a majority of the nodes in the network. Our simulation results on large Internet like topologies show that in a fairly small amount of time, 80% of the network nodes is infected
Agentâbased modeling of malware dynamics in heterogeneous environments
The increasing convergence of powerâlaw networks such as social networking and peerâtoâpeer applications, webâdelivered applications, and mobile platforms makes today's users highly vulnerable to entirely new generations of malware that exploit vulnerabilities in web applications and mobile platforms for new infections, while using the powerâlaw connectivity for finding new victims. The traditional epidemic models based on assumptions of homogeneity, averageâdegree distributions, and perfectâmixing are inadequate to model this type of malware propagation. In this paper, we study four aspects crucial to modeling malware propagation: applicationâlevel interactions among users of such networks , local network structure , user mobility , and network coordination of malware such as botnets . Since closedâform solutions of malware propagation considering these aspects are difficult to obtain, we describe an openâsource, flexible agentâbased emulation framework that can be used by malware researchers for studying today's complex malware. The framework, called AgentâBased Malware Modeling (AMM), allows different applications, network structure, network coordination, and user mobility in either a geographic or a logical domain to study various infection and propagation scenarios. In addition to traditional worms and viruses, the framework also allows modeling network coordination of malware such as botnets. The majority of the parameters used in the framework can be derived from realâlife network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios. As representative examples, we examine two wellâknown malware spreading mechanisms: (i) a malicious virus such as Cabir spreading among the subscribers of a cellular network using Bluetooth and (ii) a hybrid worm that exploit email and fileâsharing to infect users of a social network. In both cases, we identify the parameters most important to the spread of the epidemic based upon our extensive simulation results. Copyright © 2011 John Wiley & Sons, Ltd. This paper presents a novel agentâbased framework for realistic modeling of malware propagation in heterogeneous networks, applications and platforms. The majority of the parameters used in the framework can be derived from realâlife network traces collected from a network, and therefore, represent realistic malware propagation and infection scenarios for the given network. Two wellâknown malware spreading mechanisms in traditional as well as mobile environments were studied using extensive simulations within the framework and the most important spreading parameters were identified.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/101832/1/sec298.pd
- âŠ