Overcoming Limitations in Computer Worm Models

In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited...

Full description

Bibliographic Details
Main Author: Posluszny III, Frank S
Other Authors: Michael A. Gennert, Department Head
Format: Others
Published: Digital WPI 2005
Subjects:
Online Access:https://digitalcommons.wpi.edu/etd-theses/151
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1150&context=etd-theses
id ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-1150
record_format oai_dc
spelling ndltd-wpi.edu-oai-digitalcommons.wpi.edu-etd-theses-11502019-03-22T05:49:40Z Overcoming Limitations in Computer Worm Models Posluszny III, Frank S In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited by the Slammer and Code Red worms. In response to such a threat, the academic community has started a set of research projects seeking to understand worm behavior through creation of highly theoretical and generalized models. Staniford et. al. created a model to explain the propagation behaviors of such worms in computer network environments. Their model makes use of the Kermack-McKendrick biological model of propagation as applied to digital systems. Liljenstam et. al. add a spatial perspective to this model, varying the infection rate by the scanning worms' source and destination groups. These models have been shown to describe generic Internet-scale behavior. However, they are lacking from a localized (campus-scale) network perspective. We make the claim that certain real-world constraints, such as bandwidth and heterogeneity of hosts, affect the propagation of worms and thus should not be ignored when creating models for analysis. In setting up a testing environment for this hypothesis, we have identified areas that need further work in the computer worm research community. These include availability of real-world data, a generalized and behaviorally complete worm model, and packet-based simulations. The major contributions of this thesis involve a parameterized, algorithmic worm model, an openly available worm simulation package (based on SSFNet and SSF.App.Worm), analysis of test results showing justification to our claim, and suggested future directions. 2005-01-31T08:00:00Z text application/pdf https://digitalcommons.wpi.edu/etd-theses/151 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1150&context=etd-theses Masters Theses (All Theses, All Years) Digital WPI Michael A. Gennert, Department Head Micha Hofri, Reader Fernando C. Colon Osorio, Advisor computer virus network simulation worm propagation worm simulation computer worm Computer viruses
collection NDLTD
format Others
sources NDLTD
topic computer virus
network simulation
worm propagation
worm simulation
computer worm
Computer viruses
spellingShingle computer virus
network simulation
worm propagation
worm simulation
computer worm
Computer viruses
Posluszny III, Frank S
Overcoming Limitations in Computer Worm Models
description In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited by the Slammer and Code Red worms. In response to such a threat, the academic community has started a set of research projects seeking to understand worm behavior through creation of highly theoretical and generalized models. Staniford et. al. created a model to explain the propagation behaviors of such worms in computer network environments. Their model makes use of the Kermack-McKendrick biological model of propagation as applied to digital systems. Liljenstam et. al. add a spatial perspective to this model, varying the infection rate by the scanning worms' source and destination groups. These models have been shown to describe generic Internet-scale behavior. However, they are lacking from a localized (campus-scale) network perspective. We make the claim that certain real-world constraints, such as bandwidth and heterogeneity of hosts, affect the propagation of worms and thus should not be ignored when creating models for analysis. In setting up a testing environment for this hypothesis, we have identified areas that need further work in the computer worm research community. These include availability of real-world data, a generalized and behaviorally complete worm model, and packet-based simulations. The major contributions of this thesis involve a parameterized, algorithmic worm model, an openly available worm simulation package (based on SSFNet and SSF.App.Worm), analysis of test results showing justification to our claim, and suggested future directions.
author2 Michael A. Gennert, Department Head
author_facet Michael A. Gennert, Department Head
Posluszny III, Frank S
author Posluszny III, Frank S
author_sort Posluszny III, Frank S
title Overcoming Limitations in Computer Worm Models
title_short Overcoming Limitations in Computer Worm Models
title_full Overcoming Limitations in Computer Worm Models
title_fullStr Overcoming Limitations in Computer Worm Models
title_full_unstemmed Overcoming Limitations in Computer Worm Models
title_sort overcoming limitations in computer worm models
publisher Digital WPI
publishDate 2005
url https://digitalcommons.wpi.edu/etd-theses/151
https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1150&context=etd-theses
work_keys_str_mv AT poslusznyiiifranks overcominglimitationsincomputerwormmodels
_version_ 1719006183157661696