DOI QR코드

DOI QR Code

Propagation Modeling of Multiple Internet Worm Variants

인터넷 변종 웜의 다중 확산 모델링

  • 신원 (동명대학교 정보보호학과)
  • Received : 2015.05.11
  • Accepted : 2015.06.04
  • Published : 2015.06.30

Abstract

Fast spreading Internet worms have been one of the new major threats of the Internet, which may access sensitive information and can bring about denials of communication networks. Worm variants reveal the limitation of conventional responses against Internet worms. In order to defend and respond them, it is necessary to study how multiple worms propagate and what factors affect worm spreading. In this paper, we try to describe the correct spread of multiple worm variants based on single worm spreading. Therefore we analyze the spreading effects of polymorphic and metamorphic worms by various experiments.

최근 빠른 속도로 확산되는 인터넷 웜은 중요정보 유출, 통신망 마비 등을 일으킬 수 있는 주요한 위협이 되고 있다. 또한, 변종 웜의 등장으로 기존 인터넷 웜 대응 방식에 한계를 드러내도록 하고 있다. 이러한 변종 웜에 효과적으로 대응하기 위해서는 다중 웜의 확산 방식을 이해하는 것이 필수적이다. 본 논문은 기존의 단일 웜 확산 방식을 기반으로 다중 변종 웜 확산에 대한 정확한 모델링을 그 목표로 한다. 이를 위하여 다양한 실험을 통하여 변종 웜 확산 장식을 분석한다.

Keywords

References

  1. N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, A taxonomy of computer worms, Proceedings of the 2003 ACM workshop on Rapid malcode (2003) October 27; Washington, DC, USA.
  2. Yini Wang, Sheng Wen, Yang Xiang, and Wanlei Zhou, Modeling the Propagation of Worms in Networks: A Survey, IEEE Communications Surveys and Tutorials (2014), Volume:16, Issue:2, pp.942-960. https://doi.org/10.1109/SURV.2013.100913.00195
  3. Cliff C. Zou, Don Towsley and Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Elsevier Journal of Performance Evaluation (2006), Vol.63, No.7, pp.700-723. https://doi.org/10.1016/j.peva.2005.07.032
  4. Cliff C. Zou, Weibo Gong and Don Towsley. Code Red Worm Propagation Modeling and Analysis, Proceedings of the 9th ACM conference on Computer and communications security (2002) November 18-22; Washington, DC, USA.
  5. http://www.caida.org/publications/papers/2003/sapphire/sapphire.html, May 7 (2015)
  6. https://www.sans.org/security-resources/malwarefaq/conficker-worm.php, May 7 (2015)
  7. http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet, May 7 (2015)
  8. Sounak Paul and Bimal Kumar Mishra, Survey of Polymorphic Worm Signatures, International Journal of u- and e- Service, Science and Technology (2014), Vol.7, No.3, pp.129-150. https://doi.org/10.14257/ijunesst.2014.7.5.12
  9. William Stallings, Network Security Essentials Applications and Standards (5th Edition), Pearson Education, (2013)
  10. Weon Shin, Mobile Worm Propagation in Analysis on Heterogeneous Mobile Networks, Telecommunications Review (2013), Vol.23, No.2, pp.224-234.
  11. Akamai, The State of the Internet, 2014 Report (2014), Vol.7, No.4.