Title :
Evaluation of worm containment algorithms and their effect on legitimate traffic
Author :
Abdelhafez, Mohamed ; Riley, George F.
Author_Institution :
Dept. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA, USA
Abstract :
Internet worm attacks have become increasingly more frequent and have had a major impact on the economy, making the detection and prevention of these attacks a top security concern. Several counter-measures have been proposed and evaluated in recent literature. However, the effect of these proposed defensive mechanisms on legitimate competing traffic has not been analyzed. Clearly a defensive approach that slows down or stops worm propagation at the expense of completely restricting any legitimate traffic is of little value. Here we perform a comparative analysis of the effectiveness of several of these proposed mechanisms, including a measure of their effect on normal Web browsing activities. In addition, we introduce a new defensive approach that can easily be implemented on existing hosts, and which significantly reduces the rate of spread of worms using TCP connections to perform the infiltration. Our approach has no measurable effect on legitimate traffic.
Keywords :
Internet; information retrieval; invasive software; Internet worm attacks; TCP connections; Web browsing; attack countermeasures; comparative analysis; legitimate traffic; security; worm attack detection; worm attack prevention; worm containment algorithms; worm propagation; Computer security; Computer worms; Conferences; Contracts; Humans; Internet; Optimization methods; Performance analysis; Performance evaluation; Probes;
Conference_Titel :
Information Assurance, 2005. Proceedings. Third IEEE International Workshop on
Print_ISBN :
0-7695-2317-X
DOI :
10.1109/IWIA.2005.8