DocumentCode
2028702
Title
A propagation model of a vulnerability mitigation computer worm - seawave
Author
Al-Salloum, Ziyad S. ; Wolthusen, Stephen D.
Author_Institution
Inf. Security Group, R. Holloway, Univ. of London, London, UK
fYear
2011
fDate
6-8 Sept. 2011
Firstpage
347
Lastpage
352
Abstract
In this paper, we propose and analyze an analytical propagation model of a vulnerability mitigation worm (Seawave). The model takes into consideration the topology structure of enterprise networks such as switches, LANs, and backbone, proposing the first computer worm that use layer two of the OSI model as its main propagation medium. The model also addresses the worm´s communication delays due to CAM table reading (α), neighbor switch communication (β), and backbone mapping (ε). We also propose a bandwidth model to measure the traffic generated within different stages of worm propagation. Different simulations of different hierarchical topologies of enterprise networks have been driven to further evaluate and observe the defensive worm´s performance in large scale networks.
Keywords
computer network security; invasive software; local area networks; telecommunication network topology; CAM table reading; backbone mapping; backbone network; bandwidth model; enterprise network; large scale network; local area network; neighbor switch communication; seawave worm; switch network; vulnerability mitigation computer worm; worm communication delay; worm propagation model; Bandwidth; Computational modeling; Delay; Grippers; Network topology; Switches; Topology;
fLanguage
English
Publisher
ieee
Conference_Titel
Network and System Security (NSS), 2011 5th International Conference on
Conference_Location
Milan
Print_ISBN
978-1-4577-0458-1
Type
conf
DOI
10.1109/ICNSS.2011.6060028
Filename
6060028
Link To Document