Propagation modeling and analysis of network worm attack

  • Authors:
  • Ossama A. Toutonji;Seong-Moo Yoo;Moongyu Park

  • Affiliations:
  • University of Alabama in Huntsville, Huntsville, AL;University of Alabama in Huntsville, Huntsville, AL;University of Alabama in Huntsville, Huntsville, AL

  • Venue:
  • Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. This paper proposes a computer worm model considering countermeasures and analyzes the stability of the model. The proposed VEISV (vulnerable, exposed, infected, secured, and vulnerable) multi-malware worm model is appropriate for realistic up-to-date security countermeasure implementation, and the model takes into consideration the accurate positions for hosts' replacements and hosts out-of-service in state transactions. Furthermore, initial simulation results show the positive impact of increasing security measures on a worm propagation wave. Additionally, confirmation of stability points is under development by using phase plot.