Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Distributed Worm Simulation with a Realistic Internet Model
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
A realistic simulation of internet-scale events
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Parallel Simulation of Hybrid Network Traffic Models
Proceedings of the 21st International Workshop on Principles of Advanced and Distributed Simulation
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
DAW: A Distributed Antiworm System
IEEE Transactions on Parallel and Distributed Systems
International Journal of Wireless and Mobile Computing
Journal of Computer and System Sciences
MAISim: mobile agent malware simulator
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
An approach for the effective utilization of GP-GPUs in parallel combined simulation
Proceedings of the 40th Conference on Winter Simulation
Parallel Hybrid Network Traffic Models
Simulation
An approach for classifying internet worms based on temporal behaviors and packet flows
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
A mathematical view of network-based suppressions of worm epidemics
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Tools for worm experimentation on the DETER testbed
International Journal of Communication Networks and Distributed Systems
Implementation of an emulation environment for large scale network security experiments
ACC'11/MMACTEE'11 Proceedings of the 13th IASME/WSEAS international conference on Mathematical Methods and Computational Techniques in Electrical Engineering conference on Applied Computing
Simulating network cyber attacks using splitting techniques
Proceedings of the Winter Simulation Conference
K-core-preferred attack to the internet: is it more malicious than degree attack?
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Hi-index | 0.00 |
Large-scale worm infestations, such as last year's CodeRed, Code Red II, and Nimda, have led to increased interestin modeling these events to assess threat levels, evaluatecountermeasures and investigate possible influence on theInternet infrastructure. However, the inherently large scaleof these phenomena pose significant challenges for modelsthat include infrastructure detail. We explore the useof selective abstraction through epidemiological models inconjunction with detailed protocol models as a means toscale up simulations to a point where we can ask meaningfulquestions regarding a hypothesized link between wormsand inter-domain routing instability. We find that this approachshows significant promise, in contrast to some ofour early attempts using all-out packet level models. Wealso describe some approaches we are taking to collect theunderlying data for our models.