Worms vs. perimeters: the case for hard-LANs

  • Authors:
  • N. Weaver;D. Ellis;S. Staniford;V. Paxson

  • Affiliations:
  • Comput. Syst. Lab., Stanford Univ., CA, USA;Comput. Syst. Lab., Stanford Univ., CA, USA;Comput. Syst. Lab., Stanford Univ., CA, USA;Dept. of Comput. & Sci. & Eng., Ohio State Univ., Columbus, OH, USA

  • Venue:
  • HOTI '04 Proceedings of the High Performance Interconnects, 2004. on Proceedings. 12th Annual IEEE Symposium
  • Year:
  • 2004

Quantified Score

Hi-index 0.01

Visualization

Abstract

Network worms - self-propagating network programs - represent a substantial threat to our network infrastructure. Due to the propagation speed of worms, reactive defenses need to be automatic. It is important to understand where and how these defenses need to fit in the network so that they cannot be easily evaded. As there are several mechanisms malcode authors can use to bypass existing perimeter-centric defenses, this position paper argues that substantial defenses need to be embedded in the local area network, thus creating "hard-LANs" designed to detect and respond to worm infections. When compared with conventional network intrusion detection systems (NIDSs), we believe that hard-LAN devices need to have two orders of magnitude better cost/performance, and at least two orders of magnitude better accuracy, resulting in substantial design challenges.