Abstract
The advantage of collaborative containment over independent block or address blacklisting on worm defense has been advocated in previous worm studies. In this work, we will evaluate two collaborative worm containment proposals and present some of the results of our DETER emulation experiments. In the first one, proactive worm containment (PWC), security agents block all suspicious hosts on the network on receiving alerts of a worm and run “relaxation analysis” on those blocked hosts afterwards. Emulation experiments will evaluate PWC's ability to stop the propagation of fast local worms and to reduce scan traffic of fast global scanning worms. The second proposal, which detects and contains a scanning worm based on the concept of dark port, focuses on stealthy worms that target only specific local networks or enterprise networks. Emulation experiments run on the DETER testbed demonstrate the efficiency of local scanning worms and their elevated threat to enterprise networks. The effectiveness of a collaborative containment strategy based on dark port detection is evaluated using DETER emulation and compared with that of individual address blacklisting.
Original language | English (US) |
---|---|
State | Published - 2007 |
Event | DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER 2007, co-located with the 16th USENIX Security Symposium - Boston, United States Duration: Aug 6 2007 → Aug 7 2007 |
Conference
Conference | DETER Community Workshop on Cyber Security Experimentation and Test 2007, DETER 2007, co-located with the 16th USENIX Security Symposium |
---|---|
Country/Territory | United States |
City | Boston |
Period | 8/6/07 → 8/7/07 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Safety, Risk, Reliability and Quality