Internet Quarantine- Requirements for Containing Self-.ppt
《Internet Quarantine- Requirements for Containing Self-.ppt》由会员分享,可在线阅读,更多相关《Internet Quarantine- Requirements for Containing Self-.ppt(25页珍藏版)》请在麦多课文档分享上搜索。
1、Internet Quarantine: Requirements for Containing Self-Propagating Code,David Moore et. al. University of California, San Diego,Internet Quarantine: Requirements for Containing Self-Propagating Code,Aleksandar Kuzmanovic Rice University, COMP 629,Outline,Background about worm, esp. Code-Red Whats wor
2、m, esp. Code-Red Prevention, Treatment and Containment of the worm.SI epidemic model and Code Red propagation model.Simulations on Code Red Propagation and Containment System Deployment.Conclusion.,Background: what is worm?,Worm is a self-replicating software designed to spread through the network.W
3、orm vs Virus and Trojan horse Virus and Trojan horse rely on human intervention to spread. Worm is autonomous.,Background: Code-Red v1,Outbreak: June 18, 2001How it works: Buffer overflow exploit on Microsoft IIS web server. Upon infected a machine, randomly generate a list of IP addresses. Probe ea
4、ch of the addresses from the list.Payload: DDoS attack against www1.whitehouse.gov.Damage: little Fixed random seed.,Background: Code-Red v2,Outbreak: July 19, 2001How it works: Similar to Code-Red v1, but with a random seed. Generates 11 probes for second.Damage: severe 359,000 machines were infect
5、ed within 14 hours.,How to mitigate the threat of worms(1),Three approaches Prevention: Reduce the size of the vulnerable population. E.g. A single vulnerability in a popular software system can result in millions of vulnerable hosts. E.g. Code Red attacks millions of MS IIS web server.,How to mitig
6、ate the threat of worms (2),Treatment: E.g. virus scanner. The time required to design, develop and test a security flaw is usually for too slow than the spread of the worm.Containment: E.g. firewall, filters Containment is used to protect individual networks, and isolate infected hosts.,SI Model (1
7、),In this work, a vulnerable machine is described as susceptible (S) machine. A infected machine is described as infected (I). Let N be the number of vulnerable machines. Let S(t) be the number of susceptible host at time t, and s(t) be S(t)/N, where N = S(t) + I(t). Let I(t) be the number of infect
8、ed hosts at time t, and i(t) be I(t)/N. Let be the contact rate of the worm. Define:,SI Model (2),Solving the differential equation:,where T is a constant,Code Red Propagation Model (1),Code Red generates IPv4 address by random. Thus, there are totally 232 addresses. Let r be the probe rate of a Cod
9、e Red worm. Thus:,Code Red Propagation Model (2),Two problems Cannot model preferential targeting algorithm. E.g. select targets form address ranges closer to the infected host.The rate only represents average contact rate. E.g. a particular epidemic may grow significantly more quickly by making a f
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- INTERNETQUARANTINEREQUIREMENTSFORCONTAININGSELFPPT

链接地址:http://www.mydoc123.com/p-376571.html