Internet quarantine: requirements for containing self-propagating code
- 1 March 2004
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 3 (0743166X) , 1901-1910
- https://doi.org/10.1109/infcom.2003.1209212
Abstract
It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such "worm" outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period - incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, there is considerable effort focused on developing technical means for detecting and containing worm infections before they can cause such damage. This paper does not propose a particular technology to address this problem, but instead focuses on a more basic question: How well will any such approach contain a worm epidemic on the Internet? We describe the design space of worm containment systems using three key parameters - reaction time, containment strategy and deployment scenario. Using a combination of analytic modeling and simulation, we describe how each of these design factors impacts the dynamics of a worm epidemic and, conversely, the minimum engineering requirements necessary to contain the spread of a given worm. While our analysis cannot provide definitive guidance for engineering defenses against all future threats, we demonstrate the lower bounds that any such system must exceed to be useful today. Unfortunately, our results suggest that there are significant technological and administrative gaps to be bridged before an effective defense can be provided in today's Internet.Keywords
This publication has 12 references indexed in Scilit:
- Inferring Internet denial-of-service activityACM Transactions on Computer Systems, 2006
- Throttling viruses: restricting propagation to defeat malicious mobile codePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Directed-graph epidemiological models of computer virusesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- On computer viral infection and the effect of immunizationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Computer viruses: Theory and experimentsPublished by Elsevier ,2002
- Code-RedPublished by Association for Computing Machinery (ACM) ,2002
- The Mathematics of Infectious DiseasesSIAM Review, 2000
- Crisis and aftermathCommunications of the ACM, 1989
- With microscope and tweezers: the worm from MIT's perspectiveCommunications of the ACM, 1989
- The “worm” programs—early experience with a distributed computationCommunications of the ACM, 1982