If we limit the contact rate of worm traffic, can we al-leviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are inter-ested in analyzing different deployment strategies of rate control mechanisms and the effect thereof on suppressing the spread of worm code. We use both analytical models and simulation experiments. We find that rate control at in-dividual hosts or edge routers yields a slowdown that is lin-ear in the number of hosts (or routers) with the rate lim-iting filters. Limiting contact rate at the backbone routers, however, is substantially more effective—it renders a slow-down comparable to deploying rate limiting filters at every individual host that is covered. This result...
Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
One class of worm defense techniques that received attention of late is to “rate limit ” outbound tr...
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement au...
There has been a constant barrage of worms over the internet during the recent past. Besides threate...
Network worms pose a serious threat to the Internet infrastructure as well as end-users. Various tec...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Abstract—We study the efficacy of patching and filtering countermeasures in protecting a network aga...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent w...
Internet worm attacks have become increasingly more frequent and have had a major impact on the econ...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Internet worms exploiting zero-day vulnerabilities have drawn significant attention owing to their e...
Internet security attacks have drawn significant attention due to their enormously adverse impact. T...
Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...
One class of worm defense techniques that received attention of late is to “rate limit ” outbound tr...
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement au...
There has been a constant barrage of worms over the internet during the recent past. Besides threate...
Network worms pose a serious threat to the Internet infrastructure as well as end-users. Various tec...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Abstract—We study the efficacy of patching and filtering countermeasures in protecting a network aga...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent w...
Internet worm attacks have become increasingly more frequent and have had a major impact on the econ...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
Internet worms exploiting zero-day vulnerabilities have drawn significant attention owing to their e...
Internet security attacks have drawn significant attention due to their enormously adverse impact. T...
Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish thi...