Optimization of NACHI Spreads s1080057 Satoshi Onoda Supervised by Prof. Hiroshi Toyoizumi.

Slides:



Advertisements
Similar presentations
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Advertisements

By Hiranmayi Pai Neeraj Jain
Modeling Malware Spreading Dynamics Michele Garetto (Politecnico di Torino – Italy) Weibo Gong (University of Massachusetts – Amherst – MA) Don Towsley.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Worm Origin Identification Using Random Moonwalks Yinglian Xie, V. Sekar, D. A. Maltz, M. K. Reiter, Hui Zhang 2005 IEEE Symposium on Security and Privacy.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA The CERT Coordination Center is part of.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
PROJECT IN DISTRIBUTED SYSTEMS IPERF FOR ANDROID Developers: Shir Degani, Yuval Degani Supervisors: Prof. Roy Friedman, Alex Kogan.
The MS Blaster worm Presented by: Zhi-Wen Ouyang.
Nasca Internet Networking and Security viruses.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
The Microsoft Baseline Security Analyzer A practical look….
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Information Technology Software. SYSTEM SOFTWARE.
What’s New in Fireware v11.9.5
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
CIS 442- Chapter 3 Worms. Biological and computer worms Definition, main characteristics Differences from Viruses Bandwidth consumption and speed of propagation.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley Univ. Massachusetts, Amherst.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
CODE RED WORM PROPAGATION MODELING AND ANALYSIS Cliff Changchun Zou, Weibo Gong, Don Towsley.
Code Red Worm Propagation Modeling and Analysis Cliff Changchun Zou, Weibo Gong, Don Towsley.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore, Colleen Shannon, Geoffrey M.Voelker, Stefan Savage University of California,
Modeling Penetration of Viruses at the Gateway S Keiichi Kato Supervised by Prof.Hiroshi Toyoizumi.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
NetTech Solutions Protecting the Computer Lesson 10.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
Advanced Anti-Virus Techniques
Understand Malware LESSON Security Fundamentals.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Optimization of Blaster worms Performance Evaluation Laboratory s Tatehiro Kaiwa Supervised by Prof. Hiroshi Toyoizumi by Stochastic Modeling.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Managing Windows Security
Internet Quarantine: Requirements for Containing Self-Propagating Code
Worm Origin Identification Using Random Moonwalks
Managing Windows XP Security
Virus Attack Final Presentation
Information Security Session October 24, 2005
Chapters 5 & 6 of Web security. pp
Managing Windows XP Security
Crisis and Aftermath Morris worm.
Presentation transcript:

Optimization of NACHI Spreads s Satoshi Onoda Supervised by Prof. Hiroshi Toyoizumi

Background Worm is one of the computer virus, which spreads by itself. The worm, which kills other worms exists. These worms are effective in countermeasure against malicious worms. But, these worms may have a bad influence on the network.

Purpose To find a method finding the optimum scan rate of NACHI, which can terminate MSBLAST and control the increase of NACHI as little as possible.

MSBLAST Type:Worm Platform: Windows 2000, XP Scan IP Discover alive Computer Send Wrong Data for 2kSend Wrong Data for XP Fail to ExpectSucceed to Expect Fail Instruct to Download Succeed Instruct to Execute to XP to 2k 80%20%

NACHI Type: Worm Platform: Windows 2000, XP Defect: ICMP packets increasing on the network Kill MSBLAST Update Check whether already Patched or not Instruct to Download & Execute Scan IP Yet Already Expect Security Hole Discover alive Computer

Relation between NACHI and MSBLAST MSBLASTNACHI ar b

Model -equation- x(t) :# of the computers infected MSBLAST at time t y(t) :# of the computers infected NACHI at time t r :propagation rate of MSBLAST a :propagation rate of NACHI b :# in which NACHI kills MSBLAST per second

Experiment 1.NACHI or MSBLAST runs in one client 2.Capture packets from first infected client 3.Find scan rate

Result of Experiment Range of Scanning IPRequired Time [sec] NACHI (256*256 random IPs)1008 MSBLAST Rate [/sec]

Model -graph-

Global Maximum of BLAST t’t’ x(t ’ )

Algorithm 1. Decide the constants 2. Decide the value of max 3. Solve x(t ’ )=max for a 4. Divide a by infecting probability Obtain optimum scan rate of NACHI, s

Optimum Scan Rate for some max, s

Conclusion We obtained a method to determine the optimum scan rate of NACHI with some conditions. When we need the good worm like NACHI, we must find the optimum rate.