Академический Документы
Профессиональный Документы
Культура Документы
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 12
Abstract— Network Worms are one of the most important and common Malware at Internet and Network that their spreading
velocity are very high considering to lack of direct interference of human. Automatic spreading fact causes to make Infected
most networks and computers by worms in a very short time and as a result the negative and unsuitable effect of the worm in
entire network will clear in a short time and cause to major damages to the entire network. Object of presenting this article is in-
troduction of a vaccine that may be injected in entire network and because of it in entire computers of the network and with con-
sideration to type of its operation that is the same renovation of vulnerable holes of machines, has made the network safe and
through preventing the worms spreading, it will make the network safe against these type of Malware. In order to study on effect
of worm vaccine injection on network, a network that was connected with some vulnerable nodes to internet, was simulated that
the gained results showed high decrease of the numbers of the Infected nodes.
—————————— ——————————
1 INTRODUCTION
network and decreases the Infected nodes. vaccine has been able to have a suitable operation in the
If the simulation time will increase and more time will network and secure the worms spreading therein. Only a
take to injection the vaccine, it will have its effect in entire very basic point is that the patches must be produced at
network and the network will be removed from these the shortest possible time and putting into operation
type of worms, entirely and the network will be secure them in preventing the worm spreading. The next subject
against them. may introduce submission of some methods in order to
production and putting into operation the patches on
5 DISCUSSION time that may be a fact for an intelligent super vaccine.
Following the description of our architecture, there are
several other issues that need to be discussed. REFERENCES
The biggest challenge may be that this vaccine, like
[1] Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and
having a model release is a network worm and a worm
Salvatore J. Stolfo. "An Email Worm Vaccine Architecture" , To
network itself be known. Because it Will be published
appear in the Proceedings of the 1st Information Security Prac-
into the compute without the user taking action to activi-
tice and Experience Conference (ISPEC) April 2005, Singapore
ty. To solve this problem, the vaccine can do all their
[2] Jiang Wu, Sarma Vangala, Lixin GaO, AND Kevin Kwiat. An
deeds ask permission from user.
E®ective Architecture and Algorithm for Detecting Worms
Another challenge of this vaccine is to increase traffic
with Various Scan Techniques.
on the network. Because the vaccine injection at any mo-
[3] THE RACE AGAINST MALICIOUS SOFTARE. SE 4C03 Winter
ment in the entire network request to patch different
2005 Last Revised: April 2, 2005.
websites that offer this patch them.
[4] http://www.cert.org/stats/vulnerability_remediation.html
This weakness can be covered with only one time to
[5] Zesheng Chen and Chuanyi Ji. Intelligent Worms: Searching for
download the patch and put it on a central server and can
Preys.
be programmed to receive all the Requested patches from
[6] Jose Nazario, Defense and Detection Strategies against Internet
the server. In addition, vaccines can be planned and or-
Worms.2005
ganized so that low-traffic time to do all their deeds.
[7] ESHARENANA E. ADOMI, SECURITY AND SOFTWARE FOR CYBER-
Next topic, which should get time to check to make
CAFES, IGI GLOBAL SNIPPET, 2008.
patches to fix vulnerable holes of operating systems and
[8] Pankaj Kohli. Worms - survey and propagation. MS by Re-
software. For increased performance and positive vaccine
search - Computer Science and Engineering International Insti-
to prevent the exploitation of the hole to make vulnerable
tute of Information Technology Hyderabad, India.
by network worms, patches must be produced by manu-
[9] The VINT Project A Collaboration between researchers at UC
facturers in the shortest possible time operating systems
Berkeley, LBL, USC/ISI, and Xerox PARC. The ns Ma-
and software and are utilized for repairing holes to make
nual(formerly ns Notes and Documentation).January 6, 2009
vulnerable.
[10] The Government of the Hong Kong Special Administrative
Vaccine may be considered an antivirus or anti mal-
Region. PATCH MANAGEMENT .February 2008
ware. But until that is installed antivirus or anti malware
[11] Windows XP Service Pack 2.” (no date given), Microsoft Web-
can to deal with malware, and if being disabled antivirus
site. Retrieved March 27, 2005 from the World Wide Web:
or anti malware, malware without the slightest factor
http://www.microsoft.com/windowsxp/sp2/default.mspx.
could come into publishing networks. But once the vac-
[12] Pankaj Kohli. Worms - survey and propagation.MS by Research
cine being injected with the network to make and repair
- Computer Science and Engineering International Institute of
patches, even after being inactive can help prevent getting
Information Technology Hyderabad, India.
into that kind of worms to use for publication by the se-
[13] Craig Smith, Ashraf Matrawy,Stanley Chow and Bassem Abde-
curity holes and weaknesses operating system and soft-
laziz. Computer Worms: Architectures, Evasion Strategies, and
ware.
Detection Mechanisms. Journal of Information Assurance and
Security 4 (2009) 69-83.
6 CONCLUSION [14] J. Shoch and J. Hupp. The “worm” programs – early experi-
We have presented and introduced a vaccine in this ar- ments with a distributed computation. Communications of the
ticle under title of "Vaccine for Network Worms" that has ACM, 22(3):172–180, March 1982.
[15] H. W. Hethcote. The mathematics of infectious diseases. SIAM
confronted against a type of network worms that influ-
Review, 42(4):599–653, October 2000.
ence and spread through weaknesses present at operating
[16] J. Brunner. The Shockwave Rider. Del Rey Books, Canada, 1975.
systems and softwares into the network and prevent their
[17] Stelios Sidiroglou and Angelos D. Keromytis. "A Network
arrival and spread into the machines. In this method, our Worm Vaccine Architecture" , In Proceedings of the IEEE Inter-
vaccine has used a set of factors and works in a special national Workshops on Enabling Technologies: Infrastructure
order that its result has been automatic renovation and for Collaborative Enterprises (WETICE), Workshop on Enter-
patching of all vulnerable holes of operating system and prise Security. June 2003, Linz, Austria.
software used in machines to prevent the spreading of [18] Stelios Sidiroglou and Angelos D. Keromytis. "Countering
worms. Network Worms Through Automatic Patch Generation", Co-
Simulation of the suggested plan indicates that the lumbia University technical report CUCS-029-03. November
2003, New York, NY.
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 7, JULY 2010, ISSN 2151-9617
HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/
WWW.JOURNALOFCOMPUTING.ORG 16
[19] Siahn Qing and W. Wen, "A Survey and Trends on Internet
Worms," Computers & Security, vol. 24, pp. 334-346, 2005
[20] Siahn Qing and W. Wen, "A Survey and Trends on Internet
Worms," Computers & Security, vol. 24, pp. 334-346, 2005
[21] C. C. Zou,W. Gong, and D. Towsley. Code RedWorm Propaga-
tion Modeling and Analysis. In Proceedings of the 9th ACM
Conference on Computer and Communications Security
(CCS), pages 138–147, November 2002.
[22] The Spread of the Sapphire/Slammer Worm.
http://www.silicondefense.com/research/worms/slammer.ph
p, February 2003.