Вы находитесь на странице: 1из 5

DEFENSE AGAINST WORMS USING DISTRIBUTED ANTIWORM SYSTEM

ABSTRACT

A worm copies itself automatically across networks and may infect millions of
servers in a short period of time. It is conceivable that the cyber terrorists may use a
widespread worm to cause major disruption to the Internet economy. Much recent
research concentrates on propagation models and early warning, but the defense against
worms is largely an open problem. We propose a distributed antiworm architecture
(DAW) that automatically slows down or even halts the worm propagation within an
Internet service provider (ISP) network. New defense techniques are developed based on
the behavioral difference between normal hosts and worm-infected hosts. Particularly, a
worm-infected host has a much higher connection-failure rate when it randomly scans the
Internet. This property allows DAW to set the worms apart from the normal hosts. We
propose a rate-limit algorithm and which makes the speed of worm propagation
configurable by the parameters of the defense system. we propose a distributed antiworm
architecture (DAW), which is designed for an Internet service provider (ISP) to provide
antiworm service to its customers. (From an ISP’s point of view, the neighbor ISPs are
also customers.) DAW is deployed at the ISP edge routers, which are under the same
administrative control. It incorporates a number of new techniques that monitor the
scanning activity within the ISP network, identify the potential worm threats, restrict the
speed of worm propagation, and even halt the worms by blocking out scanning sources
Existing System:

Much recent research on Internet worms concentrates on propagation modeling


and early warning .The defense against worms is still an open problem. Some of the
earlier methods of defensing against worms has been given below:

(i)Twycross and Williamson’s method:

One of the properties of a worm is that a worm infected host has much connection
failure rater compared to a normal host. Twyross and Williamson proposed a method so
that one can modify the network stack such that the rate of connection requests to
distinct destinations is bounded

Limitation:

The disadvantage is that it restricts a normal host in the same way it restricts a
worm-infected host. Moreover, the approach becomes effective only after the majority of
all Internet hosts is upgraded with the new network stack.

(ii)Staniford’s containment method:

Staniford studied the containment of random scanning worms on a large enterprise


network . The model assumes the existence of a containmen tmethod that can block out
an infected host after it scans around 10 addresses.

(iii)Credit based algorithm:

Schechter et al. proposed a credit-based algorithm to limit the scan rate of a host,
whose credit (that is, allowance of making connections) is increased by one for each
successful connection made and decreased by one for each failed connection made. It is
necessary to limit the rate at which first contact connections can be initiated in order to
ensure that worms cannot propagate rapidly between the moment scanning begins and
time. Credit-based connection rate limiting works by granting each local host, a starting
balance of ten credits (Ci = 10) which can be used for issuing first-contact connection
requests. Whenever a first-contact connection request is observed, a credit is subtracted
from the sending host's balance (Ci = Ci-1). If the successful acknowledgment of a first-
contact connection is observed, the host that initiated the request is issued two additional
credits (Ci = Ci+2). No action is taken when connections fail, as the cost of issuing a
first-contact connection has already been deducted from the issuing host's balance.

Limitation:

This algorithm can be circumvented by an infected host that scans while making
successful connections at the same rate.

Proposed system:

We propose a distributed antiworm architecture (DAW), which is designed for an


Internet service provider (ISP) to provide antiworm service to its customers. (From an
ISP’s point of view, the neighbor ISPs are also customers.) DAW is deployed at the ISP
edge routers, which are under the same administrative control. It incorporates a number
of new techniques that monitor the scanning activity within the ISP network, identify the
potential worm threats, restrict the speed of worm propagation, and even halt the worms
by blocking out scanning sources.

• The proposed defense system separates the worm infected hosts from the normal
hosts based on their behavioral differences.
• A worm-infected host has a much higher connection-failure rate when it randomly
scans the Internet, whereas a normal user deals mostly with valid addresses due to
the use of Domain Name System (DNS).
• This and other properties allow us to design the entire defense architecture based
on the inspection of failed connections, which not only reduces the system
overhead, but also minimizes the disturbance to normal users.
Advantage:

The main advantage of using this system is that it aims to minimize the
performance impact on normal hosts and routers. Particularly, a normal host is allowed
to make successful connections at any rate, and the processing and storage requirements
on a router are minimized. The purpose of DAW is to provide an ISP-based antiworm
service that slows or even stops Internet worms from spreading among the customer
networks.

Requirements: Hardware Requirements:

These include the basic hardware specifications needed for a system. The Harware
requirements are given below:

Hard disk : 160GB

RAM : 1GB

Processor : Intel Pentium4 or higher

Input device : Standard Keyboard and Mouse

Output device : VGA and High Resolution Monitor.

Software Requirements:

The implementation can be preceded through Socket in java but it will be


considered as peer to peer communication .For proactive routing we need dynamic
routing. So java will be more suitable for platform independence and networking
concepts. For this project we require the following software.

Operating System : Windows XP.

Front End : Java Development Kit 1.5.

Implementation Concept : Sockets in java

Вам также может понравиться