skip to main content
10.1145/948187.948200acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Epidemic profiles and defense of scale-free networks

Published:27 October 2003Publication History

ABSTRACT

In this paper, we study the defensibility of large scale-free networks against malicious rapidly self-propagating code such as worms and viruses. We develop a framework to investigate the profiles of such code as it infects a large network. Based on these profiles and large-scale network percolation studies, we investigate features of networks that render them more or less defensible against worms. However, we wish to preserve mission-relevant features of the network, such as basic connectivity and resilience to normal nonmalicious outages. We aim to develop methods to help design networks that preserve critical functionality and enable more effective defenses.

References

  1. David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Internet quarantine: Requirements for containing self-propagating code. In Proc. of INFOCOM, 2003.]]Google ScholarGoogle Scholar
  2. Réka Albert, Hawoong Jeong, and Albert-László Barabási. Error and attack tolerance in complex networks. Nature, 406:387--482, 2000.]]Google ScholarGoogle ScholarCross RefCross Ref
  3. Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemics and Immunization in Scale-Free Networks, chapter Epidemics and immunization in scale-free networks. Wiley-VCH, Berlin, May 2002.]]Google ScholarGoogle Scholar
  4. Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic dynamics in finite size scale-free networks. Physcal Review E, 65, 2002. 035108.]]Google ScholarGoogle Scholar
  5. Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading in scale-free networks. Physical Review Letters, 86:3200--3203, 2001.]]Google ScholarGoogle ScholarCross RefCross Ref
  6. Victor M. Eguíluz and Konstantin Klemm. Epidemic threshold in structured scale-free networks. Physical Review Letters, 89(10), September 2002. 108701.]]Google ScholarGoogle ScholarCross RefCross Ref
  7. Victor M. Eguíluz, Emilio Hernández-García, Oreste Piro, and Konstantin Klemm. Effective dimensions and percolation in hierarchically structured scale-free networks. submitted to Physical Review E, 2003.]]Google ScholarGoogle Scholar
  8. Zoltán Dezsó and Albert-László Barabási. Halting viruses in scale-free networks. Physical Review E, 65, 2002. 055103.]]Google ScholarGoogle Scholar
  9. Jasmin Leveille. Epidemic spreading in technological networks. Technical Report HPL-2002-287, HP Laboratories Bristol, October 2002.]]Google ScholarGoogle Scholar
  10. M. E. J. Newman, Stephanie Forrest, and Justin Balthrop. Email networks and the spread of computer viruses. Physical Review E, 66, 2002. 035101.]]Google ScholarGoogle Scholar
  11. A. Mackie, J. Roculan, R. Russel, and M.V. Velzen. Nimda worm analysis. Security Focus, Incident Analysis Report, Version 2, September 2002.]]Google ScholarGoogle Scholar
  12. C. C. Zou, D. Towsley, and W. Gong. Email virus propagation modeling and analysis. Technical Report TR-CSE-03-04, University of Massachusetts Amherst, Electrical and Computer Engineering Department, 2003.]]Google ScholarGoogle Scholar
  13. E. Spafford. An analysis of the internet worm. In Proceedings of the European Software Engineering Conference, volume LNCS 387, September 1989.]]Google ScholarGoogle Scholar
  14. Eeye Digital Security. ".ida code red' worm". Advisory AL20010717, July 2001.]]Google ScholarGoogle Scholar
  15. N. Weaver. Potential strategies for high speed active worms: A worst case analysis. Whitepaper, UC Berkeley, March 2002.]]Google ScholarGoogle Scholar
  16. S. Staniford, V. Paxon, and N. Weaver. How to 0wn the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Security and Privacy, 1(4):33--39, July 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mark E. J. Newman. Random graphs as models of networks. In S. Bornholdt and H. G. Schuster, editors, Handbook of Graphs and Networks. Wiley-VCH, Berlin, 2002. To appear.]]Google ScholarGoogle Scholar
  19. Albert-László Barabási and Réka Albert. Emergence of scaling in random networks. Science, 286:509--512, 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  20. Konstantin Klemm and Victor M. Eguíluz. Highly clustered scale-free networks. Physical Review E, 65, December 2002. 036123.]]Google ScholarGoogle ScholarCross RefCross Ref
  21. Rebecca N. Wright, Patrick D. Lincoln, and Jonathan K. Millen. Efficient fault-tolerant certificate revocation. In 2000 {ACM {CCS, Menlo Park, {CA, jun 2000. {SRI International.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R.Wright, P. Lincoln, and J. Millen. Depender graphs: A method of fault-tolerant certificate distribution. Journal of Computer Security, 9(4):323--338, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. T. Toth and C. Krugel. Accurate buffer overflow detection via abstract payload execution. In Proceedings of the 5th International Symposium on Recent Advanced in Intrusion Detection, Zurich, Switzerland, October 2002.]]Google ScholarGoogle ScholarCross RefCross Ref
  24. P.A. Porras and A. Valdes. Live traffic analysis of tcp/ip gateways. In Proceedings of the 1998 ISOC Symposium on Network and Distributed Systems Security, San Diego, California, March 1998. ISOC Press.]]Google ScholarGoogle Scholar
  25. A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In Proceedings of the 3rd International Symposium on Recent Advanced in Intrusion Detection, Toulouse, France, October 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. Sekar, A. Gupta, J. Frulo, T. Shanbhad, A. Tiwari, Y. Yang, and S. Zhou. Specification-based anomaly detection: a new approach for detecting network intrusion. In Proceedings of the ACM Conference on Computer and Communications Security, Washington DC, November 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Nojiri, J. Rowe, and K. Levitt. Cooperative response strategies for large scale attack mitigation. In Proceedings of the 2003 DARPA DISCEX Conferenece, Washington DC, April 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  1. Epidemic profiles and defense of scale-free networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
      October 2003
      92 pages
      ISBN:1581137850
      DOI:10.1145/948187

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader