The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.

Bibliography Details

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

Internet Quarantine: Requirements for Containing Self-Propagating Code
Authors: D. Moore
C. Shannon
G. Voelker
S. Savage
Published: IEEE INFOCOM, 2003
URL: https://catalog.caida.org/paper/2003_quarantine/
Entry Date: 2004-01-30
Abstract:

It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homoge-neous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such "worm" outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period - incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, there is considerable effort focused on developing technical means for detecting and containing worm infections before they can cause such damage.

This paper does not propose a particular technology to address this problem, but instead focuses on a more basic question: How well will any such approach contain a worm epidemic on the Internet? We describe the design space of worm containment systems using three key parameters- reaction time, contain-ment strategy and deployment scenario. Using a combination of analytic modeling and simulation, we describe how each of these design factors impacts the dynamics of a worm epidemic and, conversely, the minimum engineering requirements necessary to contain the spread of a given worm. While our analysis cannot provide definitive guidance for engineering defenses against all future threats, we demonstrate the lower bounds that any such system must exceed to be useful today. Unfortunately, our results suggest that there are significant technological and administrative gaps to be bridged before an effective defense can be provided in today's Internet.

Datasets:
Experiments:
Results:
References: