6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling

Download250 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2010.31,
        author={Hao Chen and Yu Chen},
        title={A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling},
        proceedings={6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2011},
        month={5},
        keywords={Collaborative Distributed Defense Internet Worms Small world model},
        doi={10.4108/icst.collaboratecom.2010.31}
    }
    
  • Hao Chen
    Yu Chen
    Year: 2011
    A comparison study of collaborative strategies for distributed defense against Internet worms based on small-world modeling
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2010.31
Hao Chen1, Yu Chen1,*
  • 1: Dept. of Electrical & Computer Engineering, SUNY - Binghamton, Binghamton, NY 13902
*Contact email: ychen@binghamton.edu

Abstract

The prosperity of the Internet has made it attractive to hackers and malicious attackers. Internet worms have become one type of major threats to the network infrastructure. Distributed defense collaborating with single-point-deployed security applications over multiple network domains are promising. However, most of the reported collaborative schemes for distributed defense are application-specific. There is not much research that studies the general properties of variant collaborative schemes systematically. In this paper explores properties of general collaborative defense strategies from the perspective of complex system. A three-layered network modeling platform has been developed. Taking advantage of small-world network model, the platform consists of two network layers and one application layer. On top of it, an experimental comparison study of collaborative defense schemes has been conducted. Their performance and effectiveness facing signature-embedded worm attacks have been evaluated.