Seminar
Seminar
in the form of computer viruses and worms. One class of such malicious code,
known as random scanning worms, spreads itself without human intervention by
using a scanning strategy to find vulnerable hosts to infect. Code Red, SQL
Slammer, and Sasser are some of the more famous examples of worms that have
caused considerable damage. Network worms have the potential to infect many
vulnerable hosts on the Internet before human countermeasures take place. The
aggressive scanning traffic generated by the infected hosts has caused network
congestion, equipment failure, and blocking of physical facilities such as subway
stations, 911 call centers, etc. As a representative example, consider the Code
RedwormVersion 2 that exploited buffer overflow vulnerability in the Microsoft
IISWebservers. It was released on19 July 2001 Andover a period of less than 14
hours infected more than 359,000 machines. The cost of the epidemic, including
subsequent strains of Code Red, has been estimated by Computer Economics to be
$2.6 billion.
AIM
The goal of our research is to provide a model for the propagation of random
scanning worms and the corresponding developme nt of automatic containment
mechanisms that prevent the spread of worms beyond their early stages. This
containment scheme is then extended to protect an enterprise network from a
preference scanning worm