the same number of vulnerable hosts is distributed
within the enterprise network. The relation is
described concretely as follows.
Table 1 gives the relation between the number of
subnets of class-B and the upper bound of T to
prevent a Sasser worm from spreading when I(p,T) <
2 is satisfied. We assume that the number of new
infected nodes is a constant value like 3277 (as
explained in Section 5). The more the number of
subnets of class-B increases, the lower the
vulnerable node density becomes. As a result, the
upper bound of threshold can be set higher. For
example, when 3277 hosts with T are distributed
within the enterprise network, we set T = 39 if there
is one subnet of class-B, and we set T = 79 if there
are two subnets of class-B.
Table 1: The relation between the number of subnets of
class-B (the number of vulnerable nodes is constant at
3277) and the upper bound of T to prevent a Sasser worm
when I(p,T) < 2.
Number of
subnets of
class-B
N
Number of
vulnerable hosts in
each subnet of
class-B
Upper bound
of T
1 3277 3277 39
2 3277 1638 79
3 3277 1092 118
4 3277 819 157
5 3277 655 196
From the viewpoint of preventing infection from
spreading, it is important to expand the number of
subnets and to lower the density of the host when the
same host is put in an enterprise network. We
quantitatively show how much threshold we should
be set according to the number of class-B subnets. If
the upper bound of the threshold can be raised while
suppressing worm spreading, the times for both
detection and containment can be increased.
Accordingly, the accuracy of detection can be
expected to be improved. It is a big contribution to
the countermeasure of scanning malware in the
enterprise network to know how much high the
threshold we should be set by according to the
number of subnets.
8 SUMMARY
We proposed a “combinatorics proliferation model”
based on discrete mathematics (combinatorics) and
derived the threshold T for satisfying I(p,T) < u (u is
a small number), where I(p,T) is the expected
number of infected hosts. We confirmed that the
results from this model precisely correspond to the
result of computer simulation of malware spreading
when
),,(
1
TpTE
< 1 is satisfied.
Moreover, we clarified the relation between the
number of subnets in an enterprise network and the
upper bound of the threshold when the same number
of hosts is distributed within the network. For
example, when 3277 hosts are distributed within the
network, we set T = 39 if there is one class-B subnet,
and we set T = 79 if there is two class-B subnets.
In a practical enterprise network, it is important
that a suitable countermeasure is executed in the
early stages of infection. Our model can
appropriately express the number of infected hosts in
the early stages of infection, and can derive the
effective threshold to contain the scanning malware
in the enterprise network to a few infections only.
REFERENCES
Barford, P., Yegneswaran, V., 2006. An Inside Look at
Botnets. Special Workshop on Malware Detection,
Advances in Information Security.
Nikoloski, Z., Deo, N., Kucera, L., 2006. Correlation
Model of Worm Propagation on Scale-Free Networks.
Complexus, 2006(3):169-182.
Chen, Z., Gao, L., Kwiat, K., 2003. Modeling the Spread
of Active Worms. In Proceedings of IEEE INFOCOM.
Staniford, S., 2004. Containment of Scanning Worms in
Enterprise Networks. Journal of Computer Security.
Moore, D., Shannon, C., Voelker, G. M., Savage, S., 2003.
Internet Quarantine: Requirements for Containing
Self-Propagating Code, In Proceedings of IEEE
INFOCOM.
Zou, C. C., Gao, L., Gong, W., Towsley, D., 2003.
Monitoring and Early Warning for Internet Worms. In
Proceedings of the 10th ACM Conference on
Computer and Communication Security, pages 190-
199. ACM Press.
Williamson, M. M., 2002. Throttling Viruses: Restricting
propagation to defeat malicious mobile code. In
Proceedings of the 18th Annual Computer Security
Applications Conference.
Whyte, D., Kranakis, E., Oorschot, P. C., 2005. DNS-
based Detection of Scanning Worms in an Enterprise
Network. In Proceedings of the 12th Annual Network
and Distributed System Security Symposium.
Whyte, D., Oorschot P. C., Kranakis, E., 2005. Detecting
Intra-enterprise Scanning Worms based on Address
Resolution. In Proceedings of the 21st Annual
Computer Security Applications Conference.
Bakos, G., Berk, V. H., 2002. Early detection of Internet
worm activity by metering ICMP destination
unreachable messages. In Proceedings of the SPIE
Aerosense.
A COMBINATORICS PROLIFERATION MODEL TO DETERMINE THE TIMING FOR BLOCKING SCANNING
MALWARE
23