A NEW ANALYSIS OF CODE RED AND WITTY WORMS BEHAVIOR

TitleA NEW ANALYSIS OF CODE RED AND WITTY WORMS BEHAVIOR
Publication TypeJournal Article
Year of Publication2019
AuthorsKYURKCHIEV, NIKOLAY, ILIEV, ANTON, RAHNEV, ASEN, TERZIEVA, TODORKA
Volume23
Issue2
Start Page267
Pagination20
Date Published01/2019
ISSN1083-2564
AMS97N50
Abstract

In this note we give how can be make a new precise analysis of the situation with spreading of Code Red worm as well Witty worm. These worms were actively spread from 00:00 UTC July 19, 2001 to 00:00 UTC July 20, 2001 and on March 19, 2004, at approximately 8:45 p.m. Pacific Standard Time (PST) respectively. Here we give a new way of treating these epidemics using Dagum-II sigmoid function [1]-[7].

URLhttps://acadsol.eu/en/articles/23/2/3.pdf
DOI10.12732/caa.v23i2.3
Refereed DesignationRefereed
Full Text

[1] C. Kleiber, A Guide to the Dagum Distribution. In: Modeling Income Distributions and Lorenz Curves: Essays in Memory of Camilo Dagum, D. Chotikapanich (ed.), Springer-Verlag, New York, (2008).
[2] C. Dagum, A new method of personal income distribution: Specification and estimation, Economie Appliquee, 33, (1977), 413-437.
[3] C. Dagum, Generating systems and properties of income distribution models, Metron, 38, (1980), 3-26.
[4] C. Dagum, Sistemas generadores de distribucion de ingreso y la ley de Pareto, El Trimestre Economico, 47, (1980), 877-917.
[5] C. Dagum, Income distribution models. In: S. Kotz, N.L. Johnson, and C. Read (eds.): Encyclopedia of Statistical Sciences, Vol.4, John Wiley, New York, (1983), 27-34.
[6] C. Dagum, Generation and properties of income distribution functions. In: Dagim, C. and Zenga, M. (eds.): Income and Wealth Distribution, Inequality and Poverty: Proceedings of the Second International Conference on Income Distribution by Size: Generation, Distribution, Measurement and Applications New York-Berlin-Tokyo, Springer, (1990), 7-17.
[7] C. Kleiber, S. Kotz, Statistical size distribution in economics and actuarial sciences, Wiley, New York, (2003).
[8] F. Hausdorff, Set Theory, 2 ed., Chelsea Publ., New York, (1962).
[9] B. Sendov, Hausdorff Approximations, Kluwer, Boston, (1990).
[10] N. Kyurkchiev, S. Markov, Sigmoidal functions: Some Approximation and Modeling Aspects. Some Modules in Programming Environment MATHEMATICA, LAP LAMBERT Academic Publishing, Saarbrucken, (2015).
[11] N. Kyurkchiev, A. Iliev, S. Markov, Some techniques for recurrence generating of activation functions, LAP LAMBERT Academic Publishing, (2017).
[12] N. Pavlov, A. Iliev, A. Rahnev, N. Kyurkchiev, Some software reliability models: Approximation and modeling aspects, LAP LAMBERT Academic Publishing, (2018).
[13] N. Pavlov, A. Iliev, A. Rahnev, N. Kyurkchiev, Nontrivial Models in Debugging Theory (Part 2), LAP LAMBERT Academic Publishing, (2018).
[14] N. Kyurkchiev, A. Iliev, Extension of Gompertz-type Equation in Modern Science: 240 Anniversary of the birth of B. Gompertz, LAP LAMBERT Academic Publishing, (2018).
[15] N. Kyurkchiev, A. Iliev, A Note on the Dagum-II Sigmoid Function with Applications to Wealth Data. Other Applications, Pliska Stud. Math., 30, (2019), 117-126.
[16] D. Moore, C. Shannon, J. Brown, Code-Red: a case study on the spread and victims of an Internet worm, Internet Measurement Workshop (IMW), (2002), 273-284.
[17] C. Zou, W. Gong, D. Towsley, Code red worm propagation modeling and analysis, CCS ’02 Proceedings of the 9th ACM conference on Computer and communications security, (2002), 138-147.
[18] C. Zou, L. Gao, W. Gong, D. Towsley, Monitoring and early warning for internet worms, CCS ’03 Proceedings of the 10th ACM conference on Computer and communications security, (2003), 190-199.
[19] C. Zou, D. Towsley, W. Gong, Songlin Cai, Advanced Routing Worm and Its Security Challenges, Simulation, 82, No. 1 (2006), 75-85.
[20] C. Zou, D. Towsley, W. Gong, Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms, IEEE Transactions on Dependable and Secure Computing, 4, No. 2 (2007), 105-118.
[21] C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, Proceedings of the 2003 ACM workshop on Rapid malcode, October 27-27, (2003), Washington, DC, USA.
[22] C. Zou, D. Towsley, W. Gong, On the performance of internet worm scanning strategies, Performance Evaluation, 63, No. 7 (2006), 700-723.
[23] C. Zou,W. Gong, D. Towsley, L. Gao, The monitoring and early detection of internet worms, IEEE/ACM Transactions on Networking (TON), 13, No. 5 (2005), 961-974.
[24] P. Wang, L. Wu, R. Cunningham, C. Zou, Honeypot detection in advanced botnet attacks, International Journal of Information and Computer Security, 4, No. 1 (2010), 30-51.
[25] A. Visheratin, M. Melnik, D. Nasonov, N. Butakov, A. Boukhanovsky, Hybrid scheduling algorithm in early warning systems, Future Generation Computer Systems, 79, No. P2 (2018), 630-642.
[26] J. Jerkins, J. Stupiansky, Mitigating IoT insecurity with inoculation epidemics, Proceedings of the ACMSE 2018 Conference, March 29-31, (2018), 1-6, Richmond, Kentucky.
[27] Q. Xiao, S. Chen, M. Chen, Y. Ling, Hyper-Compact Virtual Estimators for Big Network Data Based on Register Sharing, ACM SIGMETRICS Performance Evaluation Review, 43, No. 1 (2015), 417-428.
[28] H. Asghari, M. Ciere, M. Van Eeten, Post-mortem of a zombie: conficker cleanup after six years, Proceedings of the 24th USENIX Conference on Security Symposium, August 12-14, (2015), 1-16, Washington, D.C.
[29] A. Dainotti, A. King, K. Claffy, F. Papale, A. Pescape, Analysis of a ”/0” stealth scan from a botnet, IEEE/ACM Transactions on Networking (TON), 23, No. 2 (2015), 341-354.
[30] D. Lee, J. Kim, K. Kim, A study on abnormal event correlation analysis for convergence security monitor, Cluster Computing, 16, No. 2 (2013), 219-227.
[31] E. Magkos, M. Avlonitis, P. Kotzanikolaou, M. Stefanidakis, Toward early warning against Internet worms based on critical-sized networks, Security and Communication Networks, 6, No. 1 (2013), 78-88.
[32] S. Xu, W. Lu, L. Xu, Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights, ACM Transactions on Autonomous and Adaptive Systems (TAAS), 7, No. 3 (2012), 1-26.
[33] C. Shannon, D. Moore, The Spread of the Witty Worm, IEEE Security & Privacy, July/August, (2004), 46-50.
[34] A. Mohammed, S. Nor, M. Marsono, Analysis of Internet Malware Propagation Models and Mitigation Strategies, IRACST International Journal of Computer Networks and Wireless Communications (IJCNWC), 2, No. 1 (2012), 16-20.
[35] S. Staniford, V. Paxsony, N. Weaver, How to own the Internet in Your Spare Time, Proceedings of the 11th USENIX Security Symposium, San Francisco, California, USA, August 5-9, (2002).
[36] S. Fei, L. Zhaowen, M. Yan, A survey of Internet Worm Propagation Models, Proceedings of IC-BNMT2009, (2009), 453-457.
[37] S. Fei, L. Zhaowen, M. Yan, Worm Propagation based on Two-Factor Model, Proceedings of 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, (2009), 4 pp.
[38] D. Smith, L. Moore, The SIR model for the Spread of Diseases, JOMA, (2004).
[39] J. Kim, S. Radhakrishnan, S. Dhall, Measurement and Analysis of worm propagation on Internet network topology, Proceedings of 13th International Conference on Computer Communications and Networks (IEEE Cat. No.04EX969), 495-500.
[40] T. Li, Z. Guan, Y. Wang, The Stability of a Worm Propagation Model with Time Delay on Homogeneous Networks, Proceedings of International Conference on Intelligent Control and Information Processing, August 13-15, (2010) - Dalian, China, 753-755.
[41] T. Li, Z.-H. Guan, Y. Wang, Y. Li, Impulsive Control of the Spread of worm with Nonlinear Incidence Rates, Proceedings of 2010 Chinese Control and Decision Conference, (2010), 966-969.
[42] Y. Wang, Z.-H. Guan, T. Li, S. Zhang, Modeling and Analyzing the Spread of Worm with Impulsive Effect on Homogeneous Network, Proceedings of 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), V7-501-V7-504.
[43] C. Junhua,W. Shengjun, Modeling and Analyzing the Spread of worms with Bilinear Incidence Rate, Proceedings of 2009 Fifth International Conference on Information Assurance and Security, (2009), 167-170.
[44] W. Shaojie, L. Qiming, D. Bo, M. Weining, Analysis of a Mathematical Model for Worm Virus Propagation with time delay, Proceedings of 2009 Second International Conference on Environmental and Computer Science, (2009), 375-379.
[45] D. Zhang, Y. Wang, SIRS: Internet Worm Propagation and Application, Proceedings of 2010 International Conference on Electrical and Control Engineering, (2010), 3029-3032.
[46] Q. Liu, R. Xu, S. Wang, Modeling and Analysis of an SIRS Model for worm Propagation, Proceedings of 2009 International Conference on Computational Intelligence and Security, (2009), 361-365.
[47] S. Fei, L. Zhao-wen, M. Yan, Modeling and Analysis of Internet worm propagation, The Journal of China Universities of Posts and Telecommunications, 17, No. 4 (2010), 63-68.
[48] J. Wang, C. Xia, Q. Liu, A novel Model for the Internet Worm Propagation, Proceedings of 2010 Sixth International Conference on Natural Computation (ICNC 2010), (2010), 2885-2888.
[49] F. Wang, J. Song, Y. Dong, J. Gu, Epidemic models applied to worms on internet, Proceedings of 2009 Second International Conference on Intelligent Networks and Intelligent Systems, (2009), 160-163.
[50] Z. Wei, Q. Facheng, C. Shiqi, W. Ruchuan, The Study of Network Worm Propagation Simulation, Proceedings of 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), (2010), V9-295-V9-299.
[51] Liuqi, M. Guoqing, The research and development of worm defense strategies, Proceedings of 2010 3rd International Conference on Computer Science and Information Technology, (2010), 168-171.
[52] F.Wang, Y. Zhang, C. Wang, J. Ma, S. Moon, Stability analysis of a SEIQV epidemic for rapid spreading worms, Computer & Security, 29 (2010), 410-418.
[53] Y. Yao, H. Guo, F. Gao, G. Yu, The Worm Propagation Model with pulse Quarantine Strategy, Proceedings of 2010 International Conference on Multimedia Information Networking and Security, (2010), 269-273.
[54] H. Zhang, W. Su, W. Quan, Smart Collaborative Identifier Network: A Promising Design for Future Internet, Springer-Verlag, Berlin (2016).
[55] X. Wang, J. Zhu, H. Lin, X. Su, Y. Jiang, Modeling Propagation of Active P2P Worm in Chord Network, In: Advances in Intelligent and Soft Computing, J. Kacprzyk eds., 133 (2012), S. Sambath & E. Zhu (Eds.), Frontiers in Computer Education, 383-390.
[56] Y. Xiao, F. Li, H. Chen, eds., Handbook of Security and Networks, World Scientific, Singapore (2011).
[57] S. Sellke, N. Shroff, S. Bagchi, Modeling and Automated Containment of Worms, Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN05), (2005), 10 pp.
[58] W. Yu, C. Boyer, S. Chellappan, D. Xuan, Peer-to-peer system-based active worm attacks: modeling and analysis, IEEE International Conference on Communications, 2005, (2005), 295-300.
[59] S. Zhang,Z. Jin, J. Zhang, The Dynamical Modeling Analysis of the Spreading of Passive Worms in P2P Networks, Discrete Dynamics in Nature and Society, 2018, Article ID 1656907, (2018), 13 pp.
[60] G. Yan, S. Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms (Extended Version), IEEE Transactions on Mobile Computing, 8, No. 3 (2009), 353-367.
[61] S. Sellke, N. Shroff, S. Bagchi, Modeling and Automated Containment of Worms, IEEE Transactions on Dependable and Secure Computing, 5, No. 2 (2008), 71-86.
[62] S. Peng, M. Wua, G. Wang, S. Yu, Propagation Model of Smartphone Worms Based on Semi-Markov Process and Social Relationship Graph, Computers & Security, 44 (2014), 92-103.