Skip navigation

Comparative performance of a parallel implementation of an internet-scale zero-day worm epidemiology simulator

Comparative performance of a parallel implementation of an internet-scale zero-day worm epidemiology simulator

Tidy, Luc, Woodhead, Steve and Wetherall, Jodie ORCID: 0000-0002-4786-5824 (2016) Comparative performance of a parallel implementation of an internet-scale zero-day worm epidemiology simulator. International Journal of Computer and Communication Engineering, 5 (1). pp. 11-22. ISSN 2010-3743 (doi:https://doi.org/10.17706/IJCCE.2016.5.1.11-22)

[img]
Preview
PDF (Open Access Publication)
13963_WOODHEAD_Zero_Day_Worm_Simulator_2016.pdf - Published Version

Download (340kB)

Abstract

The threat posed by fast-spreading malware is significant, particularly given the fact that network operator/administrator intervention is not likely to take effect within the typical epidemiological timescale of such infections. The cost of zero-day network worm outbreaks has been estimated to be up to US $2.6 billion for a single worm outbreak. Zero-day network worm outbreaks have been observed that spread at a significant pace across the global Internet, with an observed rate of reaching more than 90 percent of vulnerable hosts within 10 minutes. An accepted technology that is used in addressing the security threat presented by zero-day worms is the use of simulation systems, and a common factor determining their efficacy is their performance. An empirical comparison of a sequential and parallel implementation of a novel simulator, the Internet Worm Simulator (IWS), is presented detailing the impact of a selection of parameters on its performance. Experimentation demonstrates that IWS has the capability to simulate up to 91.8 million packets transmitted per second (PTS) for an IPv4 address space simulation on a single workstation computer, comparing favourably to previously reported metrics. It is concluded that in addition to comparing PTS performance, simulation requirements should be taken into consideration when assessing the performance of such simulators.

Item Type: Article
Uncontrolled Keywords: Malware, network worm, simulation, computational performance
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Related URLs:
Last Modified: 21 Apr 2017 10:50
URI: http://gala.gre.ac.uk/id/eprint/13963

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics