Information Technology Reference
In-Depth Information
scan described in the sets
whose target was susceptible at time
0. The edge is directed from the source of the scan to the target; an edge will
be called an
infection edge
or
countering edge
, depending on whether it comes
from an infection or counter-worm sequence, respectively. The node for host
h
i
will have values
S
(
h
i
) recording the earliest time it was scanned by an infected
host, and
C
(
h
i
) recording the earliest time it was scanned by a host running a
counter-worm. Some of the edges are labeled with the time of the scan—these
edges are particularly important in our analysis. The values of
S
(
h
i
)and
C
(
h
i
),
the edges labeled and the values of those labels all depend on the particular
defense. However, common to those defenses are the following rules:
{I
i
}
and
{C
i
}
-
All hosts assumed to be already infected at time 0 label each of their edges
with the corresponding scan time;
-
all hosts that are used to start the counter-worm label each of their edges
with
T
0
plus the corresponding scan time offset contained in the scan se-
quence.
The differences between different defense's SPGs are characterized as follows:
Empty Defense
(
D
0
)
1. Thenodeforhost
h
i
defines
S
(
h
i
) to be the smallest label among all labeled
infection edges directed to it;
S
(
h
i
)=
∞
if no such edge exists.
labels the infection edge corresponding to the
j
th
element of
2. A host
h
i
I
i
(say, (
s
j
,
dst
j
)) with value
S
(
h
i
)+
s
j
,
j
=1
,
2
,
···
.
The difference between the simple patch defense and the empty defense is
that susceptible hosts are protected from infection if they are touched by a
countering scan before being touched by an infection scan.
Simple Patch
(
D
1
)
1. Item (1) from the Empty Defense rules.
2. Thenodeforhost
h
i
defines
C
(
h
i
) to be the smallest label among all labeled
countering edges directed to it;
C
(
h
i
)=
if no such edge exists.
3. If
S
(
h
i
)
<C
(
h
i
) the node labels the infection edge corresponding to the
j
th
element of
∞
I
i
(say, (
s
j
,
dst
j
)) with value
S
(
h
i
)+
s
j
,
j
=1
,
2
,
···
.
4. If
C
(
h
i
)
<S
(
h
i
) the node does not label any of its edges.
The difference between a spreading patchdefenseandasimplepatchoneis
that a host that receives a countering scan before any infection scan becomes
host to counter-worm software, and generates its own countering scans.
Spreading Patch
(
D
2
)
1. Items (1) from the Empty Defense rules, (2), and (3) from the Simple Patch
rules.
2. If
C
(
h
i
)
<S
(
h
i
) the node labels the countering edge corresponding to the
j
th
element of
C
i
(say, (
s
j
,
dst
j
)) with value
C
(
h
i
)+
s
j
,
j
=1
,
2
,
···
.