J Comput Virol (2009) 5:357–364 DOI 10.1007/s11416-008-0099-8 EICAR 2008 EXTENDED VERSION Treating scalability and modelling human countermeasures against local preference worms via gradient models Markos Avlonitis · Emmanouil Magkos · Michalis Stefanidakis · Vassilis Chrissikopoulos Received: 20 January 2008 / Revised: 1 July 2008 / Accepted: 8 July 2008 / Published online: 23 July 2008 © Springer-Verlag France 2008 Abstract A network worm is a specific type of malicious software that self propagates by exploiting application vul- nerabilities in network-connected systems. Worm propaga- tion models are mathematical models that attempt to capture the propagation dynamics of scanning worms as a means to understand their behaviour. It turns out that the emerged scalability in worm propagation plays an important role in order to describe the propagation in a realistic way. On the other hand human-based countermeasures also drastically af- fect the propagation in time and space. This work elaborates on a recent propagation model (Avlonitis et al. in J Com- put Virol 3, 87–92, 2007) that makes use of Partial Diffe- rential Equations in order to treat correctly scalability and non-uniform behaviour (e.g., local preference worms). The aforementioned gradient model is extended in order to take into account human-based countermeasures that influence the propagation of local-preference worms in the Internet. Certain aspects of scalability emerged in random and local preference strategies are also discussed by means of random field considerations. As a result the size of a critical network that needs to be studied in order to describe the global propa- gation of a scanning worm is estimated. Finally, we present simulation results that validate the proposed analytical results and demonstrate the higher propagation rate of local prefe- rence worms compared with random scanning worms. M. Avlonitis · E. Magkos (B ) · M. Stefanidakis · V. Chrissikopoulos Department of Informatics, Ionian University, Plateia Tsirigoti 7, 49100 Kerkyra, Greece e-mail: emagos@ionio.gr M. Avlonitis e-mail: avlon@ionio.gr M. Stefanidakis e-mail: mistral@ionio.gr V. Chrissikopoulos e-mail: vchris@ionio.gr 1 Introduction A network worm is a specific type of malicious software that self propagates by exploiting application vulnerabilities in network-connected systems. During recent years, seve- ral worms have caused significant damage in corporate and Internet core networks [26]. While early worms followed rather random spread patterns and aimed mostly at Denial of Service attacks, future worms are expected to adopt advan- ced scanning strategies and even bear a catastrophic payload [710]. A fast spreading worm armed with a priori informa- tion about the distribution of vulnerable nodes in the under- lying infrastructure [10] may also perform targeted attacks and bring down the majority of the target networks within a short time interval. Securing networks against worm attacks is particularly important for critical infrastructure applica- tions, such as banking and financial applications, emergency deployment services and military applications. Among the various strategies that worms can follow for scanning vulnerable hosts [7, 11] two strategies have been primarily considered: a) random scanning worms (e.g., Code Red I [3], Slammer [4]) uniformly scan the 32-bit IP address space to find and infect vulnerable targets; b) local preference worms (e.g., Blaster [5], Coder Red II [3], Nimda [2]) prefera- bly infect “neighbouring” hosts (e.g., within a specific /8, /16 or /24 address block) within a network. It has been shown that local preference worms spread faster, compared to random scanning worms, when the vulnerable hosts in the Internet are unevenly distributed, which is a realistic assumption [10]. Such network-aware worms tend to infect clusters of nodes, often with similar application vulnerabilities, before moving to other networks. It is also expected that in the future, when the IPv6 will be a reality, local preference may be an opti- mal scanning strategy for worms, given the infeasibility of randomly scanning the entire 128-bit address space [12]. 123