这是indexloc提供的服务,不要输入任何密码
Skip to main content
Log in

Malware: a future framework for device, network and service management

  • Extended version of WTCV'06
  • Published:
Journal in Computer Virology Aims and scope Submit manuscript

Abstract

While worms and their propagation have been a major security threat over the past years, causing major financial losses and down times for many enterprises connected to the Internet, we will argue in this paper that valuable lessons can be learned from them and that network management, which is the activity supposed to prevent them, can actually benefit from their use. We focus on five lessons learned from current malware that can benefit to the network management community. For each topic, we analyse how it is been addressed in standard management frameworks, we identify their limits and describe how current malware already provides efficient solutions to these limits. We illustrate our claim through a case study on a realistic application of worm based network management, which is currently developed in our group.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Goldszmidt, G., Yemini, Y.: Distributed management by delegation. In: 15th International conference on distributed computing systems. IEEE Computer Society (1995)

  2. Schoenwaelder, J., Quittek, J.: Secure management by delegation within the internet management framework. In: 6th IFIP/IEEE international symposium on integrated network management,Boston. IEEE Computer Society (1999)

  3. Gkantsidis, C., Karagiannis, T., Rodriguez, P., Vojnovic, M.: Planet scale software updates. In: Proceedings of ACM SIGCOMM‘2006 (2006)

  4. Doyen G., Nataf E., Festor O. (2005). A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, vol. 3775. Springer, pp 257–268

  5. Lemos, R.: Major prison time for bot master, http://www. securityfocus.com/brief/205 (2006)

  6. Nazario, J.: Defense and Detection Strategies against Internet Worms. Artech House Publishers (2003)

  7. Aitel, D.: Nematodes, http://www.immunitysec.com/ resources-papers.shtml (2006)

  8. Schoch, J., Hupp, J.: The “worm” programs— early experience with a distributed computation. Commun. ACM (1982)

  9. Cohen F. (1985). Computer Viruses. Wiley, London

    Google Scholar 

  10. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)

  11. Koziol J., Litchfield D., Aitel D., Anley C., Eren S. and Mehta N. (2004). The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. Wiley, London

    Google Scholar 

  12. Tennenhouse, D., Wetherall, D.: Towards an Active Network Architecture. Comput. Commun. Rev. 26(2), (1996)

  13. Sugauchi K., Miyazaki S., Yoshida K., Nakane S., Covaci K. and Zhang T. (1999). Flexible Network Management Using Active Network Framework. In: Covaci, S. (eds) Active networks: Proceedings of 1st international working Conference, IWAN‘99, Berlin. LNCS 1653., pp 241–248. Springer, Heidelberg

    Google Scholar 

  14. Brunner, P., Stadler, R.: The impact of active networking technology on service Management in a telecom environment. In: Proceedings of 6th IFIP/IEEE international symposium on integrated network management (IM’99) Boston

  15. Schwartz B., Jackson A., Strayer W., Zhou W., Rockwell D. and Partridge C. (2000). Smart packets: applying active networks to network management. ACM Trans. Comput. Syst. 18(1): 67–88

    Article  Google Scholar 

  16. Koza J. (1992). Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge

    MATH  Google Scholar 

  17. Adamatzky A., Maciej Komosinski M. (2005). Artificial Life Models in Software. Springer, Heidelberg

    Book  MATH  Google Scholar 

  18. Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Security and Privacy (2003)

  19. IETF.: Network working group c. kalt request for comments:2810 (2000)

  20. Goldschlag D., Reed M. and Syverson P. (1996). Hiding routing information. LNCS 1174: 137–150

    Google Scholar 

  21. Cridlig V., Festor O. and State R. (2004). Role-based access control for xml enabled management gateways. In: Sahai, A. and Wu, F. (eds) DSOM, ser. Lecture Notes in Computer Science, vol. 3278., pp 183–195. Springer, Heidelberg

    Google Scholar 

  22. Filiol E. (2005). Computer Viruses: From Theory To Applications. Springer, Heidelberg

    MATH  Google Scholar 

  23. Young A. and Yung M. (2004). Malicious Cryptography: Exposing Cryptovirology. Wiley, London

    Google Scholar 

  24. Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR2005 annual conference 14, StJuliens/Valletta-Malta (2005)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radu State.

Rights and permissions

Reprints and permissions

About this article

Cite this article

State, R., Festor, O. Malware: a future framework for device, network and service management. J Comput Virol 3, 51–60 (2007). https://doi.org/10.1007/s11416-007-0037-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11416-007-0037-1

Keywords