Abstract
While worms and their propagation have been a major security threat over the past years, causing major financial losses and down times for many enterprises connected to the Internet, we will argue in this paper that valuable lessons can be learned from them and that network management, which is the activity supposed to prevent them, can actually benefit from their use. We focus on five lessons learned from current malware that can benefit to the network management community. For each topic, we analyse how it is been addressed in standard management frameworks, we identify their limits and describe how current malware already provides efficient solutions to these limits. We illustrate our claim through a case study on a realistic application of worm based network management, which is currently developed in our group.
Similar content being viewed by others
References
Goldszmidt, G., Yemini, Y.: Distributed management by delegation. In: 15th International conference on distributed computing systems. IEEE Computer Society (1995)
Schoenwaelder, J., Quittek, J.: Secure management by delegation within the internet management framework. In: 6th IFIP/IEEE international symposium on integrated network management,Boston. IEEE Computer Society (1999)
Gkantsidis, C., Karagiannis, T., Rodriguez, P., Vojnovic, M.: Planet scale software updates. In: Proceedings of ACM SIGCOMM‘2006 (2006)
Doyen G., Nataf E., Festor O. (2005). A hierarchical architecture for a distributed management of p2p networks and services. In: Schönwälder J., Serrat J., (eds). DSOM, ser. Lecture Notes in Computer Science, vol. 3775. Springer, pp 257–268
Lemos, R.: Major prison time for bot master, http://www. securityfocus.com/brief/205 (2006)
Nazario, J.: Defense and Detection Strategies against Internet Worms. Artech House Publishers (2003)
Aitel, D.: Nematodes, http://www.immunitysec.com/ resources-papers.shtml (2006)
Schoch, J., Hupp, J.: The “worm” programs— early experience with a distributed computation. Commun. ACM (1982)
Cohen F. (1985). Computer Viruses. Wiley, London
Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley Professional, Reading (2005)
Koziol J., Litchfield D., Aitel D., Anley C., Eren S. and Mehta N. (2004). The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. Wiley, London
Tennenhouse, D., Wetherall, D.: Towards an Active Network Architecture. Comput. Commun. Rev. 26(2), (1996)
Sugauchi K., Miyazaki S., Yoshida K., Nakane S., Covaci K. and Zhang T. (1999). Flexible Network Management Using Active Network Framework. In: Covaci, S. (eds) Active networks: Proceedings of 1st international working Conference, IWAN‘99, Berlin. LNCS 1653., pp 241–248. Springer, Heidelberg
Brunner, P., Stadler, R.: The impact of active networking technology on service Management in a telecom environment. In: Proceedings of 6th IFIP/IEEE international symposium on integrated network management (IM’99) Boston
Schwartz B., Jackson A., Strayer W., Zhou W., Rockwell D. and Partridge C. (2000). Smart packets: applying active networks to network management. ACM Trans. Comput. Syst. 18(1): 67–88
Koza J. (1992). Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge
Adamatzky A., Maciej Komosinski M. (2005). Artificial Life Models in Software. Springer, Heidelberg
Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Security and Privacy (2003)
IETF.: Network working group c. kalt request for comments:2810 (2000)
Goldschlag D., Reed M. and Syverson P. (1996). Hiding routing information. LNCS 1174: 137–150
Cridlig V., Festor O. and State R. (2004). Role-based access control for xml enabled management gateways. In: Sahai, A. and Wu, F. (eds) DSOM, ser. Lecture Notes in Computer Science, vol. 3278., pp 183–195. Springer, Heidelberg
Filiol E. (2005). Computer Viruses: From Theory To Applications. Springer, Heidelberg
Young A. and Yung M. (2004). Malicious Cryptography: Exposing Cryptovirology. Wiley, London
Filiol, E.: Strong cryptography armoured computer viruses forbidding code analysis: the bradley virus. In: EICAR2005 annual conference 14, StJuliens/Valletta-Malta (2005)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
State, R., Festor, O. Malware: a future framework for device, network and service management. J Comput Virol 3, 51–60 (2007). https://doi.org/10.1007/s11416-007-0037-1
Received:
Revised:
Accepted:
Published:
Issue date:
DOI: https://doi.org/10.1007/s11416-007-0037-1