Skip to main content

Virus Throttle as Basis for ProActive Defense

  • Conference paper
Computer Network Security (MMM-ACNS 2007)

Abstract

The spread of viruses and worms has severe implications on the performance of virtually any network. Current methods to stop the propagation of malicious code rely on anti-virus signature recognition to prevent hosts from being infected. Unfortunately, the latency between the introduction of a new virus into a network and the implementation/distribution of a patch can be significant. Within this period, a network can be crippled by the abnormally high rate of traffic generated by infected hosts. Previous research has provided a mechanism for controlling the rate at which a host can make new network connections when exhibiting virus-like behavior. Extending this technology to network routers provides the benefit of network protection without the need for individual client support, and serves as an initial step in developing a virus-resilient network. This paper/presentation reflects on the unique challenge of adapting the Virus Throttle mechanism to HP ProCurve network switch routers. Also discussed is the method of proving that it works in realistic network conditions to protect against worms without interfering with normal network traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. CSI/FBI 2006 Computer Crime and Security Survey (2007), http://www.gosci.com/

  2. HP ProCurve (2007). Making Adaptive Networks a Reality (2007). http://www.hp.com/ rnd/pdfs/Vision TechnicalWhitePaper.pdf

  3. HP ProCurve 2007. ProCurve ProActive Defense: A Comprehensive Network Security Strategy (2007), http://www.hp.com/rnd/pdfs/ProCurve_Security_paper_022107.pdf

  4. HP ProCurve (2007). Protecting the Extended Enterprise Network: Security Strategies and Solutions from ProCurve Networking (2007) http://www.hp.com/rnd/pdfs/Adaptive_EDGE_Arch_wp.pdf

  5. HP ProCurve (2007). ProVision ASIC: Built for the future (2007), http://www.hp.com/ rnd/itmgrnews/built_for_future.htm?jumpid=reg_R1002_USEN

  6. HP ProCurve (2007). ProCurve Network Immunity Solution (2007), http://www.procurve.com/ security/Network_Immunity_Technical_Brief.pdf

  7. HP ProCurve (2006). ProCurve Identity Driven Manager (2007) http://www.hp.com/rnd/ products/management/idm/overview.htm

  8. Twycoss, J., Williamson, M.: Implementing and Testing a Virus Throttle. In: Proceedings 12th USENIX Security Symposium, Washington (2003)

    Google Scholar 

  9. Wikipedia. SQL Slammer (2007), http://en.wikipedia.org/wiki/SQL_Slammer

  10. HP ProCurve 5300xl switches — datasheet (2007), http://www.hp.com/rnd/products/ switches/switch5300xlseries/overview.htm

  11. Noll, L.C., Fowler-Noll-Vo (FNV) hash webpage (2007), http://www.isthe.com/ chongo/tech/comp/fnv/index.html

  12. InMon (2007) sFlow technology website. http://www.inmon.com/technology/index.php

  13. HP ProCurve 5400zl/3400yl — datasheets (2007), http://www.hp.com/rnd/products/ switches/ProCurve_Switch_3500yl-5400zl_Series/overview.htm

  14. HP ProCurve Wireless Edge Services xl Module — datasheet (2007), http://www.hp.com/ rnd/pdfs/datasheets/ProCurve_Wireless_Edge_Services_xl_Module.pdf

  15. HP ProCurve Wireless Access Point 530 — datasheet (2007), http://www.hp.com/rnd/pdfs/ datasheets/ProCurve_Access_Point_530.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sanchez, M. (2007). Virus Throttle as Basis for ProActive Defense. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds) Computer Network Security. MMM-ACNS 2007. Communications in Computer and Information Science, vol 1. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73986-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73986-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73985-2

  • Online ISBN: 978-3-540-73986-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics