PEPA models of Internet worm attacks Jane Hillston. LFCS, - - PowerPoint PPT Presentation

pepa models of internet worm attacks
SMART_READER_LITE
LIVE PREVIEW

PEPA models of Internet worm attacks Jane Hillston. LFCS, - - PowerPoint PPT Presentation

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions PEPA models of Internet worm attacks Jane Hillston. LFCS, University of Edinburgh 8th September 2005 Joint work with Jeremy Bradley and Stephen


slide-1
SLIDE 1

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA models of Internet worm attacks

Jane Hillston. LFCS, University of Edinburgh 8th September 2005 Joint work with Jeremy Bradley and Stephen Gilmore

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-2
SLIDE 2

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-3
SLIDE 3

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-4
SLIDE 4

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-5
SLIDE 5

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

◮ They results in substantive loss of revenue each year as well as

shaking user confidence.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-6
SLIDE 6

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

◮ They results in substantive loss of revenue each year as well as

shaking user confidence.

◮ The analogy with the spread of real-organism diseases is easy

to see.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-7
SLIDE 7

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

◮ They results in substantive loss of revenue each year as well as

shaking user confidence.

◮ The analogy with the spread of real-organism diseases is easy

to see.

◮ Inspired by the work of others, we have chosen to model such

spread with a process algebra

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-8
SLIDE 8

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

◮ They results in substantive loss of revenue each year as well as

shaking user confidence.

◮ The analogy with the spread of real-organism diseases is easy

to see.

◮ Inspired by the work of others, we have chosen to model such

spread with a process algebra

◮ ...incorporating timing aspects with actions with duration and

scalability by mapping to ODEs.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-9
SLIDE 9

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Epidemiology

◮ Internet-based computer infections (worms, viruses, etc) are a

major concern, particularly to industry.

◮ They results in substantive loss of revenue each year as well as

shaking user confidence.

◮ The analogy with the spread of real-organism diseases is easy

to see.

◮ Inspired by the work of others, we have chosen to model such

spread with a process algebra

◮ ...incorporating timing aspects with actions with duration and

scalability by mapping to ODEs.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-10
SLIDE 10

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-11
SLIDE 11

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L

PREFIX:

(α, r).S designated first action

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-12
SLIDE 12

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L

PREFIX:

(α, r).S designated first action

CHOICE:

S + S competing components (race policy)

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-13
SLIDE 13

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L

PREFIX:

(α, r).S designated first action

CHOICE:

S + S competing components (race policy)

CONSTANT:

A

def

= S assigning names

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-14
SLIDE 14

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L

PREFIX:

(α, r).S designated first action

CHOICE:

S + S competing components (race policy)

CONSTANT:

A

def

= S assigning names

COOPERATION:

P ✄

L P

α / ∈ L concurrent activity (individual actions ) α ∈ L cooperative activity (shared actions)

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-15
SLIDE 15

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

PEPA

S ::= (α, r).S | S + S | A P ::= S | P ✄

L P | P/L

PREFIX:

(α, r).S designated first action

CHOICE:

S + S competing components (race policy)

CONSTANT:

A

def

= S assigning names

COOPERATION:

P ✄

L P

α / ∈ L concurrent activity (individual actions ) α ∈ L cooperative activity (shared actions)

HIDING:

P/L abstraction α ∈ L ⇒ α → τ

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-16
SLIDE 16

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-17
SLIDE 17

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-18
SLIDE 18

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL ✲ SOS rules

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-19
SLIDE 19

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL LABELLED TRANSITION SYSTEM ✲ SOS rules

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-20
SLIDE 20

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL LABELLED TRANSITION SYSTEM ✲ ✲ SOS rules state transition diagram

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-21
SLIDE 21

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL LABELLED TRANSITION SYSTEM CTMC Q ✲ ✲ SOS rules state transition diagram

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-22
SLIDE 22

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL LABELLED TRANSITION SYSTEM CTMC Q ✲ ✲ SOS rules state transition diagram

The states of the CTMC are the distinct syntactic terms which the model may evolve to.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-23
SLIDE 23

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Generating a CTMC

The corresponding Continuous Time Markov Chain (CTMC) is derived automatically from the structured operational semantics which define the language:

PEPA MODEL LABELLED TRANSITION SYSTEM CTMC Q ✲ ✲ SOS rules state transition diagram

The states of the CTMC are the distinct syntactic terms which the model may evolve to. Solving the model has meant finding the steady state probability distribution over the entire state space.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-24
SLIDE 24

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Timed Synchronisation

◮ The issue of what it means for two timed activities to

synchronise is a vexed one....

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-25
SLIDE 25

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Timed Synchronisation

◮ The issue of what it means for two timed activities to

synchronise is a vexed one....

P

1

r1 s 1 P

2

r2 s 2 s? r?

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-26
SLIDE 26

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Timed Synchronisation

◮ The issue of what it means for two timed activities to

synchronise is a vexed one....

P

1

r1 s 1 P

2

r2 s 2 r1 s 1 r2 s 2 s = max(s , s )

1 2

Barrier Synchronisation

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-27
SLIDE 27

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Timed Synchronisation

◮ The issue of what it means for two timed activities to

synchronise is a vexed one....

P

1

r1 s 1 P

2

r2 s 2 r1 s 1 r2 s 2 s = max(s , s )

1 2

s is no longer exponentially distributed

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-28
SLIDE 28

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Timed Synchronisation

◮ The issue of what it means for two timed activities to

synchronise is a vexed one....

P

1

r1 s 1 P

2

r2 s 2 r1 s 1 r2 s 2

1 2

r = min(r , r )

bounded capacity: new rate is the minimum of the rates

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-29
SLIDE 29

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Cooperation in PEPA

◮ In PEPA each component has a bounded capacity to carry out

activities of any particular type, determined by the apparent rate for that type.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-30
SLIDE 30

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Cooperation in PEPA

◮ In PEPA each component has a bounded capacity to carry out

activities of any particular type, determined by the apparent rate for that type.

◮ Synchronisation, or cooperation cannot make a component

exceed its bounded capacity.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-31
SLIDE 31

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Cooperation in PEPA

◮ In PEPA each component has a bounded capacity to carry out

activities of any particular type, determined by the apparent rate for that type.

◮ Synchronisation, or cooperation cannot make a component

exceed its bounded capacity.

◮ Thus the apparent rate of a cooperation is the minimum of

the apparent rates of the co-operands.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-32
SLIDE 32

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-33
SLIDE 33

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-34
SLIDE 34

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-35
SLIDE 35

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible — it is removed from the infection.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-36
SLIDE 36

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible — it is removed from the infection.

◮ In the second model we consider the situation when this patch

is not permanent, thus allowing the possibility of reinfection.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-37
SLIDE 37

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible — it is removed from the infection.

◮ In the second model we consider the situation when this patch

is not permanent, thus allowing the possibility of reinfection.

◮ The model considers a worm which instigates a distributed

denial of service attack

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-38
SLIDE 38

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible — it is removed from the infection.

◮ In the second model we consider the situation when this patch

is not permanent, thus allowing the possibility of reinfection.

◮ The model considers a worm which instigates a distributed

denial of service attack — an infected computer, which has not been patched, may either infect another computer or launch an attack on a pre-defined victim computer.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-39
SLIDE 39

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Internet worm models

We consider three distinct models, taking alternative views of what happens after a computer has been infected.

◮ In the first model we assume that a patch is applied with the

result that the infected machine is no longer infected or susceptible — it is removed from the infection.

◮ In the second model we consider the situation when this patch

is not permanent, thus allowing the possibility of reinfection.

◮ The model considers a worm which instigates a distributed

denial of service attack — an infected computer, which has not been patched, may either infect another computer or launch an attack on a pre-defined victim computer. In all the models we assume that the infection must pass over a network, which can sustain M independent concurrent connections.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-40
SLIDE 40

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1

The Susceptible-Infective-Removed model. S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[N] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-41
SLIDE 41

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1

The Susceptible-Infective-Removed model. S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[N] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-42
SLIDE 42

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1

The Susceptible-Infective-Removed model. S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[N] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-43
SLIDE 43

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2

The Susceptible-Infective-Removed-Reinfection model. S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = (unsecure, µ).S Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[100] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-44
SLIDE 44

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2

The Susceptible-Infective-Removed-Reinfection model. S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = (unsecure, µ).S Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[100] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-45
SLIDE 45

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3

The Susceptible-Infective-Removed-Attack model. S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-46
SLIDE 46

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3

The Susceptible-Infective-Removed-Attack model. S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-47
SLIDE 47

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3

The Susceptible-Infective-Removed-Attack model. S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-48
SLIDE 48

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3

The Susceptible-Infective-Removed-Attack model. S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-49
SLIDE 49

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3

The Susceptible-Infective-Removed-Attack model. S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-50
SLIDE 50

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-51
SLIDE 51

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Performance evaluation: new mathematical structures

For a generation, performance modellers have seen their choices as being:

◮ Closed form analytical models;

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-52
SLIDE 52

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Performance evaluation: new mathematical structures

For a generation, performance modellers have seen their choices as being:

◮ Closed form analytical models; ◮ Simulations; or

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-53
SLIDE 53

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Performance evaluation: new mathematical structures

For a generation, performance modellers have seen their choices as being:

◮ Closed form analytical models; ◮ Simulations; or ◮ Numerical solution of continuous time Markov chains (CTMC)

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-54
SLIDE 54

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Performance evaluation: new mathematical structures

For a generation, performance modellers have seen their choices as being:

◮ Closed form analytical models; ◮ Simulations; or ◮ Numerical solution of continuous time Markov chains (CTMC)

The major limitations of the CTMC approach are the state space explosion problem and the reliance on exponential distributions.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-55
SLIDE 55

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

New mathematical structures: differential equations

◮ Use a more abstract state representation rather than the

CTMC complete state space.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-56
SLIDE 56

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

New mathematical structures: differential equations

◮ Use a more abstract state representation rather than the

CTMC complete state space.

◮ No longer aim to calculate the probability distribution over

the entire state space of the model.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-57
SLIDE 57

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

New mathematical structures: differential equations

◮ Use a more abstract state representation rather than the

CTMC complete state space.

◮ No longer aim to calculate the probability distribution over

the entire state space of the model.

◮ Assume that these state variables are subject to continuous

rather than discrete change.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-58
SLIDE 58

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

New mathematical structures: differential equations

◮ Use a more abstract state representation rather than the

CTMC complete state space.

◮ No longer aim to calculate the probability distribution over

the entire state space of the model.

◮ Assume that these state variables are subject to continuous

rather than discrete change. Only appropriate for some models, but results are promising in those cases.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-59
SLIDE 59

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

New mathematical structures: differential equations

◮ Use a more abstract state representation rather than the

CTMC complete state space.

◮ No longer aim to calculate the probability distribution over

the entire state space of the model.

◮ Assume that these state variables are subject to continuous

rather than discrete change. Only appropriate for some models, but results are promising in those cases. large numbers of repeated components

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-60
SLIDE 60

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ In a PEPA model the state at any current time is the local

derivative or state of each component of the model.

◮ When we have large numbers of repeated components it can

make sense to represent the state of the system as the count

  • f the current number of each possible local derivative or

component type.

◮ We can approximate the behaviour of the model by treating

the number of each component type as a continuous variable, and the state of the model as a whole as the set of such variables.

◮ The evolution of each such variable can then be described by

an ordinary differential equation (assuming rates are deterministic).

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-61
SLIDE 61

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ In a PEPA model the state at any current time is the local

derivative or state of each component of the model.

◮ When we have large numbers of repeated components it can

make sense to represent the state of the system as the count

  • f the current number of each possible local derivative or

component type.

◮ We can approximate the behaviour of the model by treating

the number of each component type as a continuous variable, and the state of the model as a whole as the set of such variables.

◮ The evolution of each such variable can then be described by

an ordinary differential equation (assuming rates are deterministic).

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-62
SLIDE 62

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ In a PEPA model the state at any current time is the local

derivative or state of each component of the model.

◮ When we have large numbers of repeated components it can

make sense to represent the state of the system as the count

  • f the current number of each possible local derivative or

component type.

◮ We can approximate the behaviour of the model by treating

the number of each component type as a continuous variable, and the state of the model as a whole as the set of such variables.

◮ The evolution of each such variable can then be described by

an ordinary differential equation (assuming rates are deterministic).

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-63
SLIDE 63

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ In a PEPA model the state at any current time is the local

derivative or state of each component of the model.

◮ When we have large numbers of repeated components it can

make sense to represent the state of the system as the count

  • f the current number of each possible local derivative or

component type.

◮ We can approximate the behaviour of the model by treating

the number of each component type as a continuous variable, and the state of the model as a whole as the set of such variables.

◮ The evolution of each such variable can then be described by

an ordinary differential equation (assuming rates are deterministic).

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-64
SLIDE 64

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ The PEPA definitions of the component specify the activities

which can increase or decrease the number of components exhibited in the current state.

◮ The cooperations show when the number of instances of

another component will have an influence on the evolution of this component.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-65
SLIDE 65

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ The PEPA definitions of the component specify the activities

which can increase or decrease the number of components exhibited in the current state.

◮ The cooperations show when the number of instances of

another component will have an influence on the evolution of this component.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-66
SLIDE 66

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Differential equations from PEPA models

◮ The PEPA definitions of the component specify the activities

which can increase or decrease the number of components exhibited in the current state.

◮ The cooperations show when the number of instances of

another component will have an influence on the evolution of this component. Derivation of the system of ODES representing the PEPA model then proceeds via an activity matrix which keeps track of the impact of each activity type on each component type.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-67
SLIDE 67

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-68
SLIDE 68

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: Susceptible-Infective-Removed model

S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[N] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-69
SLIDE 69

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Which form of synchronisation?

In this model (and the others) the cooperations are all of the form active-passive, i.e. one component governs the rate of the activity and the other just passively witnesses the activity.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-70
SLIDE 70

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Which form of synchronisation?

In this model (and the others) the cooperations are all of the form active-passive, i.e. one component governs the rate of the activity and the other just passively witnesses the activity. These cooperations each involve the network and we assume that a computer (susceptible or invective) can attach to any of the available network connections.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-71
SLIDE 71

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Which form of synchronisation?

In this model (and the others) the cooperations are all of the form active-passive, i.e. one component governs the rate of the activity and the other just passively witnesses the activity. These cooperations each involve the network and we assume that a computer (susceptible or invective) can attach to any of the available network connections. In terms of Jeremy’s classification yesterday, this means we use the passive synchronisation scheme in the ODEs.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-72
SLIDE 72

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Mapping to an ODE

dv11(t) dt = −βI11(t)v22(t) dv12(t) dt = −γv12(t) + βI11(t)v22(t) dv13(t) dt = γv12(t) dv21(t) dt = −βI21(t)v12(t) + βI11(t)v22(t) dv22(t) dt = −βI11(t)v22(t) + βI21(t)v12(t) where v11 ↔ S, v12 ↔ I, v13 ↔ R, v21 ↔ Net, v22 ↔ net′.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-73
SLIDE 73

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Mapping to an ODE

dv11(t) dt = −βI11(t)v22(t) dv12(t) dt = −γv12(t) + βI11(t)v22(t) dv13(t) dt = γv12(t) dv21(t) dt = −βI21(t)v12(t) + βI11(t)v22(t) dv22(t) dt = −βI11(t)v22(t) + βI21(t)v12(t) where v11 ↔ S, v12 ↔ I, v13 ↔ R, v21 ↔ Net, v22 ↔ net′.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-74
SLIDE 74

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: experiments

We assume a susceptible population of N = 1000 computers and a network capable of sustaining up to M = 200 simultaneous concurrent connections.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-75
SLIDE 75

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: experiments

We assume a susceptible population of N = 1000 computers and a network capable of sustaining up to M = 200 simultaneous concurrent connections. We assume that the system starts with one infected computer.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-76
SLIDE 76

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: experiments

We assume a susceptible population of N = 1000 computers and a network capable of sustaining up to M = 200 simultaneous concurrent connections. We assume that the system starts with one infected computer. In the first experiment we varied the rate at which the patch is applied, γ, representing different (human) response rates to the infection.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-77
SLIDE 77

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: γ = 0.1

200 400 600 800 1000 10 20 30 40 50 60 Number Time, t Worm infection dynamics for gamma=0.1 Infected machines Network connections Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-78
SLIDE 78

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: γ = 0.8

200 400 600 800 1000 10 20 30 40 50 60 70 80 Number Time, t Worm infection dynamics for gamma=0.8 Infected machines Network connections Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-79
SLIDE 79

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 1: Number of infected machines as γ increases

200 400 600 800 1000 10 20 30 40 50 60 70 80 Number Time, t Infected machines for different values of gamma gamma=0.1 gamma=0.4 gamma=0.8 Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-80
SLIDE 80

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: Susceptible-Infective-Removed-Reinfection model

S = (infectS, ⊤).I I = (infectI, β).I + (patch, γ).R R = (unsecure, µ).S Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net Sys = (S[N] || I) ✄

L Net[M]

where L = {infectI, infectS}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-81
SLIDE 81

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Mapping to an ODE

dv11(t) dt = −βI11(t)v22(t) + µv13(t) dv12(t) dt = −γv12(t) + βI11(t)v22(t) dv13(t) dt = −µv13(t) + γv12(t) dv21(t) dt = −βI21(t)v12(t) + βI11(t)v22(t) dv22(t) dt = −βI11(t)v22(t) + βI21(t)v12(t) where v11 ↔ S, v12 ↔ I, v13 ↔ R, v21 ↔ Net, v22 ↔ net′.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-82
SLIDE 82

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: experiments

We assume a susceptible population of N = 1000 computers.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-83
SLIDE 83

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: experiments

We assume a susceptible population of N = 1000 computers. We assume that the system starts with one infected computer.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-84
SLIDE 84

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: experiments

We assume a susceptible population of N = 1000 computers. We assume that the system starts with one infected computer. In this experiment we varied the network capacity, i.e. M. This restricts the medium over which the infection is transmitted.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-85
SLIDE 85

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: N = 250

200 400 600 800 1000 5 10 15 20 25 30 35 40 Number Time, t Worm infection dynamics for N=250 Infected machines Network connections Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-86
SLIDE 86

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 2: N = 50

200 400 600 800 1000 10 20 30 40 50 60 Number Time, t Worm infection dynamics for N=50 Infected machines Network connections Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-87
SLIDE 87

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: Susceptible-Infective-Removed-Attack model

S = (infectS, ⊤).I I = (infectI, β).I + (attack, λ).I + (patch, γ).R R = stop Net = (infectI, ⊤).Net′ Net′ = (infectS, β).Net A = (attack, ⊤).A′ A′ = (recover, µ).A Sys = ((S[N] || I) ✄

L Net[M]) ✄

L′ A[T]

where L = {infectI, infectS}, L′ = {attack}.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-88
SLIDE 88

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Mapping to an ODE

dv11(t) dt = −βI11(t)v22(t) dv12(t) dt = −γv12(t) + βI11(t)v22(t) dv13(t) dt = γv12(t) dv21(t) dt = −βI21(t)v12(t) + βI11(t)v22(t) dv22(t) dt = −βI11(t)v22(t) + βI21(t)v12(t) dv31(t) dt = −λI31(t)v12(t) + v32(t)µ dv32(t) dt = −v32(t)µ + λI31(t)v12(t) v11 ↔ S, v12 ↔ I, v13 ↔ R, v21 ↔ Net, v22 ↔ net′, v31 ↔ A, v32 ↔ A′.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-89
SLIDE 89

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: experiments

We assume a susceptible population of N = 1000 computers, a network capacity of M = 200

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-90
SLIDE 90

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: experiments

We assume a susceptible population of N = 1000 computers, a network capacity of M = 200 We assume that the system starts with one infected computer, and that the target of the attack has 100 ports on which it can accept connections.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-91
SLIDE 91

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: experiments

We assume a susceptible population of N = 1000 computers, a network capacity of M = 200 We assume that the system starts with one infected computer, and that the target of the attack has 100 ports on which it can accept connections. In this experiment we varied the rate µ at which a port timeouts and becomes usable again in the attacked machine.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-92
SLIDE 92

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: µ = 0.25

200 400 600 800 1000 10 20 30 40 50 60 Number Time, t Worm infection dynamics for mu=0.25 Attacked port connections Infected machines Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-93
SLIDE 93

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Model 3: µ = 1.8

200 400 600 800 1000 5 10 15 20 25 30 35 40 Number Time, t Worm infection dynamics for mu=1.8 Attacked port connections Infected machines Susceptible machines Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-94
SLIDE 94

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Outline

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-95
SLIDE 95

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Conclusions

ODEs are great!

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-96
SLIDE 96

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Conclusions

ODEs are great!

◮ We could evaluate small systems using the CTMC semantics

but not with realistic populations

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-97
SLIDE 97

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Conclusions

ODEs are great!

◮ We could evaluate small systems using the CTMC semantics

but not with realistic populations

◮ We could construct the ODEs directly (eg. [Nicol et al]) but

using the process algebra gives a more accessible model, and

  • ne which is amenable to other analyses such as model

checking.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks

slide-98
SLIDE 98

Introduction Internet worm models Continuous Approximation Quantified analysis Conclusions

Conclusions

ODEs are great!

◮ We could evaluate small systems using the CTMC semantics

but not with realistic populations

◮ We could construct the ODEs directly (eg. [Nicol et al]) but

using the process algebra gives a more accessible model, and

  • ne which is amenable to other analyses such as model

checking.

◮ For these models there are still many experiments to be

considered and variations to the models which could be made.

Jane Hillston. LFCS, University of Edinburgh. PEPA models of Internet worm attacks