Sciweavers

198 search results - page 3 / 40
» Effective worm detection for various scan techniques
Sort
View
PADS
2005
ACM
14 years 4 months ago
Microscopic Simulation of a Group Defense Strategy
We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other a...
Linda Briesemeister, Phillip A. Porras
PDP
2009
IEEE
14 years 5 months ago
BitTorrent Worm Sensor Network : P2P Worms Detection and Containment
- Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting th...
Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabda...
NSDI
2008
14 years 1 months ago
Catching Instant Messaging Worms with Change-Point Detection Techniques
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and viruses that ...
Guanhua Yan, Zhen Xiao, Stephan Eidenbenz
USS
2004
14 years 3 days ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
ITIIS
2010
131views more  ITIIS 2010»
13 years 9 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...