Sciweavers

19 search results - page 2 / 4
» Encounter-based worms: Analysis and Defense
Sort
View
WORM
2004
13 years 6 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
SPRINGSIM
2007
13 years 6 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...
CORR
2007
Springer
94views Education» more  CORR 2007»
13 years 5 months ago
Encounter-based worms: Analysis and Defense
Sapon Tanachaiwiwat, Ahmed Helmy
CN
2007
137views more  CN 2007»
13 years 5 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
13 years 11 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu