Sciweavers

247 search results - page 3 / 50
» Worm anatomy and model
Sort
View
PADS
2005
ACM
13 years 11 months ago
Microscopic Simulation of a Group Defense Strategy
We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other a...
Linda Briesemeister, Phillip A. Porras
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 5 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
ACSAC
2004
IEEE
13 years 9 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
DSN
2005
IEEE
13 years 11 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
COMCOM
2008
135views more  COMCOM 2008»
13 years 5 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan