Sciweavers

JCS
2011
138views more  JCS 2011»
12 years 7 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...
IEICET
2007
142views more  IEICET 2007»
13 years 4 months ago
Detecting Unknown Worms Using Randomness Check
From the appearance of CodeRed and SQL Slammer worm, we have learned that the early detection of worm epidemics is important to reduce the damage caused by their outbreak. One prom...
Hyundo Park, Heejo Lee, Hyogon Kim
JCSS
2008
159views more  JCSS 2008»
13 years 4 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 4 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant
IWAN
2004
Springer
13 years 10 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
INFOCOM
2005
IEEE
13 years 10 months ago
Defending against Internet worms: a signature-based approach
Abstract— With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open p...
Yong Tang, Shigang Chen