Sciweavers

134 search results - page 2 / 27
» Experiences with worm propagation simulations
Sort
View
INFOCOM
2005
IEEE
13 years 12 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
IPCCC
2006
IEEE
14 years 9 days ago
Automatically deducing propagation sequences that circumvent a collaborative worm defense
We present an approach to the question of evaluating worm defenses against future, yet unseen and possibly defense-aware worm behavior. Our scheme employs model checking to produc...
Linda Briesemeister, Phillip A. Porras
WORM
2004
13 years 7 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
ACSAC
2006
IEEE
14 years 10 days ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 6 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong