Sciweavers

216 search results - page 1 / 44
» Modeling and Automated Containment of Worms
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Modeling and Automated Containment of Worms
Self-propagating codes, called worms, such as Code Red, Nimda, and Slammer, have drawn significant attention due to their enormous adverse impact on the Internet. There is a grea...
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi
BROADNETS
2007
IEEE
15 years 4 months ago
Computer worm ecology in encounter-based networks
Abstract— Encounter-based network is a frequentlydisconnected wireless ad-hoc network requiring immediate neighbors to store and forward aggregated data for information dissemina...
Sapon Tanachaiwiwat, Ahmed Helmy
USENIX
2008
15 years 14 days ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
100
Voted
INFOCOM
2003
IEEE
15 years 3 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
CN
2007
90views more  CN 2007»
14 years 10 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos