Sciweavers

1447 search results - page 18 / 290
» Simulating Internet Worms
Sort
View
AINA
2009
IEEE
15 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
ACSAC
2007
IEEE
15 years 4 months ago
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms
To combat the rapid infection rate of today’s Internet worms, signatures for novel worms must be generated soon after an outbreak. This is especially critical in the case of pol...
Matthew Van Gundy, Hao Chen, Zhendong Su, Giovanni...
ACSAC
2006
IEEE
15 years 1 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
CN
2007
90views more  CN 2007»
14 years 9 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
IMC
2005
ACM
15 years 3 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver