Sciweavers

1447 search results - page 22 / 290
» Simulating Internet Worms
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
A Failure to Learn from the Past
On the evening of 2 November 1988, someone “infected” the Internet with a worm program. That program exploited flaws in utility programs in systems based on BSD-derived versi...
Eugene H. Spafford
DMIN
2006
111views Data Mining» more  DMIN 2006»
14 years 11 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
NDSS
2005
IEEE
15 years 3 months ago
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have become synonymous. This connection, while necessary,...
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose ...
IMC
2004
ACM
15 years 3 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
AIMS
2007
Springer
15 years 3 months ago
Malware Models for Network and Service Management
Different kinds of malware like the botnets and the worms are a main threat on Internet for the current and future. Their efficiency to control systems is proved and we are invest...
Jérôme François, Radu State, O...