Sciweavers

1447 search results - page 8 / 290
» Simulating Internet Worms
Sort
View
IJISEC
2006
119views more  IJISEC 2006»
14 years 9 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
USS
2004
14 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
INFOCOM
2005
IEEE
15 years 3 months ago
Defending against Internet worms: a signature-based approach
Abstract— With the capability of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. The defense against Internet worms is largely an open p...
Yong Tang, Shigang Chen
DISCEX
2003
IEEE
15 years 2 months ago
Cooperative Response Strategies for Large Scale Attack Mitigation
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with others using a...
D. Nojiri, Jeff Rowe, Karl N. Levitt
PADS
2005
ACM
15 years 3 months ago
Microscopic Simulation of a Group Defense Strategy
We introduce a novel worm containment strategy that integrates two complementary worm quarantine techniques. The two techniques are linked, with one strategy employing the other a...
Linda Briesemeister, Phillip A. Porras