A Revised Benign Worm-Anti-Worm Propagation Model

Article Preview

Abstract:

Due to the proactive defend against the worm propagation and patch the susceptible hosts, benign worms are attracting wide attentions in the worm research. In this paper, we put forward a revised benign worm-anti-worm propagation model to achieve effective containment of worms.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4340-4344

Citation:

Online since:

October 2011

Export:

Price:

[1] D. Seeley, A tour of the worm, in: Proc. USENIX Technical, 1989, p.287–304.

Google Scholar

[2] S. Qing, W. Wen, A survey and trends on Internet worms, Computers & Security vol. 24(4), 2005, pp.334-346.

DOI: 10.1016/j.cose.2004.10.001

Google Scholar

[3] C.C. Zou, W. Gong, D. Towsley, Code Red worm propagation modeling and analysis, in: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 02), (2002).

DOI: 10.1145/586110.586130

Google Scholar

[4] C.C. Zou, D. Towsley, W. Gong, On the performance of Internet worm scanning strategies, Journal of Performance Evaluation vol. 63(7), 2006, pp.700-723.

DOI: 10.1016/j.peva.2005.07.032

Google Scholar

[5] C.C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: Proc. ACM workshop on rapid malcode (WORM 03), Washington, 2003, pp.51-60.

DOI: 10.1145/948187.948197

Google Scholar

[6] S. Staniford, Containment of scanning worm in an enterprise networks, Journal of Computer Security, (2004).

Google Scholar

[7] D.M. Nicol, The impact of stochastic variance on worm propagation and detection, in: Proc. of the 4th ACM workshop on recurring malcode (WORM 06), 2006, pp.57-64.

DOI: 10.1145/1179542.1179555

Google Scholar

[8] J.R.C. Piqueira, A.A. Vasconcelos, C.E.C.J. Gabriel, V.O. Araujo, Dynamic models for computer viruses, Journal Computers & Security vol. 27(7-8), 2008, pp.355-359.

DOI: 10.1016/j.cose.2008.07.006

Google Scholar

[9] C. Frank, C.S. Emre, X. Jun, WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism, in: Proc. ACM CCS Workshop on Rapid Malcode (WORM 04), Washington, USA, 2004, pp.1205-1212.

DOI: 10.1145/1029618.1029631

Google Scholar