Computer Network Worms Propagation and its Defence Mechanisms: A Survey
@inproceedings{Divya2014ComputerNW, title={Computer Network Worms Propagation and its Defence Mechanisms: A Survey}, author={S. Divya and G. Padmavathi}, year={2014} }
Information security is one of the major concerns for military, government, civil and commercial organizations and security risk has been immensely raised on the internet access. Self-duplicating, self-propagating malicious codes known as worms spread themselves without any human interaction and launch the most destructive attacks against networks and cause high security risks. Increasing threats from worms in the network continue to be a challenging task to detect and handle. Various worms…
One Citation
Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence
- Mathematics, Computer ScienceInt. J. Inf. Secur. Priv.
- 2019
The Basic reproduction number R0 is established, which explicitly brings out the stability conditions, and shows that if R0< 1 then the infected nodes ceases the spreading of malicious code in computer network as it dies down and consequently establishes the asymptotically stable, when R0> 1, the alternative aspect is that infected nodes stretch out into the network and becomes asymPTotically unstable.
References
SHOWING 1-10 OF 18 REFERENCES
A survey of internet worm detection and containment
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2008
The current methods used to slow down or stop the spread of worms are explored and the remaining challenges of worm detection and future research directions are pointed out.
An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks
- Computer Science, Business2006 IEEE International Conference on Communications
- 2006
Experimental results indicate that the proposed system exhibits high detection rates with low false alarm rates, and an efficient signature-based method is proposed for automatic detection of worms over large-scale networks.
Concept, Characteristics and Defending Mechanism of Worms
- Computer ScienceIEICE Trans. Inf. Syst.
- 2009
The characteristics of Internet worms are identified in terms of their target finding strategy, propagation method and anti-detection capability, and state-of-the-art worm detection and worm containment schemes are explored.
Vigilante: end-to-end containment of internet worms
- Computer ScienceSOSP '05
- 2005
Vigilante, a new end-to-end approach to contain worms automatically that addresses limitations of network-level techniques, can automatically contain fast-spreading worms that exploit unknown vulnerabilities without blocking innocuous traffic.
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis
- Computer ScienceIEEE Transactions on Parallel and Distributed Systems
- 2010
This paper introduces a game-theoretic formulation to model the interaction between the worm propagator and the defender, and shows that an effective integration of multiple countermeasure schemes is critical for defending against self-disciplinary worms.
Characterizing and defending against divide-conquer-scanning worms
- Computer ScienceComput. Networks
- 2010
Containment of network worms via per-process rate-limiting
- Computer ScienceSecureComm
- 2008
A per-process-based containment framework in each host that monitors the fine-grained runtime behavior of each process and accordingly assigns the process a suspicion level generated by a machine-learning algorithm is proposed, and a heuristic to optimally map each suspicion level to the rate-limiting threshold is developed.
An Analytical Survey of Recent Worm Attacks
- Computer Science
- 2011
This paper is meant to provide malware researchers with well-documented information of some worms that caused havoc during the said period including code red, slammer, and conficker.
Worm detection, early warning and response based on local victim information
- Computer Science20th Annual Computer Security Applications Conference
- 2004
A simple two-phase local worm victim detection algorithm, DSC (Destination-Source Correlation), is proposed based on worm behavior in terms of both infection pattern and scanning pattern, which can detect zero-day scanning worms with a high detection rate and very low false positive rate.
Computer Worm Classification
- Computer Science
- 2012
International Journal of computer Science and Information Security (IJCSIS) Vol 10, No. 4 April 2012
http://www.docstoc.com/docs/120578906/Computer-Worm-Classification