• Corpus ID: 3263929

Computer Network Worms Propagation and its Defence Mechanisms: A Survey

  title={Computer Network Worms Propagation and its Defence Mechanisms: A Survey},
  author={S. Divya and G. Padmavathi},
Information security is one of the major concerns for military, government, civil and commercial organizations and security risk has been immensely raised on the internet access. Self-duplicating, self-propagating malicious codes known as worms spread themselves without any human interaction and launch the most destructive attacks against networks and cause high security risks. Increasing threats from worms in the network continue to be a challenging task to detect and handle. Various worms… 
1 Citations

Figures and Tables from this paper

Behavioral Modeling of Malicious Objects in a Highly Infected Network Under Quarantine Defence

The Basic reproduction number R0 is established, which explicitly brings out the stability conditions, and shows that if R0< 1 then the infected nodes ceases the spreading of malicious code in computer network as it dies down and consequently establishes the asymptotically stable, when R0> 1, the alternative aspect is that infected nodes stretch out into the network and becomes asymPTotically unstable.



A survey of internet worm detection and containment

The current methods used to slow down or stop the spread of worms are explored and the remaining challenges of worm detection and future research directions are pointed out.

An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks

Experimental results indicate that the proposed system exhibits high detection rates with low false alarm rates, and an efficient signature-based method is proposed for automatic detection of worms over large-scale networks.

Concept, Characteristics and Defending Mechanism of Worms

The characteristics of Internet worms are identified in terms of their target finding strategy, propagation method and anti-detection capability, and state-of-the-art worm detection and worm containment schemes are explored.

Vigilante: end-to-end containment of internet worms

Vigilante, a new end-to-end approach to contain worms automatically that addresses limitations of network-level techniques, can automatically contain fast-spreading worms that exploit unknown vulnerabilities without blocking innocuous traffic.

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis

This paper introduces a game-theoretic formulation to model the interaction between the worm propagator and the defender, and shows that an effective integration of multiple countermeasure schemes is critical for defending against self-disciplinary worms.

Containment of network worms via per-process rate-limiting

A per-process-based containment framework in each host that monitors the fine-grained runtime behavior of each process and accordingly assigns the process a suspicion level generated by a machine-learning algorithm is proposed, and a heuristic to optimally map each suspicion level to the rate-limiting threshold is developed.

An Analytical Survey of Recent Worm Attacks

This paper is meant to provide malware researchers with well-documented information of some worms that caused havoc during the said period including code red, slammer, and conficker.

Worm detection, early warning and response based on local victim information

A simple two-phase local worm victim detection algorithm, DSC (Destination-Source Correlation), is proposed based on worm behavior in terms of both infection pattern and scanning pattern, which can detect zero-day scanning worms with a high detection rate and very low false positive rate.

Computer Worm Classification

International Journal of computer Science and Information Security (IJCSIS) Vol 10, No. 4 April 2012 http://www.docstoc.com/docs/120578906/Computer-Worm-Classification