IEEE Security and Privacy
The Blaster Worm: Then and Now
IEEE Security and Privacy
Proceedings of the 2005 ACM workshop on Rapid malcode
Quorum sensing on mobile ad-hoc networks
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Theoretical Computer Science
Implementing and testing a virus throttle
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Ant system: optimization by a colony of cooperating agents
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Hi-index | 0.00 |
Random-scanning worms can be adapted, without a complex overlay control network, to stop their scanning activity once a certain percentage of all vulnerable hosts have been infected. This modification makes a worm more difficult to detect for a defender. This paper examines the theoretical concept of a perfect self-stopping algorithm, and discusses some of the limitations of Ma et al.'s Sum-Count-X self-stopping mechanism [7]. An alternative self-stopping mechanism based on the bacterial mechanism of quorum sensing [4] is suggested, and its feasibility is explored via simulation. Possible counter-measures to this new mechanism are also discussed