IEEE Spectrum
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Modeling the effects of timing parameters on virus propagation
Proceedings of the 2003 ACM workshop on Rapid malcode
Hi-index | 0.00 |
Worms can spread in an automated fashion and can flood the internet in a very short time. It has become one of the major threats to the security of the Internet. A new worm model that simulates the ongoing worm activities on the Internet will greatly contribute to the security management of modern networks. In this paper we propose a new worm model that accounts for the levels of locality. Based on the two-factor model, we derive a stratified two-factor model called ETwo-Factor model. The advantage of this model is an improved two-factor model to simulate the worm propagation on the stratified network. Simulations and numerical solutions of the ETwo-Factor model can reflect the worm propagation (such as Code Red II) better than other previous models do.