Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
ESEC '89 Proceedings of the 2nd European Software Engineering Conference
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Predators: good will mobile codes combat against computer viruses
Proceedings of the 2002 workshop on New security paradigms
Ethical guidelines for computer security researchers: "Be reasonable"
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Hi-index | 0.00 |
A new approach to fight against Internet worms through the use the worm-killing worm has been presented. This paper attempts to model the interaction between the two worms using the divide-and-conquer strategy. We extends the idea of the killer-worm and divide it into three basic types. 1) Patching type: It only installs the patches on the susceptible machines; 2) Predator type: It only kills the worm (it may also patch the infected machines); 3) Composition type: It does both the jobs. The state transition diagram of the two worms and a mathematical model for every type are given. The results by dynamic simulation with the help of MATLAB are obtained.