IEEE Spectrum
Fluid-based analysis of a network of AQM routers supporting TCP flows with an application to RED
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Observation and analysis of BGP behavior under stress
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
ESEC '89 Proceedings of the 2nd European Software Engineering Conference
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
On computer viral infection and the effect of immunization
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Countering code-injection attacks with instruction-set randomization
Proceedings of the 10th ACM conference on Computer and communications security
Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
Experiences with worm propagation simulations
Proceedings of the 2003 ACM workshop on Rapid malcode
Proceedings of the 2003 ACM workshop on Rapid malcode
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
Modeling the effects of timing parameters on virus propagation
Proceedings of the 2003 ACM workshop on Rapid malcode
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Proceedings of the 2004 ACM workshop on Rapid malcode
ACT: attachment chain tracing scheme for email virus detection and control
Proceedings of the 2004 ACM workshop on Rapid malcode
Preliminary results using scale-down to explore worm dynamics
Proceedings of the 2004 ACM workshop on Rapid malcode
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Worm propagation modeling and analysis based on quarantine
InfoSecu '04 Proceedings of the 3rd international conference on Information security
An Extensible Platform for Evaluating Security Protocols
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Distributed Worm Simulation with a Realistic Internet Model
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Comparative Study between Analytical Models and Packet-Level Worm Simulations
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
Worm evolution tracking via timing analysis
Proceedings of the 2005 ACM workshop on Rapid malcode
The limits of global scanning worm detectors in the presence of background noise
Proceedings of the 2005 ACM workshop on Rapid malcode
Countering Network Worms Through Automatic Patch Generation
IEEE Security and Privacy
Unwanted traffic in 3G networks
ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review
On the performance of internet worm scanning strategies
Performance Evaluation
On the impact of dynamic addressing on malware propagation
Proceedings of the 4th ACM workshop on Recurring malcode
Puppetnets: misusing web browsers as a distributed attack infrastructure
Proceedings of the 13th ACM conference on Computer and communications security
A realistic simulation of internet-scale events
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Peer to peer networks for defense against internet worms
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Worm damage minimization in enterprise networks
International Journal of Human-Computer Studies
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
WitMeMo '06 Proceedings of the second international workshop on Wireless traffic measurements and modeling
Short Term and Total Life Impact analysis of email worms in computer systems
Decision Support Systems
Effective worm detection for various scan techniques
Journal of Computer Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling and Simulations of TCP MANET Worms
Proceedings of the 21st International Workshop on Principles of Advanced and Distributed Simulation
Exploiting underlying structure for detailed reconstruction of an internet-scale event
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On the effectiveness of distributed worm monitoring
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Fast Worm Containment Using Feedback Control
IEEE Transactions on Dependable and Secure Computing
Defending against hitlist worms using network address space randomization
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
DAW: A Distributed Antiworm System
IEEE Transactions on Parallel and Distributed Systems
Proceedings of the second ACM workshop on Challenged networks
A new worm exploiting IPv4-IPv6 dual-stack networks
Proceedings of the 2007 ACM workshop on Recurring malcode
On the trade-off between speed and resiliency of flashworms and similar malcodes
Proceedings of the 2007 ACM workshop on Recurring malcode
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
Efficient simulation of Internet worms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A model of the spread of randomly scanning Internet worms that saturate access links
ACM Transactions on Modeling and Computer Simulation (TOMACS)
International Journal of Wireless and Mobile Computing
International Journal of Security and Networks
Network externalities and the deployment of security features and protocols in the internet
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Modeling host-based detection and active worm containment
Proceedings of the 11th communications and networking simulation symposium
A local mean field analysis of security investments in networks
Proceedings of the 3rd international workshop on Economics of networked systems
Realistic simulation environments for IP-based networks
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Modeling and Simulation for Security Risk Propagation in Critical Information Systems
Computational Intelligence and Security
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
Fast intrusion detection based on a non-negative matrix factorization model
Journal of Network and Computer Applications
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
ACM Transactions on Information and System Security (TISSEC)
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Principal Components of Port-Address Matrices in Port-Scan Analysis
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Network vaccination architecture
Proceedings of the International Conference on Advances in Computing, Communication and Control
Anti-virus security and robustness of heterogeneous immune static network
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
EpiNet: a simulation framework to study the spread of malware in wireless networks
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Large-scale evaluation of distributed attack detection
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Encounter-based worms: Analysis and defense
Ad Hoc Networks
A hardware platform for efficient worm outbreak detection
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Towards an analytic model of epidemic spreading in heterogeneous systems
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Towards controlling virus propagation in information systems with point-to-group information sharing
Decision Support Systems
Control flow obfuscation with information flow tracking
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
A Proposal of Malware Distinction Method Based on Scan Patterns Using Spectrum Analysis
ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
Defending against the propagation of active worms
The Journal of Supercomputing
Honeypot detection in advanced botnet attacks
International Journal of Information and Computer Security
Modeling the spread of worm epidemics in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Worm propagation modeling based on two-factor model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Proceedings of the 2010 Workshop on Interaction between Compilers and Computer Architecture
A taxonomy of biologically inspired research in computer networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
PolyI-D: polymorphic worm detection based on instruction distribution
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Estimation of behavior of scanners based on ISDAS distributed sensors
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A mathematical view of network-based suppressions of worm epidemics
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Maximum damage malware attack in mobile wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Modeling the propagation of Peer-to-Peer worms
Future Generation Computer Systems
Propagation modeling and analysis of network worm attack
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Carousel: scalable logging for intrusion prevention systems
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Markov random fields for malware propagation: the case of chain networks
IEEE Communications Letters
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Modeling and containment of search worms targeting web applications
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Fast and practical instruction-set randomization for commodity systems
Proceedings of the 26th Annual Computer Security Applications Conference
Vulnerability analysis of high dimensional complex systems
SSS'10 Proceedings of the 12th international conference on Stabilization, safety, and security of distributed systems
Pandora: a platform for worm simulations in mobile ad-hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Inside the permutation-scanning worms: propagation modeling and analysis
IEEE/ACM Transactions on Networking (TON)
Why mobile-to-mobile wireless malware won't cause a storm
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
On detecting active worms with varying scan rate
Computer Communications
Fast quarantining of proactive worms in unstructured P2P networks
Journal of Network and Computer Applications
ACM Transactions on Modeling and Computer Simulation (TOMACS)
The probability model of peer-to-peer botnet propagation
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
A worm propagation model based on people's email acquaintance profiles
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
NGCE – network graphs for computer epidemiologists
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Modeling and analysis of worm and killer-worm propagation using the divide-and-conquer strategy
ICA3PP'05 Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing
Worm propagation modeling and analysis on network
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Anti-worm immunization of web system based on normal model and BP neural network
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Adaptive method for monitoring network and early detection of internet worms
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An anti-worm with balanced tree based spreading strategy
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Design of an on-line intrusion forecast system with a weather forecasting model
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms
QoS-IP'05 Proceedings of the Third international conference on Quality of Service in Multiservice IP Networks
Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Empirical analysis of rate limiting mechanisms
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
A fast static analysis approach to detect exploit code inside network flows
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Detecting unknown worms using randomness check
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Models and analysis of active worm defense
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
ARCS'10 Proceedings of the 23rd international conference on Architecture of Computing Systems
Key factors influencing worm infection in enterprise networks
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A probabilistic approach to estimate the damage propagation of cyber attacks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Bifurcation analysis of a model for network worm propagation with time delay
Mathematical and Computer Modelling: An International Journal
Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Beyond the blacklist: modeling malware spread and the effect of interventions
Proceedings of the 2012 workshop on New security paradigms
What you see predicts what you get—lightweight agent-based malware detection
Security and Communication Networks
Toward early warning against Internet worms based on critical-sized networks
Security and Communication Networks
Maximum damage malware attack in mobile wireless networks
IEEE/ACM Transactions on Networking (TON)
Simulating network cyber attacks using splitting techniques
Proceedings of the Winter Simulation Conference
Simulating non-stationary congestion systems using splitting with applications to cyber security
Proceedings of the Winter Simulation Conference
Modeling computer virus with the BSDE approach
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
Journal of Computer and System Sciences
Global network modelling based on mininet approach.
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking
Hi-index | 0.00 |
The Code Red worm incident of July 2001 has stimulated activities to model and analyze Internet worm propagation. In this paper we provide a careful analysis of Code Red propagation by accounting for two factors: one is the dynamic countermeasures taken by ISPs and users; the other is the slowed down worm infection rate because Code Red rampant propagation caused congestion and troubles to some routers. Based on the classical epidemic Kermack-Mckendrick model, we derive a general Internet worm model called the two-factor worm model. Simulations and numerical solutions of the two-factor worm model match the observed data of Code Red worm better than previous models do. This model leads to a better understanding and prediction of the scale and speed of Internet worm spreading.