The “worm” programs—early experience with a distributed computation
Communications of the ACM
Code-Red: a case study on the spread and victims of an internet worm
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
IEEE Security and Privacy
On instant messaging worms, analysis and countermeasures
Proceedings of the 2005 ACM workshop on Rapid malcode
The limits of global scanning worm detectors in the presence of background noise
Proceedings of the 2005 ACM workshop on Rapid malcode
Proceedings of the 4th ACM workshop on Recurring malcode
Worm damage minimization in enterprise networks
International Journal of Human-Computer Studies
Short Term and Total Life Impact analysis of email worms in computer systems
Decision Support Systems
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Peer-to-peer botnets: overview and case study
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
User identification based on game-play activity patterns
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
SpyProxy: execution-based detection of malicious web content
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Detecting worm variants using machine learning
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Detection of unknown computer worms based on behavioral classification of the host
Computational Statistics & Data Analysis
Online Tracing Scanning Worm with Sliding Window
Information Security and Cryptology
Assessing anti-phishing preparedness: A study of online banks in Hong Kong
Decision Support Systems
VODKA: Variant objects discovering knowledge acquisition
Expert Systems with Applications: An International Journal
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Improving malware detection by applying multi-inducer ensemble
Computational Statistics & Data Analysis
Information Security Tech. Report
Identification of Malicious Web Pages by Inductive Learning
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Defending against the propagation of active worms
The Journal of Supercomputing
An approach for classifying internet worms based on temporal behaviors and packet flows
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
How to distribute antidote to control epidemics
Random Structures & Algorithms
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Practical experiences with purenet, a self-learning malware prevention system
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Measuring resistance to social engineering
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Prevention of information attacks by run-time detection of self-replication in computer codes
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Self-Aware software – will it become a reality?
Self-star Properties in Complex Information Systems
Using genetic algorithm for network status learning and worm virus detection scheme
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Key factors influencing worm infection in enterprise networks
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Minimizing the TCB for securing SCADA systems
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
E-mail worm detection using the analysis of behavior
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
A graph mining approach for detecting unknown malwares
Journal of Visual Languages and Computing
Cooperative component testing architecture in collaborating network environment
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Measurement and modeling of paging channel overloads on a cellular network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
In this paper, we present a broad overview of recent worm activity. Virus information repositories, such as the Network Associates' Virus Information Library, contain over 4500 different entries (through the first quarter of 2003). While many of these entries are interesting, a great number of them are now simply historical and a large percentage of them are completely derivative in nature. However, these virus information repositories are the best source of material on the breadth of malicious code, including worms.This paper is meant to provide worm researchers with a high-level roadmap to the vast body of virus and worm information. After sifting through hundreds of entries, we present only those that we considered breakthrough or novel, primarily from a technical perspective. As a result, we found ourselves omitting some of the most notorious worms simply because they lacked any original aspects. It is our hope that others in the community who need to get up to speed in the worm literature can benefit from this survey. While this study does not contain any original research, it provides an overview of worms using a truly breadth-first approach, which has been lacking in the existing worm literature.From this raw data, we have also extracted a number of broad quantitative and qualitative trends that we have found to be interesting. We believe that a workshop discussion of these, and other thoughts, will be engaging and informative.