Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
On computer viral infection and the effect of immunization
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Building Diverse Computer Systems
HOTOS '97 Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Proceedings of the 2004 ACM workshop on Rapid malcode
On achieving software diversity for improved network security using distributed coloring algorithms
Proceedings of the 11th ACM conference on Computer and communications security
Worm propagation modeling and analysis based on quarantine
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
ACM Transactions on Information and System Security (TISSEC)
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
IEEE/ACM Transactions on Networking (TON)
Heterogeneous Protection in Regular and Complete Bi-partite Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
A New Metric for Robustness with Respect to Virus Spread
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Defending against the propagation of active worms
The Journal of Supercomputing
Worm propagation modeling based on two-factor model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
An approach for classifying internet worms based on temporal behaviors and packet flows
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Modeling the propagation of Peer-to-Peer worms
Future Generation Computer Systems
Fast quarantining of proactive worms in unstructured P2P networks
Journal of Network and Computer Applications
The probability model of peer-to-peer botnet propagation
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Model and estimation of worm propagation under network partition
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Empirical analysis of rate limiting mechanisms
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Bifurcation analysis of a model for network worm propagation with time delay
Mathematical and Computer Modelling: An International Journal
Toward early warning against Internet worms based on critical-sized networks
Security and Communication Networks
Hi-index | 0.00 |
In this paper, we investigate epidemiological models to reason about computer viral propagation. We extend the classical homogeneous models to incorporate two timing parameters: Infection delay and user vigilance. We show that these timing parameters greatly influence the propagation of viral epidemics, and that the explicit treatment of these parameters gives rise to a more realistic and accurate propagation model. We validate the new model with simulation analysis.