Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
IEEE Security and Privacy
Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
Proceedings of the 2004 ACM workshop on Rapid malcode
A behavioral approach to worm detection
Proceedings of the 2004 ACM workshop on Rapid malcode
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Hi-index | 0.00 |
This paper defines and evaluates a network security system, Rx, inspired by biological epidemiology that defends wireless networks against stealth worms. Rx applies concepts from epidemiology to identify and control worm behavior at the network level by aggregating and processing end-host anomaly reports. The system uses bio-mathematical modeling and demographic analysis to identify, characterize, forecast, and control network stealth worms early in the infection cycle. We present the design of Rx with simulation results that show the system increases by nearly an order of magnitude the survival rate of portable wireless devices under attack by a network stealth worm.