Sciweavers

482 search results - page 12 / 97
» A taxonomy of computer worms
Sort
View
PERVASIVE
2007
Springer
14 years 1 months ago
Towards a Taxonomy for Ambient Information Systems
We propose a set of design dimensions that constitute the axes of a taxonomy for ambient information systems. The dimensions are based on an investigation of a wide range of resea...
Martin Tomitsch, Karin Kappel, Andreas Lehner, Tho...
AINA
2009
IEEE
14 years 2 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
IPTPS
2005
Springer
14 years 1 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
MMMACNS
2005
Springer
14 years 29 days ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
ICNP
2007
IEEE
14 years 1 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu