Sciweavers

23 search results - page 2 / 5
» Models and Analysis of Active Worm Defense
Sort
View
INFOCOM
2003
IEEE
14 years 27 days ago
Modeling the Spread of Active Worms
— Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms can help us understand how active worms spread...
Zesheng Chen, Lixin Gao, Kevin A. Kwiat
INFOCOM
2005
IEEE
14 years 1 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
TELSYS
2010
147views more  TELSYS 2010»
13 years 2 months ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...
ICYCS
2008
IEEE
14 years 2 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu