Sciweavers

191 search results - page 6 / 39
» On Detecting Camouflaging Worm
Sort
View
INFOCOM
2003
IEEE
14 years 1 months ago
Modeling the Spread of Active Worms
— Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms can help us understand how active worms spread...
Zesheng Chen, Lixin Gao, Kevin A. Kwiat
WORM
2004
13 years 10 months ago
A study of mass-mailing worms
Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
RAID
2005
Springer
14 years 2 months ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...
NDSS
2005
IEEE
14 years 2 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
NSDI
2008
13 years 11 months ago
Catching Instant Messaging Worms with Change-Point Detection Techniques
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and viruses that ...
Guanhua Yan, Zhen Xiao, Stephan Eidenbenz