Sciweavers

147 search results - page 4 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
PAM
2010
Springer
13 years 9 months ago
A Probabilistic Population Study of the Conficker-C Botnet
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
Rhiannon Weaver
IPTPS
2005
Springer
14 years 29 days ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
IJNSEC
2010
116views more  IJNSEC 2010»
13 years 2 months ago
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
Passive worm have posed serious security threats to the functioning of unstructured P2P networks. A delayed SEIRS epidemic model with death, off line and online rate is constructe...
Fangwei Wang, Yunkai Zhang, Jianfeng Ma
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 7 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant