JOURNAL BROWSE
Search
Advanced SearchSearch Tips
The Propagation Dynamics of Multiple Internet Worms
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The Propagation Dynamics of Multiple Internet Worms
Shin, Weon;
  PDF(new window)
 Abstract
Internet worms have been the major Internet threats may disclose important information and can bring about faults of computer systems, which spread with the fastest speed among malicious codes. Simultaneously spreading multiple worms and its variants are revealing the limitation of conventional responses based on single worms. In order to defend them effectively, it is necessary to study how multiple worms propagate and what factors affect worm spreading. In this paper, we improve the existed single worm spreading models and try to describe the correct spreads of multiple worms. Thus we analyze the spreading effects of multiple worms and its variants by various experiments.
 Keywords
Internet worm;Worm variants;Propagation modeling;Worm spreading;Multiple worm spreading;
 Language
Korean
 Cited by
 References
1.
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proceeding 2003 ACM workshop on Rapid malcode, New York, pp.11-18, 2003.

2.
Herbert W. Hethcote, "The Mathematics of Infectious Diseases," SIAM Review, vol. 42, no. 4, pp.599-653, 2000. crossref(new window)

3.
James D. Murray, Mathematical Biology: I. An Introduction, Third Edition, New York, Springer, 2001.

4.
Yini Wang, Sheng Wen, Yang Xiang, and Wanlei Zhou, "Modeling the Propagation of Worms in Networks: A Survey," IEEE Communications Surveys and Tutorials, vol. 16, no. 2, pp. 942-960, 2014. crossref(new window)

5.
Cliff C. Zou, Don Towsley and Weibo Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp.700-723, Jul. 2006. crossref(new window)

6.
Cliff C. Zou, Weibo Gong and Don Towsley. "Code Red Worm Propagation Modeling and Analysis," in Proceeding 9th ACM Conference on Computer and Communication Security, pp.138-147, New York, USA, 2002.

7.
Possible CodeRed Connection Attempts [Internet]. Available: http://lists.jammed.com/incidents/2001/07/0149.html

8.
Re: Possible CodeRed Connection Attempts [Internet]. Available: http://lists.jammed.com/incidents/2001/07/0159.html

9.
Weon Shin, "Propagation Modeling of Multiple Internet Worm Variants," Journal of Security Engineering, vol. 12, no. 3, pp.247-258, 2015. crossref(new window)

10.
Sounak Paul and Bimal Kumar Mishra, "Survey of Polymorphic Worm Signatures," International Journal of uand e- Service, Science and Technology, vol.7, no.3, pp.129-150, 2014. crossref(new window)

11.
Akamai, (Q1 2015), The State of the Internet, 2015 Report, vol. 8, no. 1, Available: https://www.stateoftheinternet.com/resources-web-security-2015-q1-internet-security-report.html

12.
Kelly Burton, The Conficker Worm [Internet]. Available: https://www.sans.org/security-resources/malwarefaq/conficker-worm.php

13.
David Kushner, The Real Story of Stuxnet [Internet]. Available: http://spectrum.ieee.org/telecom/security/the-real- story-of-stuxnet