The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet worms increasingly threaten the Internet hosts and services. More terribly, good point set scanning-based self-learning worms can reach a stupendous propagation speed in virtue of the non-uniform vulnerable-host distribution. In order to combat self-learning worms, this paper proposes an interaction model. Using the interaction model, we obtain the basic reproduction number. The impact of...
Good point set scanning-based self-learning worms can reach a stupendous propagation speed in virtue of the non-uniform vulnerable-host distribution than that of traditional worms. In order to combat self-learning worms, this paper proposes an interaction model. Using the interaction model, we obtain the basic reproduction number. The impact of different parameters of predators is studied. Simulation...
Due to the rapid spreading nature of Internet worms, it is necessary to implement automatic mitigation on the Internet. Inspired by worm vaccinations, we propose a novel epidemic model which combines both vaccinations and dynamic quarantine methods, referred to as SEIQV model. Using SEIQV model, we obtain the basic reproduction number that governs whether or not a worm is extinct. The impact of different...
Paper firstly makes clearly what is the complex network and its features, and study what is network worms and the emergence of worms and its development process, understand the current status of the worm, studying focus on the spread of the worm models(simple transmission model, Kermack-Mckendrick model, two-factor model, BCM model-network worm confrontation model). Contact the characteristics of...
Passive worms have posed serious security threats to unstructured P2P networks. A delayed SEIRS epidemic model with death, offline and online rate is constructed based on the actual situation of P2P users. The basic eproduction number that governs whether a passive worm is extinct or not is obtained. In this model, time delay consists of latent and temporary immunity periods. The impact of different...
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on invulnerable addresses. Inspired by the theory of good point set, this paper proposes a new scanning strategy, referred to as good point set scanning (GPSS), for worms. Experimental results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.