In light of the rise of malicious attacks on the internet and the various networks and applications attached to it, new approaches towards modeling worm activity in networks is called for. One frequently utilized method for W32/Novarg [7], Sober X, Netsky P and Mytob ED [18] propagation exploited by worms is through the victim's contact book. The contact book, which reflects the acquaintance profiles of people, is used as a ``hit-list'', to which the worm can try and send itself in order to spread fast. In this paper we propose a discrete worm propagation model that relies upon a combined email and Instant Messaging (IM) communication behavior of users in a scale free environment. We also model the effect in propagation based...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Email worms propagate across networks by taking advantage of email relationships. Modeling the propa...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
As many people rely on e-mail communications for business and everyday life, Internet e-mail worms c...
As many people rely on e-mail communications for business and everyday life, Internet e-mail worms c...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
Mass-mail type worms have threatened to become a large problem for the Internet. Although many resea...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed...
The problem of network worms is worsening despite increasing efforts and expenditure on cyber-securi...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
Email worms propagate across networks by taking advantage of email relationships. Modeling the propa...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
As many people rely on e-mail communications for business and everyday life, Internet e-mail worms c...
As many people rely on e-mail communications for business and everyday life, Internet e-mail worms c...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
Mass-mail type worms have threatened to become a large problem for the Internet. Although many resea...
Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating s...
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed...
The problem of network worms is worsening despite increasing efforts and expenditure on cyber-securi...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...