2 The rapid spread of computer worms and viruses has become a major threat to governments, businesses, educational institutions, and even home computing. In order to combat this threat, a computational procedure based on evolution principles was introduced to create a more secure computer network. A series of computer programs written in Perl was developed and used in conjunction with a Perl package known as the Network Worm Simulator (NWS) to effectively simulate large-scale computer networks and control the evolution. The evolutionary system was run for 100 generations of 10 networks, or 1000 networks, in order to generate the optimized output. The optimized networks showed an average of 50 % improvement on average infection rate. In addi...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...
In today\u27s network-dependent society, cyber attacks with network worms have become the predominan...
Simulation is a complex task with many research applications - chiey as a research tool, to test and...
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss mot...
Due to ethical and practical limitations, simulations are the de facto approach to measure and predi...
The cost of a single zero-day network worm outbreak has been estimated at US$2.6 billion. Additional...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Due to ethical and practical limitations, simulations are the de facto approach to measure and predi...
Infections by malicious software, such as Internet worms, spreading on computer net-works can have d...
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing...
This paper addresses the problem of computer worms in the modern Internet. A worm is a self-propagat...
Various worms have a devastating impact on Internet. Packet level network modeling and simulation ha...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
The survivability of large, complex networks such as the Internet is an increasing concern, but such...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...
In today\u27s network-dependent society, cyber attacks with network worms have become the predominan...
Simulation is a complex task with many research applications - chiey as a research tool, to test and...
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss mot...
Due to ethical and practical limitations, simulations are the de facto approach to measure and predi...
The cost of a single zero-day network worm outbreak has been estimated at US$2.6 billion. Additional...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Due to ethical and practical limitations, simulations are the de facto approach to measure and predi...
Infections by malicious software, such as Internet worms, spreading on computer net-works can have d...
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing...
This paper addresses the problem of computer worms in the modern Internet. A worm is a self-propagat...
Various worms have a devastating impact on Internet. Packet level network modeling and simulation ha...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
The survivability of large, complex networks such as the Internet is an increasing concern, but such...
stract Active worms propagate across networks by employing various target discovery techniques. It i...
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash wor...
In today\u27s network-dependent society, cyber attacks with network worms have become the predominan...