As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier separation, we systematically analyze the mitigation of worm propagation in three aspects: address semantics, address space and mapping delay. By applying the classical AAWP and SIR worm propagation models, we give a quantitative comparison between today's Internet and networks with locator/identifier separation. In particular, our research results show that, the characteristics of locator/identifier separation can help to markedly mit...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
<p>Internet lacks of strong security mechanisms, opening the way to a plethora of different manners ...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
It is a commonly held belief that IPv6 provides greater security against random-scanning worms by vi...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
Worm detection systems have traditionally focused on global strategies. In the absence of a global w...
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages t...
Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective ...
Worm requires host computer with an address on the Internet and any of several vulnerabilities to cr...
Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effect...
Worm detection and response systems must act quickly to identify and quarantine scanning worms, as w...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
Recently, active worms have done significant damage due to their rapid propagation over the Internet...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
<p>Internet lacks of strong security mechanisms, opening the way to a plethora of different manners ...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
It is a commonly held belief that IPv6 provides greater security against random-scanning worms by vi...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
the major threats to the security of the Internet. In order to defend against future worms, it is im...
Worm detection systems have traditionally focused on global strategies. In the absence of a global w...
Worms are a common phenomenon in today's Internet and cause tens of billions of dollars in damages t...
Internet worms are a significant security threat. Divide-conquer scanning is a simple yet effective ...
Worm requires host computer with an address on the Internet and any of several vulnerabilities to cr...
Worm propagation analysis, including exploring mechanisms of worm propagation and formulating effect...
Worm detection and response systems must act quickly to identify and quarantine scanning worms, as w...
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become on...
Recently, active worms have done significant damage due to their rapid propagation over the Internet...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network sec...
<p>Internet lacks of strong security mechanisms, opening the way to a plethora of different manners ...