It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can exploit the directory and naming services necessary for the functioning of any network, and we model the behavior of such a worm in this paper. We explore via analysis and simulation the spread of such worms in an IPv6 Internet. Our results indicate that such a worm can exhibit propagation speeds comparable to an IPv4 random-scanning worm. We develop a detailed analytical model that reveals the relationship between network parameters and the spreading rate of the worm in an IPv6 world. We also develop a simulator based on our analytical model. Simulation results based o...
Most well-known worms, such as Code Red, Slarnmer, Blaster, and Sasser, infected vulnerable computer...
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
In recent years, the Internet has been plagued by a number of worms. One popular mechanism that worm...
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in th...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
Abstract. This paper reports the results of our experimentation with modeling worm behavior on a lar...
Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Int...
This paper presents a mechanism for detecting and containing fast scanning computer network worms. T...
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss mot...
Most well-known worms, such as Code Red, Slarnmer, Blaster, and Sasser, infected vulnerable computer...
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
AbstractIt is commonly believed that the IPv6 provides greater security against worms by its huge ad...
In recent years, the Internet has been plagued by a number of worms. One popular mechanism that worm...
Malicious logic, specifically worms, has caused monetary expenditure problems to network users in th...
Malicious logic, specifically worms cost network users an enormous amount of time and money. Worms, ...
In recent years, fast spreading worms have become one of the major threats to the security of the In...
An Internet worm replicates itself by automatically infecting vulnerable systems and may infect hund...
As computer and communication networks become prevalent, the Internet has been a battlefield for att...
Abstract. This paper reports the results of our experimentation with modeling worm behavior on a lar...
Morris worm showed the Internet community for the first time in 1988 that a worm could bring the Int...
This paper presents a mechanism for detecting and containing fast scanning computer network worms. T...
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss mot...
Most well-known worms, such as Code Red, Slarnmer, Blaster, and Sasser, infected vulnerable computer...
Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms contin...