Abstract — Email worms comprise the largest portion of Internet worms today. Previous research has shown that they are an effective vehicle to deliver malicious code to a large group of users. These worms spread rapidly using the email infrastructure, causing significant financial damage, network congestion, and privacy invasion. We present a dynamic architecture to proactively defend a protected domain against email worms. This architecture integrates concepts from the areas of Markov decision processes, Rabin fingerprinting and honeypots to inspect, detect, and quarantine unknown email worms in a timely manner. We also present the results of several simulation experiments to evaluate the effectiveness of the architecture under different e...
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent w...
Self-propagating computer worms have been terrorizing the Internet for the last several years. With ...
Abstract. As next-generation computer worms may spread within minutes to million of hosts, protectio...
As email becomes one of the most convenient and indispensable communication mediums in our life, it ...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Abstract Email has evolved to be a convenient and important communication media. It greatly facilita...
We present an architecture for detecting "zero-day" worms and viruses in incoming email. Our main id...
Internet worms are self-replicating malware programs that use the Internet to replicate themselves a...
The Internet infrastructure, which has become so critical in our everyday lives, needs automated pro...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Preventing mass-mailing worms from infecting the PCs in your network is obviously the cornerstone of...
Preventing mass-mailing worms from infecting the PCs in your network is obviously the cornerstone of...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Worms have caused significant destruction over the last few years. Network security elements such a...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent w...
Self-propagating computer worms have been terrorizing the Internet for the last several years. With ...
Abstract. As next-generation computer worms may spread within minutes to million of hosts, protectio...
As email becomes one of the most convenient and indispensable communication mediums in our life, it ...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Abstract Email has evolved to be a convenient and important communication media. It greatly facilita...
We present an architecture for detecting "zero-day" worms and viruses in incoming email. Our main id...
Internet worms are self-replicating malware programs that use the Internet to replicate themselves a...
The Internet infrastructure, which has become so critical in our everyday lives, needs automated pro...
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevat...
Preventing mass-mailing worms from infecting the PCs in your network is obviously the cornerstone of...
Preventing mass-mailing worms from infecting the PCs in your network is obviously the cornerstone of...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Worms have caused significant destruction over the last few years. Network security elements such a...
Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without...
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent w...
Self-propagating computer worms have been terrorizing the Internet for the last several years. With ...
Abstract. As next-generation computer worms may spread within minutes to million of hosts, protectio...