By Topic

Overcoming the limitations in computer worm models

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Fernando C Colón Osorio ; Wireless Systems Security Research Laboratory, 420 Lakeside Avenue, Marlborom Massachusettsm USA ; Frank S Posluszny

In less than two decades, computer viruses and worms have grown from an anomaly to an everyday occurrence. In response to such a threat, the academic community has started a set of research projects seeking to understand worm behavior through creation of models. Staniford created a model to explain the propagation behaviors of worms in computer network environments. Liljenstam added a spatial perspective to this model, varying the infection rate by the scanning worms' source and destination groups. These models have been shown to describe generic Internet-scale behavior adequately. However, they often ignore the nuances present on a highly localized network such as a campus-at a local university. In this manuscript, we make and validate the claim that certain real-world constraints, such as bandwidth and heterogeneity of hosts, affect the propagation of worms and thus should not be ignored when creating models for analysis of worm behaviors.

Published in:

Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on

Date of Conference:

19-20 Oct. 2010