Modeling the Propagation of Worms in Networks: A Survey

IEEE Communications Surveys and Tutorials - Tập 16 Số 2 - Trang 942-960 - 2014
Yini Wang1, Sheng Wen1, Yang Xiang1, Wanlei Zhou1
1Deakin University School of Information Technology Melbourne Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.1007/s10115-010-0321-0

10.1140/epjb/e20020122

wen, 2012, Modeling propagation dynamics of social network worms, IEEE Trans Parallel Distrib Syst

moore, 2004, Caida: The nyxem email virus: analysis and inferences

10.1145/1151659.1159930

10.1109/INFCOM.2007.156

10.1007/978-3-642-04474-8_20

10.1145/586110.586130

10.1109/LCOMM.2011.070711.110254

10.1109/PADS.2005.24

roberts, 2003, Mathematical models in epidemiology, Mathematical Models

10.1103/PhysRevLett.86.3200

0, Iloveyou virus lessons learned report Army Forces Command

0, F-Secure (2011) Love letter virus

10.1145/948187.948189

0, Symantec (2004) W32 sasser worm

10.1016/j.peva.2005.07.032

0, (2001) Advisories and alerts ida code red worm eEye Digital Security

10.1109/MSECP.2003.1219056

0, Symantec (2001) W32 sircam worm

10.5210/fm.v8i6.1057

10.1145/1242572.1242685

10.1007/978-1-4419-6515-8_13

10.1145/2433396.2433478

10.1109/MSP.2005.57

10.1109/TNET.2011.2178078

10.1145/948187.948190

braitenberg, 1991, Anatomy of the Cortex Statistics and Geometry, 10.1007/978-3-662-02728-8

10.1016/S1389-1286(99)00040-7

10.1109/MSP.2004.59

barabási, 1999, Emergence of scaling in random networks, Science, 286, 509, 10.1126/science.286.5439.509

10.1109/TNN.2005.853425

10.1109/LCOMM.2012.030512.112452

10.1145/501317.501328

10.1145/637201.637244

10.1109/GLOCOM.2010.5684002

10.1109/TDSC.2010.13

10.1109/ACSAC.2006.36

10.1007/s11227-009-0283-8

xiang, 2009, Propagation of active worms: a survey, Int J Comput Syst Sci Eng, 24, 157

10.1109/COMST.2008.4483668

yong, 2009, Concept, characteristics and defending mechanism of worms, IEICE Trans Information and Systems, 92, 799

boguná, 2003, Epidemic spreading in complex networks with degree correlations, Lecture Notes in Physics Statistical Mechanics of Complex Networks, 625, 10.1007/978-3-540-44943-0_8

10.1145/1298306.1298311

10.1109/RELDIS.2003.1238052

gao, 2013, Modeling and restraining mobile virus propagation, IEEE Trans Mob Comput, 10.1109/TMC.2012.29

garfinkel, 2005, When virtual is harder than real: Security challenges in virtual machine based computing environments, HOTOS

10.1007/978-3-642-27585-2_4

jovanovi?, 2001, Modeling peer-to-peer network topologies through small-world models and power laws, Proc IX Telecommunications Forum TELFOR, 1

10.1109/CSE.2009.98

yan, 2011, Malware propagation in online social networks: nature, dynamics, and defense implications, Proc ACM Symp Information Computer Communications Security, 196

10.1038/30918

10.1017/S0963548398003526

10.1002/rsa.3240060204

10.1109/SFCS.1996.548467

10.1103/PhysRevLett.98.158702

staniford, 2002, How to own the internet in your spare time, Usenix Security Symp, 149

10.1109/INFCOM.2003.1209211

10.1109/ICCCN.2005.1523881

10.1109/TMC.2008.129

10.1016/j.future.2010.04.009

10.1109/TDSC.2007.1001

10.1007/978-1-4612-1158-7

moore, 2001, The spread of the code-red worm (crv2)

chen, 2005, Importance-scanning worm using vulnerable-host distribution, Global Telecommunications Conf 2005 GLOBECOM '05 IEEE, 3, 6

moore, 2001, Caida analysis of code-red, Cooperative Association for Internet Data Analysis

10.1504/IJSN.2007.012826

anderson, 1992, Infectious Diseases of Humans Dynamics and Control, 28

10.1109/ICC.2008.304

daley, 2001, Epidemic Modelling An Introduction, 15

10.1109/PCCC.2007.358894

10.1103/PhysRevE.68.035103

dagon, 2006, Modeling botnet propagation using time zones, NDSS, 6, 2

foster, 2004, Colleges brace for the next worm, The Chronicle of Higher Education, 50

10.1007/978-1-4757-3863-6

0, Symantec (2008) W32 downadup (win32/conficker)

weafer, 2010, Downadup/conficker and april fools day One year later

bailey, 1975, The mathematical theory of infectious diseases and its applications Charles Griffin & Company Ltd 5a Crendon Street High Wycombe Bucks HP13 6LE

fossi, 2011, Symantec internet security threat report trends for2010, Volume, 16, 20

wu, 2004, An effective architecture and algorithm for detecting worms with various scan, NDSS

2010, W32.stuxnet, 2010, Symantec

10.1103/PhysRevE.66.035103

wang, 2000, On computer viral infection and the effect of immunization, Comput Sec Applicat 2000 ACSAC'00 16th Annu Conf, 246

10.1109/JSAC.2003.814510

10.1109/MNET.2009.4804323

10.1016/j.physa.2010.09.034

10.1109/INFOCOM.2006.101

erdos, 1960, On the evolution of random graphs, Publ Math Inst Hungar Acad Sci, 5, 17

0, W32 koobface

10.1093/comjnl/bxr082

10.1109/TDSC.2007.70230

weaver, 2001, A brief history of the worm, BUGTRAQ Security Focus Online, 26

2001, eEye Digital Security Blaster Worm Analysis