You are not logged in.

Modeling worms propagation on probability

Wang, Yini, Wen, Sheng and Xiang, Yang 2011, Modeling worms propagation on probability, in NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, IEEE, [Milan, Italy], pp. 49-56.

Attached Files
Name Description MIMEType Size Downloads

Title Modeling worms propagation on probability
Author(s) Wang, Yini
Wen, Sheng
Xiang, YangORCID iD for Xiang, Yang
Conference name Network and System Security. Conference (5th : 2011 : Milan, Italy)
Conference location Milan, Italy
Conference dates 6-8 Sep. 2011
Title of proceedings NSS 2011 : Proceedings of the 5th International Conference on Network and System Security
Editor(s) [Unknown]
Publication date 2011
Conference series Network and System Security. Conference
Start page 49
End page 56
Total pages 8
Publisher IEEE
Place of publication [Milan, Italy]
Keyword(s) network security
patch strategy
worms propagation
Summary There are the two common means for propagating worms: scanning vulnerable computers in the network and sending out malicious email attachments. Modeling the propagation of worms can help us understand how worms spread and devise effective defence strategies. Most traditional models simulate the overall scale of infected network in each time tick, making them invalid for examining deep inside the propagation procedure among individual nodes. For this reason, this paper proposes a novel probability matrix to model the propagation mechanism of the two main classes of worms (scanning and email worms) by concentrating on the propagation probability. The objective of this paper is to access the spreading and work out an effective scheme against the worms. In order to evaluate the effects of each major component in our probability model, we implement a series of experiments for both worms. From the results, the network administrators can make decision on how to reduce the number of vulnerable nodes to a certain threshold for scanning worms, and how to immunize the highly-connected node for preventing worm's propagation for email worms.
ISBN 9781457704581
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 329 Abstract Views, 9 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:14:33 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact