computer worm
Recently Published Documents


TOTAL DOCUMENTS

25
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 0)

SIMULATION ◽  
2021 ◽  
pp. 003754972110095
Author(s):  
Yue Deng ◽  
Yongzhen Pei ◽  
Changguo Li

Computer worms are serious threats to Internet security and have caused billions of dollars of economic losses during the past decades. In this study, we implemented a susceptible–infected–recovered–dead (SIRD) model of computer worms and analyzed the characteristics and mechanisms of worm transmission. We applied the ordinary differential equation model to simulate the transmission process of computer worms and estimated the unknown parameters of the SIRD model through the methods of least squares, Markov chain Monte Carlo, and ensemble Kalman filtering (ENKF). The results reveal that the proposed SIRD model is more accurate than the susceptible–exposed–infected–recovered–susceptible model with respect to parameter estimation.


Author(s):  
Thangavel M. ◽  
Jeyapriya B. ◽  
Suriya K. S.

In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high-intelligent to gather the payload of zero-day polymorphic heterogeneous and homogeneous stages in distributed computing. The Signature-based discovery of worms strategies work with a low false-positive rate. We propose an irregularity based interruption location instrument for the cloud which specifically benefits from the virtualization advancements all in all. Our proposed abnormality location framework is detached from spreading computer worm contamination and it can recognize new computer worms. Utilizing our methodology, a spreading computer worm can be distinguished on the spreading conduct itself without getting to or straightforwardly affecting running virtual machines of the cloud.


2020 ◽  
Vol 148 (10) ◽  
pp. 4389-4403
Author(s):  
Wenjie Li ◽  
Jinchen Ji ◽  
Lihong Huang
Keyword(s):  

2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Nelson Ochieng ◽  
Waweru Mwangi ◽  
Ismail Ateya

The scope of this research is computer worm detection. Computer worm has been defined as a process that can cause a possibly evolved copy of it to execute on a remote computer. It does not require human intervention to propagate neither does it attach itself to an existing computer file. It spreads very rapidly. Modern computer worm authors obfuscate the code to make it difficult to detect the computer worm. This research proposes to use machine learning methodology for the detection of computer worms. More specifically, ensembles are used. The research deviates from existing detection approaches by using dark space network traffic attributed to an actual worm attack to train and validate the machine learning algorithms. It is also obtained that the various ensembles perform comparatively well. Each of them is therefore a candidate for the final model. The algorithms also perform just as well as similar studies reported in the literature.


Author(s):  
Thangavel M. ◽  
Jeyapriya B. ◽  
Suriya K. S.

In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high-intelligent to gather the payload of zero-day polymorphic heterogeneous and homogeneous stages in distributed computing. The Signature-based discovery of worms strategies work with a low false-positive rate. We propose an irregularity based interruption location instrument for the cloud which specifically benefits from the virtualization advancements all in all. Our proposed abnormality location framework is detached from spreading computer worm contamination and it can recognize new computer worms. Utilizing our methodology, a spreading computer worm can be distinguished on the spreading conduct itself without getting to or straightforwardly affecting running virtual machines of the cloud.


2018 ◽  
Vol 15 (6) ◽  
pp. 1465-1478
Author(s):  
Meng Zhang ◽  
◽  
Kaiyuan Liu ◽  
Lansun Chen ◽  
Zeyu Li ◽  
...  

2017 ◽  
Vol 479 ◽  
pp. 411-421 ◽  
Author(s):  
J.D. Hernández Guillén ◽  
A. Martín del Rey ◽  
L. Hernández Encinas

2016 ◽  
Vol 85 (3) ◽  
pp. 1561-1569 ◽  
Author(s):  
Meng Zhang ◽  
Guohua Song ◽  
Lansun Chen

Sign in / Sign up

Export Citation Format

Share Document