Once a critical mass of nodes is infected by a Interestingly, as technically savvy security researchers have worm it becomes very difficult to stop the worm from infecting been analyzing scanning-based self-propagating worms exa large fraction of vulnerable nodes. Therefore, the focus of ploiting intricate software vulnerabilities; malware developers strategies for worm defense has been to detect the worm before . . d it reaches that critical mass. In this paper we present a novel have been developing technilcally less savvy yet equally potent distributed coordination technique for worm propagation and attack vectors using email and P2P file sharing. Of the synchronization that can persist under the radar of detection more than twenty thousand worms and viruses reported by mechanisms long enough to achieve critical mass for a full Symantec in year 2005, only a handful were scanning-based fledged attack. We discuss the stealthy worm propagation and self-propagating worms that exploited a software vulnerability synchronization approach exploiting a P2P file-sharing network. [27]. The majority of malware discovered was viruses, which
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.