2006
DOI: 10.4218/etrij.06.0206.0026
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Recently, there has been a constant barrage of worms over the Internet. Besides threatening network security, these worms create an enormous economic burden in terms of loss of productivity not only for the victim hosts, but also for other hosts, as these worms create unnecessary network traffic. Further, measures taken to filter these worms at the router level incur additional network delays because of the extra burden placed on the routers. To develop appropriate tools for thwarting the quick spread of worms… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(7 citation statements)
references
References 6 publications
(8 reference statements)
0
7
0
Order By: Relevance
“…Kim et al proposed the Susceptible-Infectious-Removed (SIR) model [8] which is exactly based on Kermack-Mckendrick model [4,9] on the epidemic of biological viruses…”
Section: Analysis Of the Current Propagation Models Of Malicious Codesmentioning
confidence: 99%
“…Kim et al proposed the Susceptible-Infectious-Removed (SIR) model [8] which is exactly based on Kermack-Mckendrick model [4,9] on the epidemic of biological viruses…”
Section: Analysis Of the Current Propagation Models Of Malicious Codesmentioning
confidence: 99%
“…Previous computer virus or worm modeling research used epidemic modeling such as SIR [15] [14], SIS [16], SEIR [4] [5][8][9] [10], SIRS [15], and SEIQV [11] models to study worm propagation by developing different state transaction depending on the behavior of the virus or the worm in consideration. In this section, we will summarize research topics with main interests in the area of stability analysis, modeling malicious worms, modeling benign worms and quarantine defense mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The similarity between the spread of a biological virus and malicious worm propagation has encouraged researchers to adopt an epidemic model approach to the network environment [14]. Research in modeling computer viruses and worms implement epidemic models like susceptible-infectedrecovered (SIR) [13,41], susceptible-infected-susceptible (SIS) [14], SEIS [24], susceptible-exposed-infectious-recovered (SEIR) [16,17,23,30,38], SIRS [12,15,19], and susceptible-exposed-infected-quarantined-vaccinated (SEIQV) [20,35], vulnerable-exposed-infectious-secured-vulnerable (VEISV) [32].…”
Section: Introductionmentioning
confidence: 99%